Mock Version: 1.3.4 Mock Version: 1.3.4 ENTER ['do'](['bash', '--login', '-c', '/usr/bin/rpmbuild -bs --target armv7hl --nodeps /builddir/build/SPECS/nss.spec'], gid=425logger=printOutput=Falseuid=1000env={'SHELL': '/bin/bash', 'HOSTNAME': 'mock', 'TERM': 'vt100', 'PS1': ' \\s-\\v\\$ ', 'LANG': 'en_US.UTF-8', 'HOME': '/builddir', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'PROMPT_COMMAND': 'printf "\\033]0;\\007"'}chrootPath='/var/lib/mock/f26-build-8521863-749792/root'nspawn_args=[]user='mockbuild'shell=Falsetimeout=172800) Executing command: ['bash', '--login', '-c', '/usr/bin/rpmbuild -bs --target armv7hl --nodeps /builddir/build/SPECS/nss.spec'] with env {'SHELL': '/bin/bash', 'HOSTNAME': 'mock', 'TERM': 'vt100', 'PS1': ' \\s-\\v\\$ ', 'LANG': 'en_US.UTF-8', 'HOME': '/builddir', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'PROMPT_COMMAND': 'printf "\\033]0;\\007"'} and shell False Building target platforms: armv7hl Building for target armv7hl Wrote: /builddir/build/SRPMS/nss-3.30.2-1.1.fc26.src.rpm Child return code was: 0 ENTER ['do'](['bash', '--login', '-c', '/usr/bin/rpmbuild -bb --target armv7hl --nodeps /builddir/build/SPECS/nss.spec'], gid=425logger=printOutput=Falseuid=1000env={'SHELL': '/bin/bash', 'HOSTNAME': 'mock', 'TERM': 'vt100', 'PS1': ' \\s-\\v\\$ ', 'LANG': 'en_US.UTF-8', 'HOME': '/builddir', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'PROMPT_COMMAND': 'printf "\\033]0;\\007"'}chrootPath='/var/lib/mock/f26-build-8521863-749792/root'nspawn_args=[]user='mockbuild'shell=Falsetimeout=172800) Executing command: ['bash', '--login', '-c', '/usr/bin/rpmbuild -bb --target armv7hl --nodeps /builddir/build/SPECS/nss.spec'] with env {'SHELL': '/bin/bash', 'HOSTNAME': 'mock', 'TERM': 'vt100', 'PS1': ' \\s-\\v\\$ ', 'LANG': 'en_US.UTF-8', 'HOME': '/builddir', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'PROMPT_COMMAND': 'printf "\\033]0;\\007"'} and shell False Building target platforms: armv7hl Building for target armv7hl Executing(%prep): /bin/sh -e /var/tmp/rpm-tmp.SxtNpi + umask 022 + cd /builddir/build/BUILD + cd /builddir/build/BUILD + rm -rf nss-3.30.2 + /usr/bin/gzip -dc /builddir/build/SOURCES/nss-3.30.2.tar.gz + /usr/bin/tar -xof - + STATUS=0 + '[' 0 -ne 0 ']' + cd nss-3.30.2 + /usr/bin/chmod -Rf a+rX,u+w,g-w,o-w . + cd /builddir/build/BUILD + cd nss-3.30.2 + /usr/bin/chmod -Rf a+rX,u+w,g-w,o-w . + echo 'Patch #2 (add-relro-linker-option.patch):' Patch #2 (add-relro-linker-option.patch): + /usr/bin/patch --no-backup-if-mismatch -p0 -b --suffix .relro --fuzz=0 patching file nss/coreconf/Linux.mk Hunk #1 succeeded at 177 (offset 3 lines). Patch #3 (renegotiate-transitional.patch): + echo 'Patch #3 (renegotiate-transitional.patch):' + /usr/bin/patch --no-backup-if-mismatch -p0 -b --suffix .transitional --fuzz=0 patching file ./nss/lib/ssl/sslsock.c Hunk #1 succeeded at 65 (offset -7 lines). Patch #16 (nss-539183.patch): + echo 'Patch #16 (nss-539183.patch):' + /usr/bin/patch --no-backup-if-mismatch -p0 -b --suffix .539183 --fuzz=0 patching file ./nss/cmd/httpserv/httpserv.c Hunk #1 succeeded at 969 (offset 16 lines). patching file ./nss/cmd/selfserv/selfserv.c Hunk #1 succeeded at 1679 (offset -32 lines). Patch #40 (nss-3.14.0.0-disble-ocsp-test.patch): + echo 'Patch #40 (nss-3.14.0.0-disble-ocsp-test.patch):' + /usr/bin/patch --no-backup-if-mismatch -p0 -b --suffix .noocsptest --fuzz=0 patching file nss/tests/chains/scenarios/scenarios Hunk #1 succeeded at 18 (offset -32 lines). + echo 'Patch #47 (utilwrap-include-templates.patch):' Patch #47 (utilwrap-include-templates.patch): + /usr/bin/patch --no-backup-if-mismatch -p0 -b --suffix .templates --fuzz=0 patching file nss/lib/nss/config.mk Patch #49 (nss-skip-bltest-and-fipstest.patch): + echo 'Patch #49 (nss-skip-bltest-and-fipstest.patch):' + /usr/bin/patch --no-backup-if-mismatch -p0 -b --suffix .skipthem --fuzz=0 patching file ./nss/cmd/Makefile Patch #50 (iquote.patch): + echo 'Patch #50 (iquote.patch):' + /usr/bin/patch --no-backup-if-mismatch -p0 -b --suffix .iquote --fuzz=0 patching file ./nss/cmd/certcgi/Makefile patching file ./nss/cmd/certutil/Makefile patching file ./nss/cmd/lib/Makefile patching file ./nss/cmd/modutil/Makefile patching file ./nss/cmd/selfserv/Makefile patching file ./nss/cmd/ssltap/Makefile patching file ./nss/cmd/strsclnt/Makefile patching file ./nss/cmd/tstclnt/Makefile patching file ./nss/cmd/vfyserv/Makefile patching file ./nss/coreconf/location.mk patching file ./nss/gtests/pk11_gtest/Makefile patching file ./nss/gtests/ssl_gtest/Makefile Hunk #1 succeeded at 50 (offset 7 lines). patching file ./nss/lib/certhigh/Makefile patching file ./nss/lib/cryptohi/Makefile patching file ./nss/lib/nss/Makefile patching file ./nss/lib/pk11wrap/Makefile patching file ./nss/lib/ssl/Makefile Hunk #1 succeeded at 56 (offset 7 lines). + echo 'Patch #58 (rhbz1185708-enable-ecc-3des-ciphers-by-default.patch):' Patch #58 (rhbz1185708-enable-ecc-3des-ciphers-by-default.patch): + /usr/bin/patch --no-backup-if-mismatch -p0 -b --suffix .1185708_3des --fuzz=0 patching file ./nss/lib/ssl/ssl3con.c Hunk #1 succeeded at 108 (offset -10 lines). + pushd nss ~/build/BUILD/nss-3.30.2/nss ~/build/BUILD/nss-3.30.2 Patch #59 (nss-check-policy-file.patch): + echo 'Patch #59 (nss-check-policy-file.patch):' + /usr/bin/patch --no-backup-if-mismatch -p1 -b --suffix .check_policy_file --fuzz=0 patching file lib/pk11wrap/pk11pars.c Patch #62 (nss-skip-util-gtest.patch): + echo 'Patch #62 (nss-skip-util-gtest.patch):' + /usr/bin/patch --no-backup-if-mismatch -p0 -b --suffix .skip_util_gtest --fuzz=0 patching file ./gtests/manifest.mn Patch #63 (nss-gcc7.patch): + echo 'Patch #63 (nss-gcc7.patch):' + /usr/bin/patch --no-backup-if-mismatch -p1 -b --suffix .gcc7 --fuzz=0 patching file lib/libpkix/pkix_pl_nss/pki/pkix_pl_ocsprequest.c Patch #64 (nss-1328318-v8-3.30.patch): + echo 'Patch #64 (nss-1328318-v8-3.30.patch):' + /usr/bin/patch --no-backup-if-mismatch -p1 -b --suffix .1328318 --fuzz=0 patching file gtests/nss_bogo_shim/nss_bogo_shim.cc patching file gtests/ssl_gtest/tls_agent.cc patching file lib/ssl/sslsock.c patching file gtests/ssl_gtest/Makefile patching file gtests/ssl_gtest/manifest.mn patching file gtests/ssl_gtest/ssl_versionpolicy_unittest.cc + popd ~/build/BUILD/nss-3.30.2 + /usr/bin/cp ./nss/lib/softoken/lowkeyi.h ./nss/cmd/rsaperf + /usr/bin/cp ./nss/lib/softoken/lowkeyti.h ./nss/cmd/rsaperf + /usr/bin/mv ./nss/lib/util/verref.h ./nss/verref.h + /usr/bin/rm -rf ./nss/lib/freebl + /usr/bin/rm -rf ./nss/lib/softoken + /usr/bin/rm -rf ./nss/lib/util + /usr/bin/rm -rf ./nss/cmd/bltest + /usr/bin/rm -rf ./nss/cmd/fipstest + /usr/bin/rm -rf ./nss/cmd/rsaperf_low + /usr/bin/rm -rf ./nss/external_tests/util_gtests + exit 0 Executing(%build): /bin/sh -e /var/tmp/rpm-tmp.j7CSqN + umask 022 + cd /builddir/build/BUILD + cd nss-3.30.2 + NSS_NO_PKCS11_BYPASS=1 + export NSS_NO_PKCS11_BYPASS + FREEBL_NO_DEPEND=1 + export FREEBL_NO_DEPEND + export BUILD_OPT=1 + BUILD_OPT=1 + XCFLAGS='-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard' + export XCFLAGS + PKG_CONFIG_ALLOW_SYSTEM_LIBS=1 + PKG_CONFIG_ALLOW_SYSTEM_CFLAGS=1 + export PKG_CONFIG_ALLOW_SYSTEM_LIBS + export PKG_CONFIG_ALLOW_SYSTEM_CFLAGS ++ /usr/bin/pkg-config --cflags-only-I nspr ++ sed s/-I// + NSPR_INCLUDE_DIR='/usr/include/nspr4 ' + NSPR_LIB_DIR=/usr/lib + export NSPR_INCLUDE_DIR + export NSPR_LIB_DIR ++ sed s/-I// ++ /usr/bin/pkg-config --cflags-only-I nss-util + export 'NSSUTIL_INCLUDE_DIR=/usr/include/nss3 -I/usr/include/nspr4 ' + NSSUTIL_INCLUDE_DIR='/usr/include/nss3 -I/usr/include/nspr4 ' + export NSSUTIL_LIB_DIR=/usr/lib + NSSUTIL_LIB_DIR=/usr/lib ++ sed s/-I// ++ /usr/bin/pkg-config --cflags-only-I nss-softokn + export 'FREEBL_INCLUDE_DIR=/usr/include/nss3 -I/usr/include/nspr4 ' + FREEBL_INCLUDE_DIR='/usr/include/nss3 -I/usr/include/nspr4 ' + export FREEBL_LIB_DIR=/usr/lib + FREEBL_LIB_DIR=/usr/lib + export USE_SYSTEM_FREEBL=1 + USE_SYSTEM_FREEBL=1 + export NSS_USE_SYSTEM_FREEBL=1 + NSS_USE_SYSTEM_FREEBL=1 ++ /usr/bin/pkg-config --libs nss-softokn + export 'FREEBL_LIBS=-L/usr/lib -lfreebl3 -lnssdbm3 -lsoftokn3 -lnssutil3 -lplds4 -lplc4 -lnspr4 -lpthread -ldl ' + FREEBL_LIBS='-L/usr/lib -lfreebl3 -lnssdbm3 -lsoftokn3 -lnssutil3 -lplds4 -lplc4 -lnspr4 -lpthread -ldl ' + export SOFTOKEN_LIB_DIR=/usr/lib + SOFTOKEN_LIB_DIR=/usr/lib + export USE_SYSTEM_NSSUTIL=1 + USE_SYSTEM_NSSUTIL=1 + export USE_SYSTEM_SOFTOKEN=1 + USE_SYSTEM_SOFTOKEN=1 + export NSS_BUILD_WITHOUT_SOFTOKEN=1 + NSS_BUILD_WITHOUT_SOFTOKEN=1 + NSS_USE_SYSTEM_SQLITE=1 + export NSS_USE_SYSTEM_SQLITE + export IN_TREE_FREEBL_HEADERS_FIRST=1 + IN_TREE_FREEBL_HEADERS_FIRST=1 + export NSS_BLTEST_NOT_AVAILABLE=1 + NSS_BLTEST_NOT_AVAILABLE=1 + /usr/bin/make -C ./nss/coreconf make: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/coreconf' cd nsinstall; /usr/bin/make export make[1]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/coreconf/nsinstall' make[1]: Nothing to be done for 'export'. make[1]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/coreconf/nsinstall' cd nsinstall; /usr/bin/make libs make[1]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/coreconf/nsinstall' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nsinstall.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pathsub.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pathsub.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pathsub.o -Wl,-z,relro -lpthread -ldl -lc true -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[1]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/coreconf/nsinstall' make: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/coreconf' + /usr/bin/make -C ./nss/lib/dbm make: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/dbm' cd include; /usr/bin/make export make[1]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/dbm/include' Creating ../../../../dist/public/dbm ../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 mcom_db.h ncompat.h winfile.h ../../../../dist/public/dbm Creating ../../../../dist/private/dbm ../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 hsearch.h page.h extern.h queue.h hash.h search.h ../../../../dist/private/dbm make[1]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/dbm/include' cd src; /usr/bin/make export make[1]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/dbm/src' make[1]: Nothing to be done for 'export'. make[1]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/dbm/src' cd include; /usr/bin/make libs make[1]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/dbm/include' make[1]: Nothing to be done for 'libs'. make[1]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/dbm/include' cd src; /usr/bin/make libs make[1]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/dbm/src' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/db.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard db.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/h_bigkey.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard h_bigkey.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/h_func.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard h_func.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/h_log2.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard h_log2.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/h_page.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard h_page.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/hash.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hash.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/hash_buf.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hash_buf.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/mktemp.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard mktemp.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/dirent.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dirent.c rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libdbm.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libdbm.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/db.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/h_bigkey.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/h_func.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/h_log2.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/h_page.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/hash.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/hash_buf.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/mktemp.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/dirent.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libdbm.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libdbm.a ../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libdbm.a ../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[1]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/dbm/src' make: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/dbm' + export POLICY_FILE=nss.config + POLICY_FILE=nss.config + export POLICY_PATH=/etc/crypto-policies/back-ends + POLICY_PATH=/etc/crypto-policies/back-ends + /usr/bin/mkdir -p ./dist/private/nss + /usr/bin/mv ./nss/verref.h ./dist/private/nss/verref.h + /usr/bin/make -C ./nss make: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss' cd coreconf; /usr/bin/make export make[1]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/coreconf' cd nsinstall; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/coreconf/nsinstall' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/coreconf/nsinstall' cd nsinstall; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/coreconf/nsinstall' true -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/coreconf/nsinstall' make[1]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/coreconf' cd lib; /usr/bin/make export make[1]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib' cd dbm; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/dbm' cd include; /usr/bin/make export make[3]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/dbm/include' ../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 mcom_db.h ncompat.h winfile.h ../../../../dist/public/dbm ../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 hsearch.h page.h extern.h queue.h hash.h search.h ../../../../dist/private/dbm make[3]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/dbm/include' cd src; /usr/bin/make export make[3]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/dbm/src' make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/dbm/src' make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/dbm' cd base; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/base' Creating ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssbaset.h nssbase.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 baset.h base.h ../../../dist/private/nss make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/base' cd dev; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/dev' ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckhelper.h devm.h devtm.h devt.h dev.h nssdevt.h nssdev.h ../../../dist/private/nss make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/dev' cd pki; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/pki' ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pki.h pkit.h nsspkit.h nsspki.h pkistore.h pki3hack.h pkitm.h pkim.h ../../../dist/private/nss make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/pki' cd libpkix; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix' cd include; /usr/bin/make export make[3]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/include' ../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../dist/private/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/include' cd pkix; /usr/bin/make export make[3]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/certsel' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/crlsel' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/checker' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/params' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/results' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/store' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/top' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/util' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/util' cd certsel; /usr/bin/make private_export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/certsel' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make private_export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/crlsel' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make private_export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/checker' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make private_export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/params' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make private_export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/results' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make private_export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/store' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make private_export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/top' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make private_export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/util' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/util' There are no private exports. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make export make[3]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss/system' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss/module' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss/module' cd pki; /usr/bin/make private_export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make private_export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss/system' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make private_export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss/module' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss/module' There are no private exports. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss' cd include; /usr/bin/make private_export make[3]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/include' ../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../dist/private/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/include' cd pkix; /usr/bin/make private_export make[3]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make private_export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/certsel' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make private_export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/crlsel' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make private_export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/checker' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make private_export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/params' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make private_export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/results' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make private_export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/store' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make private_export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/top' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make private_export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/util' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/util' There are no private exports. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make private_export make[3]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make private_export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make private_export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss/system' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make private_export make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss/module' ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss/module' There are no private exports. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss' There are no private exports. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix' cd certdb; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/certdb' ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cert.h certt.h certdb.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 genname.h xconst.h certxutl.h certi.h ../../../dist/private/nss make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/certdb' cd certhigh; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/certhigh' ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocsp.h ocspt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocspti.h ocspi.h ../../../dist/private/nss make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/certhigh' cd pk11wrap; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/pk11wrap' ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmod.h secmodt.h secpkcs5.h pk11func.h pk11pub.h pk11priv.h pk11sdr.h pk11pqg.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmodi.h dev3hack.h ../../../dist/private/nss make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/pk11wrap' cd cryptohi; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/cryptohi' ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cryptohi.h cryptoht.h key.h keyhi.h keyt.h keythi.h sechash.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 keyi.h ../../../dist/private/nss make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/cryptohi' cd nss; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/nss' ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nss.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssrenam.h nssoptions.h ../../../dist/private/nss make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/nss' cd ssl; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/ssl' ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ssl.h sslt.h sslerr.h sslproto.h preenc.h ../../../dist/public/nss There are no private exports. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/ssl' cd pkcs7; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/pkcs7' ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmime.h secpkcs7.h pkcs7t.h ../../../dist/public/nss make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/pkcs7' cd pkcs12; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/pkcs12' ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs12t.h pkcs12.h p12plcy.h p12.h p12t.h ../../../dist/public/nss make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/pkcs12' cd smime; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/smime' ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cms.h cmst.h smime.h cmsreclist.h ../../../dist/public/nss make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/smime' cd crmf; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/crmf' ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmf.h crmft.h cmmf.h cmmft.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmfi.h crmfit.h cmmfi.h cmmfit.h ../../../dist/private/nss make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/crmf' cd jar; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/jar' ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 jar.h jar-ds.h jarfile.h ../../../dist/public/nss make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/jar' cd ckfw; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/ckfw' cd builtins; /usr/bin/make export make[3]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/ckfw/builtins' ../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckbi.h ../../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/ckfw/builtins' ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssck.api nssckepv.h nssckft.h nssckfw.h nssckfwc.h nssckfwt.h nssckg.h nssckmdt.h nssckt.h ../../../dist/public/nss cd builtins; /usr/bin/make private_export make[3]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/ckfw/builtins' There are no private exports. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/ckfw/builtins' ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ck.h ckfw.h ckfwm.h ckfwtm.h ckmd.h ckt.h ../../../dist/private/nss make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/ckfw' cd sysinit; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/sysinit' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/sysinit' make[1]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib' cd cmd; /usr/bin/make export make[1]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd' cd lib; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/lib' ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 basicutil.h secutil.h pk11table.h ../../../dist/private/nss make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/lib' cd shlibsign; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/shlibsign' cd mangle; /usr/bin/make export make[3]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/shlibsign/mangle' make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/shlibsign/mangle' make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/shlibsign' cd addbuiltin; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/addbuiltin' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/addbuiltin' cd atob; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/atob' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/atob' cd btoa; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/btoa' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/btoa' cd certcgi; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/certcgi' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/certcgi' cd certutil; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/certutil' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/certutil' cd chktest; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/chktest' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/chktest' cd crlutil; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/crlutil' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/crlutil' cd crmftest; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/crmftest' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/crmftest' cd dbtest; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/dbtest' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/dbtest' cd derdump; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/derdump' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/derdump' cd digest; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/digest' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/digest' cd httpserv; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/httpserv' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/httpserv' cd listsuites; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/listsuites' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/listsuites' cd makepqg; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/makepqg' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/makepqg' cd multinit; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/multinit' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/multinit' cd ocspclnt; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/ocspclnt' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/ocspclnt' cd ocspresp; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/ocspresp' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/ocspresp' cd oidcalc; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/oidcalc' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/oidcalc' cd p7content; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/p7content' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/p7content' cd p7env; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/p7env' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/p7env' cd p7sign; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/p7sign' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/p7sign' cd p7verify; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/p7verify' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/p7verify' cd pk12util; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pk12util' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pk12util' cd pk11ectest; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pk11ectest' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pk11ectest' cd pk11gcmtest; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pk11gcmtest' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pk11gcmtest' cd pk11mode; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pk11mode' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pk11mode' cd pk1sign; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pk1sign' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pk1sign' cd pp; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pp' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pp' cd pwdecrypt; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pwdecrypt' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pwdecrypt' cd rsaperf; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/rsaperf' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/rsaperf' cd sdrtest; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/sdrtest' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/sdrtest' cd selfserv; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/selfserv' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/selfserv' cd signtool; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/signtool' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/signtool' cd signver; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/signver' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/signver' cd smimetools; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/smimetools' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/smimetools' cd ssltap; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/ssltap' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/ssltap' cd strsclnt; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/strsclnt' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/strsclnt' cd symkeyutil; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/symkeyutil' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/symkeyutil' cd tests; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/tests' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/tests' cd tstclnt; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/tstclnt' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/tstclnt' cd vfychain; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/vfychain' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/vfychain' cd vfyserv; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/vfyserv' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/vfyserv' cd modutil; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/modutil' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/modutil' cd pkix-errcodes; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pkix-errcodes' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pkix-errcodes' make[1]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd' cd gtests; /usr/bin/make export make[1]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/gtests' cd google_test; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/gtests/google_test' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/gtests/google_test' cd common; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/gtests/common' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/gtests/common' cd der_gtest; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/gtests/der_gtest' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/gtests/der_gtest' cd nss_bogo_shim; /usr/bin/make export make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/gtests/nss_bogo_shim' make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/gtests/nss_bogo_shim' make[1]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/gtests' cd coreconf; /usr/bin/make libs make[1]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/coreconf' cd nsinstall; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/coreconf/nsinstall' true -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/coreconf/nsinstall' make[1]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/coreconf' cd lib; /usr/bin/make libs make[1]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib' cd dbm; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/dbm' cd include; /usr/bin/make libs make[3]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/dbm/include' make[3]: Nothing to be done for 'libs'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/dbm/include' cd src; /usr/bin/make libs make[3]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/dbm/src' ../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libdbm.a ../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/dbm/src' make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/dbm' cd base; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/base' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/arena.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard arena.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/error.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard error.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/errorval.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard errorval.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/hashops.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hashops.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libc.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard libc.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/tracker.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tracker.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/item.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard item.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/utf8.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard utf8.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/list.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard list.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/hash.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hash.c rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnssb.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnssb.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/arena.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/error.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/errorval.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/hashops.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libc.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/tracker.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/item.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/utf8.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/list.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/hash.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnssb.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnssb.a ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnssb.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/base' cd dev; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/dev' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/devslot.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard devslot.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/devtoken.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard devtoken.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/devutil.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard devutil.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ckhelper.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ckhelper.c rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnssdev.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnssdev.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/devslot.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/devtoken.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/devutil.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ckhelper.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnssdev.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnssdev.a ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnssdev.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/dev' cd pki; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/pki' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/asymmkey.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard asymmkey.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certificate.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certificate.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cryptocontext.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cryptocontext.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/symmkey.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard symmkey.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/trustdomain.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard trustdomain.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/tdcache.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tdcache.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certdecode.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certdecode.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkistore.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkistore.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkibase.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkibase.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pki3hack.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pki3hack.c rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnsspki.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnsspki.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/asymmkey.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certificate.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cryptocontext.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/symmkey.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/trustdomain.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/tdcache.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certdecode.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkistore.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkibase.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pki3hack.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnsspki.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnsspki.a ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnsspki.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/pki' cd libpkix; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix' cd include; /usr/bin/make libs make[3]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/include' make[3]: Nothing to be done for 'libs'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/include' cd pkix; /usr/bin/make libs make[3]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make libs make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/certsel' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_certselector.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_certselector.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_comcertselparams.c rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixcertsel.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixcertsel.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_certselector.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixcertsel.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixcertsel.a ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixcertsel.a ../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make libs make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/crlsel' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_crlselector.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_crlselector.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_comcrlselparams.c rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixcrlsel.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_crlselector.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixcrlsel.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make libs make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/checker' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_basicconstraintschecker.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_certchainchecker.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_crlchecker.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_crlchecker.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_ekuchecker.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_expirationchecker.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_namechainingchecker.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_nameconstraintschecker.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_ocspchecker.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_revocationmethod.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_revocationchecker.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_policychecker.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_policychecker.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_signaturechecker.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_targetcertchecker.c rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixchecker.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixchecker.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_crlchecker.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_policychecker.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixchecker.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixchecker.a ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixchecker.a ../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make libs make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/params' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_trustanchor.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_trustanchor.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_procparams.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_procparams.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_valparams.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_valparams.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_resourcelimits.c rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixparams.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixparams.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_trustanchor.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_procparams.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_valparams.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixparams.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixparams.a ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixparams.a ../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make libs make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/results' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_buildresult.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_buildresult.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_policynode.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_policynode.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_valresult.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_valresult.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_verifynode.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_verifynode.c rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixresults.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixresults.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_buildresult.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_policynode.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_valresult.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_verifynode.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixresults.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixresults.a ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixresults.a ../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make libs make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/store' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_store.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_store.c rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixstore.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixstore.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_store.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixstore.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixstore.a ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixstore.a ../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make libs make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/top' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_validate.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_validate.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_lifecycle.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_lifecycle.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_build.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_build.c rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixtop.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixtop.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_validate.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_lifecycle.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_build.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixtop.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixtop.a ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixtop.a ../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make libs make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/util' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_tools.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_tools.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_error.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_error.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_logger.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_logger.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_list.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_list.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_errpaths.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_errpaths.c rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixutil.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixutil.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_tools.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_error.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_logger.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_list.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_errpaths.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixutil.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixutil.a ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixutil.a ../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix/util' make[3]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make libs make[3]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make libs make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss/pki' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_basicconstraints.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_cert.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_cert.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_certpolicyinfo.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_certpolicymap.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_certpolicyqualifier.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crl.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_crl.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_crldp.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_crlentry.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_date.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_date.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_generalname.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_infoaccess.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_nameconstraints.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ocsprequest.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ocspresponse.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_publickey.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_x500name.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ocspcertid.c rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixpki.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixpki.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_cert.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crl.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_date.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixpki.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixpki.a ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixpki.a ../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make libs make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss/system' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_bigint.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_bytearray.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_common.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_common.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_error.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_error.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_hashtable.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_lifecycle.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_mem.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_mem.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_monitorlock.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_mutex.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_object.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_object.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_oid.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_oid.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_primhash.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_rwlock.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_string.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_string.c rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixsystem.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixsystem.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_common.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_error.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_mem.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_object.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_oid.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_string.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixsystem.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixsystem.a ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixsystem.a ../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make libs make[4]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss/module' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_aiamgr.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_colcertstore.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_httpcertstore.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_httpdefaultclient.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldaptemplates.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldapcertstore.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldapresponse.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldaprequest.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldapdefaultclient.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_nsscontext.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_pk11certstore.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_socket.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_socket.c rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixmodule.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixmodule.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_socket.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixmodule.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixmodule.a ../../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkixmodule.a ../../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss/module' make[3]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix/pkix_pl_nss' make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/libpkix' cd certdb; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/certdb' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/alg1485.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard alg1485.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certdb.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certdb.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certv3.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certv3.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certxutl.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certxutl.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crl.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crl.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/genname.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard genname.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/stanpcertdb.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard stanpcertdb.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/polcyxtn.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard polcyxtn.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/secname.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secname.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/xauthkid.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard xauthkid.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/xbsconst.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard xbsconst.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/xconst.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard xconst.c rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libcertdb.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libcertdb.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/alg1485.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certdb.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certv3.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certxutl.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crl.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/genname.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/stanpcertdb.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/polcyxtn.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/secname.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/xauthkid.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/xbsconst.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/xconst.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libcertdb.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libcertdb.a ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libcertdb.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/certdb' cd certhigh; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/certhigh' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certhtml.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certhtml.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certreq.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certreq.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crlv2.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crlv2.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ocsp.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ocsp.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ocspsig.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ocspsig.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certhigh.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certhigh.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certvfy.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certvfy.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certvfypkix.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certvfypkix.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/xcrldist.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard xcrldist.c rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libcerthi.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libcerthi.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certhtml.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certreq.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crlv2.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ocsp.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ocspsig.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certhigh.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certvfy.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certvfypkix.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/xcrldist.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libcerthi.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libcerthi.a ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libcerthi.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/certhigh' cd pk11wrap; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/pk11wrap' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/dev3hack.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dev3hack.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11akey.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11akey.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11auth.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11auth.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11cert.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11cert.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11cxt.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11cxt.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11err.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11err.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11kea.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11kea.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11list.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11list.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11load.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11load.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11mech.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11mech.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11merge.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11merge.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11nobj.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11nobj.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11obj.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11obj.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11pars.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11pars.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11pbe.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11pbe.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11pk12.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11pk12.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11pqg.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11pqg.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11sdr.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11sdr.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11skey.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11skey.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11slot.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11slot.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11util.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11util.c rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpk11wrap.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpk11wrap.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/dev3hack.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11akey.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11auth.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11cert.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11cxt.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11err.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11kea.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11list.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11load.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11mech.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11merge.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11nobj.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11obj.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11pars.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11pbe.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11pk12.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11pqg.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11sdr.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11skey.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11slot.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11util.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpk11wrap.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpk11wrap.a ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpk11wrap.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/pk11wrap' cd cryptohi; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/cryptohi' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sechash.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sechash.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/seckey.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard seckey.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/secsign.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secsign.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/secvfy.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secvfy.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/dsautil.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dsautil.c rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libcryptohi.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libcryptohi.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sechash.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/seckey.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/secsign.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/secvfy.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/dsautil.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libcryptohi.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libcryptohi.a ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libcryptohi.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/cryptohi' cd nss; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/nss' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nssinit.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DPOLICY_FILE=\"nss.config\" -DPOLICY_PATH=\"/etc/crypto-policies/back-ends\" -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nssinit.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nssoptions.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DPOLICY_FILE=\"nss.config\" -DPOLICY_PATH=\"/etc/crypto-policies/back-ends\" -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nssoptions.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nssver.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DPOLICY_FILE=\"nss.config\" -DPOLICY_PATH=\"/etc/crypto-policies/back-ends\" -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nssver.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/utilwrap.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DPOLICY_FILE=\"nss.config\" -DPOLICY_PATH=\"/etc/crypto-policies/back-ends\" -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard utilwrap.c rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnss.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnss.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nssinit.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nssoptions.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nssver.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/utilwrap.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnss.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnss.a grep -v ';-' nss.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nss.def rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnss3.so cc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnss3.so -Wl,--version-script,Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nss.def -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnss3.so Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nssinit.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nssoptions.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nssver.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/utilwrap.o ../certhigh/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certhtml.o ../certhigh/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certreq.o ../certhigh/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crlv2.o ../certhigh/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ocsp.o ../certhigh/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ocspsig.o ../certhigh/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certhigh.o ../certhigh/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certvfy.o ../certhigh/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certvfypkix.o ../certhigh/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/xcrldist.o ../cryptohi/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sechash.o ../cryptohi/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/seckey.o ../cryptohi/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/secsign.o ../cryptohi/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/secvfy.o ../cryptohi/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/dsautil.o ../pk11wrap/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/dev3hack.o ../pk11wrap/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11akey.o ../pk11wrap/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11auth.o ../pk11wrap/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11cert.o ../pk11wrap/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11cxt.o ../pk11wrap/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11err.o ../pk11wrap/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11kea.o ../pk11wrap/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11list.o ../pk11wrap/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11load.o ../pk11wrap/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11mech.o ../pk11wrap/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11merge.o ../pk11wrap/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11nobj.o ../pk11wrap/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11obj.o ../pk11wrap/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11pars.o ../pk11wrap/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11pbe.o ../pk11wrap/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11pk12.o ../pk11wrap/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11pqg.o ../pk11wrap/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11sdr.o ../pk11wrap/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11skey.o ../pk11wrap/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11slot.o ../pk11wrap/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11util.o ../certdb/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/alg1485.o ../certdb/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certdb.o ../certdb/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certv3.o ../certdb/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certxutl.o ../certdb/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crl.o ../certdb/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/genname.o ../certdb/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/stanpcertdb.o ../certdb/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/polcyxtn.o ../certdb/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/secname.o ../certdb/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/xauthkid.o ../certdb/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/xbsconst.o ../certdb/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/xconst.o ../pki/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/asymmkey.o ../pki/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certificate.o ../pki/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cryptocontext.o ../pki/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/symmkey.o ../pki/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/trustdomain.o ../pki/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/tdcache.o ../pki/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certdecode.o ../pki/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkistore.o ../pki/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkibase.o ../pki/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pki3hack.o ../dev/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/devslot.o ../dev/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/devtoken.o ../dev/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/devutil.o ../dev/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ckhelper.o ../base/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/arena.o ../base/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/error.o ../base/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/errorval.o ../base/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/hashops.o ../base/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libc.o ../base/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/tracker.o ../base/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/item.o ../base/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/utf8.o ../base/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/list.o ../base/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/hash.o ../libpkix/pkix/certsel/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_certselector.o ../libpkix/pkix/certsel/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o ../libpkix/pkix/checker/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o ../libpkix/pkix/checker/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o ../libpkix/pkix/checker/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_crlchecker.o ../libpkix/pkix/checker/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o ../libpkix/pkix/checker/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o ../libpkix/pkix/checker/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o ../libpkix/pkix/checker/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o ../libpkix/pkix/checker/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o ../libpkix/pkix/checker/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o ../libpkix/pkix/checker/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o ../libpkix/pkix/checker/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_policychecker.o ../libpkix/pkix/checker/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o ../libpkix/pkix/checker/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o ../libpkix/pkix/params/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_trustanchor.o ../libpkix/pkix/params/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_procparams.o ../libpkix/pkix/params/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_valparams.o ../libpkix/pkix/params/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o ../libpkix/pkix/results/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_buildresult.o ../libpkix/pkix/results/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_policynode.o ../libpkix/pkix/results/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_valresult.o ../libpkix/pkix/results/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_verifynode.o ../libpkix/pkix/top/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_validate.o ../libpkix/pkix/top/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_lifecycle.o ../libpkix/pkix/top/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_build.o ../libpkix/pkix/util/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_tools.o ../libpkix/pkix/util/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_error.o ../libpkix/pkix/util/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_logger.o ../libpkix/pkix/util/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_list.o ../libpkix/pkix/util/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_errpaths.o ../libpkix/pkix/crlsel/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_crlselector.o ../libpkix/pkix/crlsel/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o ../libpkix/pkix/store/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_store.o ../libpkix/pkix_pl_nss/pki/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o ../libpkix/pkix_pl_nss/pki/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_cert.o ../libpkix/pkix_pl_nss/pki/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o ../libpkix/pkix_pl_nss/pki/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o ../libpkix/pkix_pl_nss/pki/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o ../libpkix/pkix_pl_nss/pki/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crl.o ../libpkix/pkix_pl_nss/pki/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o ../libpkix/pkix_pl_nss/pki/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o ../libpkix/pkix_pl_nss/pki/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_date.o ../libpkix/pkix_pl_nss/pki/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o ../libpkix/pkix_pl_nss/pki/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o ../libpkix/pkix_pl_nss/pki/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o ../libpkix/pkix_pl_nss/pki/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o ../libpkix/pkix_pl_nss/pki/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o ../libpkix/pkix_pl_nss/pki/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o ../libpkix/pkix_pl_nss/pki/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o ../libpkix/pkix_pl_nss/pki/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o ../libpkix/pkix_pl_nss/system/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o ../libpkix/pkix_pl_nss/system/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o ../libpkix/pkix_pl_nss/system/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_common.o ../libpkix/pkix_pl_nss/system/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_error.o ../libpkix/pkix_pl_nss/system/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o ../libpkix/pkix_pl_nss/system/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o ../libpkix/pkix_pl_nss/system/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_mem.o ../libpkix/pkix_pl_nss/system/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o ../libpkix/pkix_pl_nss/system/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o ../libpkix/pkix_pl_nss/system/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_object.o ../libpkix/pkix_pl_nss/system/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_oid.o ../libpkix/pkix_pl_nss/system/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o ../libpkix/pkix_pl_nss/system/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o ../libpkix/pkix_pl_nss/system/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_string.o ../libpkix/pkix_pl_nss/module/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o ../libpkix/pkix_pl_nss/module/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o ../libpkix/pkix_pl_nss/module/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o ../libpkix/pkix_pl_nss/module/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o ../libpkix/pkix_pl_nss/module/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o ../libpkix/pkix_pl_nss/module/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o ../libpkix/pkix_pl_nss/module/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o ../libpkix/pkix_pl_nss/module/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o ../libpkix/pkix_pl_nss/module/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o ../libpkix/pkix_pl_nss/module/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_socket.o -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnss3.so ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnss.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnss3.so ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/nss' cd ssl; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/ssl' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/dtlscon.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dtlscon.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/prelib.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard prelib.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ssl3con.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssl3con.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ssl3gthr.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssl3gthr.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslauth.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslauth.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslcon.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslcon.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ssldef.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssldef.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslenum.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslenum.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslerr.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslerr.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslerrstrs.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslerrstrs.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslinit.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslinit.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ssl3ext.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssl3ext.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ssl3exthandle.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssl3exthandle.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslmutex.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslmutex.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslnonce.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslnonce.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslreveal.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslreveal.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslsecur.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslsecur.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslsnce.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslsnce.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslsock.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslsock.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ssltrace.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssltrace.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslver.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslver.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/authcert.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard authcert.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmpcert.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmpcert.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslinfo.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslinfo.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ssl3ecc.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssl3ecc.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/tls13con.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tls13con.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/tls13exthandle.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tls13exthandle.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/tls13hkdf.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tls13hkdf.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslcert.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslcert.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslgrp.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslgrp.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/unix_err.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard unix_err.c rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libssl.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libssl.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/dtlscon.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/prelib.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ssl3con.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslauth.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslcon.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ssldef.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslenum.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslerr.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslinit.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ssl3ext.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ssl3exthandle.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslmutex.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslnonce.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslreveal.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslsecur.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslsnce.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslsock.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ssltrace.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslver.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/authcert.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmpcert.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslinfo.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/tls13con.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/tls13exthandle.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/tls13hkdf.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslcert.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslgrp.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/unix_err.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libssl.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libssl.a grep -v ';-' ssl.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ssl.def rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libssl3.so cc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libssl3.so -Wl,--version-script,Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ssl.def -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libssl3.so Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/dtlscon.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/prelib.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ssl3con.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslauth.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslcon.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ssldef.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslenum.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslerr.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslinit.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ssl3ext.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ssl3exthandle.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslmutex.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslnonce.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslreveal.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslsecur.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslsnce.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslsock.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ssltrace.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslver.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/authcert.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmpcert.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslinfo.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/tls13con.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/tls13exthandle.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/tls13hkdf.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslcert.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sslgrp.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/unix_err.o -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc -lz chmod +x Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libssl3.so ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libssl.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libssl3.so ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/ssl' cd pkcs7; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/pkcs7' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certread.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certread.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7common.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7common.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7create.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7create.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7decode.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7decode.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7encode.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7encode.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7local.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7local.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/secmime.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secmime.c rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkcs7.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkcs7.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certread.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7common.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7create.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7decode.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7encode.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7local.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/secmime.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkcs7.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkcs7.a ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkcs7.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/pkcs7' cd pkcs12; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/pkcs12' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p12local.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12local.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p12creat.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12creat.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p12dec.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12dec.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p12plcy.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12plcy.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p12tmpl.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12tmpl.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p12e.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12e.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p12d.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12d.c rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkcs12.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkcs12.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p12local.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p12creat.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p12dec.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p12plcy.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p12tmpl.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p12e.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p12d.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkcs12.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkcs12.a ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libpkcs12.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/pkcs12' cd smime; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/smime' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsarray.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsarray.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsasn1.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsasn1.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsattr.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsattr.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmscinfo.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmscinfo.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmscipher.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmscipher.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsdecode.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsdecode.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsdigdata.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsdigdata.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsdigest.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsdigest.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsencdata.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsencdata.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsencode.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsencode.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsenvdata.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsenvdata.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsmessage.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsmessage.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmspubkey.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmspubkey.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsrecinfo.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsrecinfo.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsreclist.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsreclist.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmssigdata.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmssigdata.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmssiginfo.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmssiginfo.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsudf.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsudf.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsutil.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsutil.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/smimemessage.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard smimemessage.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/smimeutil.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard smimeutil.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/smimever.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard smimever.c rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libsmime.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libsmime.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsarray.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsasn1.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsattr.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmscinfo.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmscipher.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsdecode.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsdigest.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsencdata.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsencode.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsmessage.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmspubkey.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsreclist.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmssigdata.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsudf.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsutil.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/smimemessage.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/smimeutil.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/smimever.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libsmime.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libsmime.a grep -v ';-' smime.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/smime.def rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libsmime3.so cc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libsmime3.so -Wl,--version-script,Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/smime.def -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libsmime3.so Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsarray.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsasn1.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsattr.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmscinfo.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmscipher.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsdecode.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsdigest.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsencdata.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsencode.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsmessage.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmspubkey.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsreclist.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmssigdata.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsudf.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsutil.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/smimemessage.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/smimeutil.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/smimever.o ../pkcs12/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p12local.o ../pkcs12/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p12creat.o ../pkcs12/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p12dec.o ../pkcs12/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p12plcy.o ../pkcs12/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p12tmpl.o ../pkcs12/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p12e.o ../pkcs12/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p12d.o ../pkcs7/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certread.o ../pkcs7/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7common.o ../pkcs7/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7create.o ../pkcs7/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7decode.o ../pkcs7/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7encode.o ../pkcs7/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7local.o ../pkcs7/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/secmime.o -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libsmime3.so ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libsmime.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libsmime3.so ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/smime' cd crmf; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/crmf' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crmfenc.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfenc.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crmftmpl.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmftmpl.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crmfreq.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfreq.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crmfpop.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfpop.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crmfdec.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfdec.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crmfget.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfget.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crmfcont.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfcont.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmmfasn1.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmmfasn1.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmmfresp.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmmfresp.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmmfrec.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmmfrec.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmmfchal.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmmfchal.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/servget.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard servget.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/encutil.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard encutil.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/respcli.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard respcli.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/respcmn.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard respcmn.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/challcli.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard challcli.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/asn1cmn.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard asn1cmn.c rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libcrmf.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libcrmf.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crmfenc.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crmftmpl.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crmfreq.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crmfpop.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crmfdec.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crmfget.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crmfcont.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmmfasn1.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmmfresp.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmmfrec.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmmfchal.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/servget.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/encutil.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/respcli.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/respcmn.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/challcli.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/asn1cmn.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libcrmf.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libcrmf.a ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libcrmf.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/crmf' cd jar; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/jar' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/jarver.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jarver.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/jarsign.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jarsign.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/jar.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jar.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/jar-ds.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jar-ds.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/jarfile.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jarfile.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/jarint.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jarint.c rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libjar.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libjar.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/jarver.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/jarsign.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/jar.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/jar-ds.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/jarfile.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/jarint.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libjar.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libjar.a ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libjar.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/jar' cd ckfw; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/ckfw' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crypto.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crypto.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/find.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard find.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/hash.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hash.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/instance.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard instance.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/mutex.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard mutex.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/object.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard object.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/session.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard session.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sessobj.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sessobj.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/slot.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard slot.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/token.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard token.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/wrap.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard wrap.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/mechanism.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard mechanism.c rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnssckfw.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnssckfw.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crypto.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/find.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/hash.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/instance.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/mutex.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/object.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/session.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sessobj.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/slot.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/token.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/wrap.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/mechanism.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnssckfw.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnssckfw.a ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnssckfw.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib cd builtins; /usr/bin/make libs make[3]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/ckfw/builtins' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/anchor.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard anchor.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/constants.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard constants.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bfind.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard bfind.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/binst.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard binst.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bobject.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard bobject.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bsession.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard bsession.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bslot.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard bslot.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/btoken.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard btoken.c perl certdata.perl certdata.txt Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certdata.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certdata.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certdata.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ckbiver.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ckbiver.c grep -v ';-' nssckbi.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nssckbi.def rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnssckbi.so cc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnssckbi.so -Wl,--version-script,Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nssckbi.def -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnssckbi.so Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/anchor.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/constants.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bfind.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/binst.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bobject.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bsession.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bslot.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/btoken.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certdata.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ckbiver.o ../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a ../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnssckbi.so ../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnssckbi.so ../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/ckfw/builtins' make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/ckfw' cd sysinit; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/sysinit' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsssysinit.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nsssysinit.c rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsssysinit.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.a rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.so cc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnsssysinit.so -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.so Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsssysinit.o -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.so ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.so ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib/sysinit' make[1]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/lib' cd cmd; /usr/bin/make libs make[1]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd' cd lib; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/lib' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/basicutil.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard basicutil.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/secutil.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secutil.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/secpwd.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secpwd.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/derprint.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard derprint.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/moreoids.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard moreoids.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pppolicy.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pppolicy.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ffs.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ffs.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11table.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11table.c rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libsectool.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libsectool.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/basicutil.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/secutil.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/secpwd.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/derprint.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/moreoids.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pppolicy.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ffs.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11table.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libsectool.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libsectool.a ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libsectool.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/lib' cd shlibsign; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/shlibsign' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/shlibsign.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard shlibsign.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/shlibsign -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/shlibsign.o -Wl,-z,relro -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/shlibsign ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin cd mangle; /usr/bin/make libs make[3]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/shlibsign/mangle' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/mangle.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard mangle.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/mangle -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/mangle.o -Wl,-z,relro -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/mangle ../../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/shlibsign/mangle' make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/shlibsign' cd addbuiltin; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/addbuiltin' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/addbuiltin.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard addbuiltin.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/addbuiltin -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/addbuiltin.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/addbuiltin ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/addbuiltin' cd atob; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/atob' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/atob.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard atob.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/atob -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/atob.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/atob ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/atob' cd btoa; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/btoa' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/btoa.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard btoa.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/btoa -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/btoa.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/btoa ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/btoa' cd certcgi; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/certcgi' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certcgi.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certcgi.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certcgi -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certcgi.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /usr/lib/libfreebl.a -L/usr/lib -lsoftokn3 -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certcgi ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/certcgi' cd certutil; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/certutil' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certext.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certext.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certutil.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certutil.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/keystuff.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard keystuff.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certutil -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certext.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certutil.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/keystuff.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certutil ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/certutil' cd chktest; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/chktest' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/chktest.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard chktest.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/chktest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/chktest.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /usr/lib/libfreebl.a -L/usr/lib -lsoftokn3 -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/chktest ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/chktest' cd crlutil; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/crlutil' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crlgen_lex.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crlgen_lex.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crlgen.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crlgen.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crlutil.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crlutil.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crlutil -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crlgen_lex.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crlgen.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crlutil.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crlutil ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/crlutil' cd crmftest; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/crmftest' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/testcrmf.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard testcrmf.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crmftest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/testcrmf.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/crmftest ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/crmftest' cd dbtest; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/dbtest' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/dbtest.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dbtest.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/dbtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/dbtest.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/dbtest ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/dbtest' cd derdump; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/derdump' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/derdump.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard derdump.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/derdump -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/derdump.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/derdump ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/derdump' cd digest; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/digest' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/digest.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard digest.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/digest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/digest.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/digest ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/digest' cd httpserv; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/httpserv' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/httpserv.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard httpserv.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/httpserv -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/httpserv.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/httpserv ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/httpserv' cd listsuites; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/listsuites' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/listsuites.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard listsuites.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/listsuites -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/listsuites.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/listsuites ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/listsuites' cd makepqg; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/makepqg' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/makepqg.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard makepqg.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/makepqg -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/makepqg.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/makepqg ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/makepqg' cd multinit; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/multinit' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/multinit.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard multinit.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/multinit -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/multinit.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/multinit ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/multinit' cd ocspclnt; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/ocspclnt' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ocspclnt.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ocspclnt.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ocspclnt -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ocspclnt.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ocspclnt ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/ocspclnt' cd ocspresp; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/ocspresp' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ocspresp.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ocspresp.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ocspresp -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ocspresp.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ocspresp ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/ocspresp' cd oidcalc; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/oidcalc' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/oidcalc.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard oidcalc.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/oidcalc -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/oidcalc.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/oidcalc ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/oidcalc' cd p7content; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/p7content' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7content.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7content.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7content -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7content.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7content ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/p7content' cd p7env; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/p7env' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7env.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7env.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7env -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7env.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7env ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/p7env' cd p7sign; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/p7sign' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7sign.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7sign.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7sign -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7sign.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7sign ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/p7sign' cd p7verify; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/p7verify' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7verify.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7verify.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7verify -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7verify.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/p7verify ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/p7verify' cd pk12util; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pk12util' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk12util.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk12util.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk12util -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk12util.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk12util ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pk12util' cd pk11ectest; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pk11ectest' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11ectest.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11ectest.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11ectest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11ectest.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /usr/lib/libfreebl.a -L/usr/lib -lsoftokn3 -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11ectest ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pk11ectest' cd pk11gcmtest; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pk11gcmtest' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11gcmtest.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11gcmtest.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11gcmtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11gcmtest.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11gcmtest ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pk11gcmtest' cd pk11mode; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pk11mode' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11mode.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11mode.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11mode -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11mode.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11mode ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pk11mode' cd pk1sign; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pk1sign' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk1sign.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk1sign.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk1sign -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk1sign.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk1sign ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pk1sign' cd pp; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pp' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pp.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pp.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pp -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pp.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pp ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pp' cd pwdecrypt; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pwdecrypt' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pwdecrypt.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pwdecrypt.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pwdecrypt -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pwdecrypt.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pwdecrypt ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pwdecrypt' cd rsaperf; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/rsaperf' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/rsaperf.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard rsaperf.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/defkey.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard defkey.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/rsaperf -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/rsaperf.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/defkey.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /usr/lib/libfreebl.a -L/usr/lib -lsoftokn3 -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/rsaperf ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/rsaperf' cd sdrtest; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/sdrtest' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sdrtest.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sdrtest.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sdrtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sdrtest.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sdrtest ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/sdrtest' cd selfserv; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/selfserv' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/selfserv.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard selfserv.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/selfserv -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/selfserv.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/selfserv ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/selfserv' cd signtool; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/signtool' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/signtool.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard signtool.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certgen.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certgen.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/javascript.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard javascript.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/list.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard list.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sign.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sign.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/util.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard util.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/verify.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard verify.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/zip.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard zip.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/signtool -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/signtool.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/certgen.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/javascript.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/list.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/sign.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/util.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/verify.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/zip.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libjar.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc -lz ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/signtool ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/signtool' cd signver; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/signver' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/signver.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard signver.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk7print.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk7print.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/signver -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/signver.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk7print.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/signver ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/signver' cd smimetools; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/smimetools' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsutil.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsutil.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsutil -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsutil.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/cmsutil ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/smimetools' cd ssltap; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/ssltap' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ssltap.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssltap.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ssltap -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ssltap.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/ssltap ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/ssltap' cd strsclnt; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/strsclnt' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/strsclnt.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard strsclnt.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/strsclnt -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/strsclnt.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/strsclnt ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/strsclnt' cd symkeyutil; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/symkeyutil' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/symkeyutil.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard symkeyutil.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/symkeyutil -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/symkeyutil.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/symkeyutil ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/symkeyutil' cd tests; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/tests' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/baddbdir.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard baddbdir.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/baddbdir -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/baddbdir.o \ -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/conflict.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard conflict.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/conflict -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/conflict.o \ -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/dertimetest.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dertimetest.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/dertimetest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/dertimetest.o \ -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/encodeinttest.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard encodeinttest.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/encodeinttest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/encodeinttest.o \ -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nonspr10.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nonspr10.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nonspr10 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nonspr10.o \ -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/remtest.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard remtest.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/remtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/remtest.o \ -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/secmodtest.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secmodtest.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/secmodtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/secmodtest.o \ -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/baddbdir Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/conflict Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/dertimetest Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/encodeinttest Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nonspr10 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/remtest Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/secmodtest ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/tests' cd tstclnt; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/tstclnt' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/tstclnt.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tstclnt.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/tstclnt -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/tstclnt.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/tstclnt ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/tstclnt' cd vfychain; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/vfychain' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/vfychain.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard vfychain.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/vfychain -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/vfychain.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/vfychain ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/vfychain' cd vfyserv; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/vfyserv' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/vfyserv.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard vfyserv.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/vfyutil.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard vfyutil.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/vfyserv -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/vfyserv.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/vfyutil.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/vfyserv ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/vfyserv' cd modutil; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/modutil' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/modutil.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard modutil.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/instsec.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard instsec.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/install.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard install.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/installparse.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard installparse.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/install-ds.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard install-ds.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard lex.Pk11Install_yy.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/modutil -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/modutil.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pk11.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/instsec.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/install.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/installparse.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/install-ds.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libjar.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc -lz ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/modutil ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/modutil' cd pkix-errcodes; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pkix-errcodes' cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix-errcodes.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix-errcodes.c cc -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix-errcodes -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix-errcodes.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/pkix-errcodes ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd/pkix-errcodes' make[1]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/cmd' cd gtests; /usr/bin/make libs make[1]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/gtests' cd google_test; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/gtests/google_test' if test ! -d Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/gtest/src; then rm -rf Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/gtest/src; ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/gtest/src; fi g++ -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/gtest/src/gtest-all.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -Igtest/include/ -Igtest -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/gtest -I../../../dist/private/gtest -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -std=c++0x gtest/src/gtest-all.cc rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libgtest.a ar cr Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libgtest.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/gtest/src/gtest-all.o echo Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libgtest.a Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libgtest.a rm -f Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libgtest1.so g++ -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libgtest1.so Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/gtest/src/gtest-all.o ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc chmod +x Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libgtest1.so ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libgtest.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/libgtest1.so ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/gtests/google_test' cd common; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/gtests/common' if test ! -d Linux4.10_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.10_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.10_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/gtests.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/gtest -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -std=c++0x gtests.cc g++ -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/gtests -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/gtest -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/gtests.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/gtests ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/gtests/common' cd der_gtest; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/gtests/der_gtest' if test ! -d Linux4.10_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.10_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.10_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/der_getint_unittest.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -std=c++0x der_getint_unittest.cc if test ! -d Linux4.10_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.10_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.10_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/der_private_key_import_unittest.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -std=c++0x der_private_key_import_unittest.cc g++ -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/der_gtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/der_getint_unittest.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/der_private_key_import_unittest.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a ../common/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/gtests.o ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/der_gtest ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/gtests/der_gtest' cd nss_bogo_shim; /usr/bin/make libs make[2]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/gtests/nss_bogo_shim' if test ! -d Linux4.10_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.10_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.10_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/config.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -std=c++0x -std=c++0x config.cc if test ! -d Linux4.10_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.10_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.10_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsskeys.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -std=c++0x -std=c++0x nsskeys.cc if test ! -d Linux4.10_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.10_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.10_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nss_bogo_shim.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -std=c++0x -std=c++0x nss_bogo_shim.cc g++ -o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nss_bogo_shim -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Werror -Wsign-compare -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/config.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsskeys.o Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nss_bogo_shim.o -Wl,-z,relro ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /usr/lib/libfreebl.a -L/usr/lib -lsoftokn3 -L../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc -lz ../../coreconf/nsinstall/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/nss_bogo_shim ../../../dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/gtests/nss_bogo_shim' make[1]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/gtests' make: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss' + unset NSS_BLTEST_NOT_AVAILABLE + pushd ./nss ~/build/BUILD/nss-3.30.2/nss ~/build/BUILD/nss-3.30.2 + /usr/bin/make clean_docs build_docs /usr/bin/make -C ./doc clean make[1]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/doc' rm -f date.xml version.xml *.tar.bz2 rm -f html/*.proc rm -fr nss-man ascii make[1]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/doc' /usr/bin/make -C ./doc make[1]: Entering directory '/builddir/build/BUILD/nss-3.30.2/nss/doc' date +"%e %B %Y" | tr -d '\n' > date.xml echo -n > version.xml mkdir -p html mkdir -p nroff make[1]: Leaving directory '/builddir/build/BUILD/nss-3.30.2/nss/doc' + popd ~/build/BUILD/nss-3.30.2 + /usr/bin/mkdir -p ./dist/docs/nroff + /usr/bin/cp ./nss/doc/nroff/certutil.1 ./nss/doc/nroff/cmsutil.1 ./nss/doc/nroff/crlutil.1 ./nss/doc/nroff/derdump.1 ./nss/doc/nroff/modutil.1 ./nss/doc/nroff/pk12util.1 ./nss/doc/nroff/pp.1 ./nss/doc/nroff/signtool.1 ./nss/doc/nroff/signver.1 ./nss/doc/nroff/ssltap.1 ./nss/doc/nroff/vfychain.1 ./nss/doc/nroff/vfyserv.1 ./dist/docs/nroff + /usr/bin/mkdir -p ./dist/pkgconfig + /usr/bin/cat /builddir/build/SOURCES/nss.pc.in + sed -e s,%libdir%,/usr/lib,g -e s,%prefix%,/usr,g -e s,%exec_prefix%,/usr,g -e s,%includedir%,/usr/include/nss3,g -e s,%NSS_VERSION%,3.30.2,g -e s,%NSPR_VERSION%,4.14.0,g -e s,%NSSUTIL_VERSION%,3.30.2,g -e s,%SOFTOKEN_VERSION%,3.30.2,g ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VMAJOR' ++ awk '{print $3}' + NSS_VMAJOR=3 ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VMINOR' ++ awk '{print $3}' + NSS_VMINOR=30 ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VPATCH' ++ awk '{print $3}' + NSS_VPATCH=2 + export NSS_VMAJOR + export NSS_VMINOR + export NSS_VPATCH + /usr/bin/cat /builddir/build/SOURCES/nss-config.in + sed -e s,@libdir@,/usr/lib,g -e s,@prefix@,/usr,g -e s,@exec_prefix@,/usr,g -e s,@includedir@,/usr/include/nss3,g -e s,@MOD_MAJOR_VERSION@,3,g -e s,@MOD_MINOR_VERSION@,30,g -e s,@MOD_PATCH_VERSION@,2,g + chmod 755 ./dist/pkgconfig/nss-config + /usr/bin/cat /builddir/build/SOURCES/setup-nsssysinit.sh + chmod 755 ./dist/pkgconfig/setup-nsssysinit.sh + /usr/bin/cp ./nss/lib/ckfw/nssck.api ./dist/private/nss/ + date '+%e %B %Y' + tr -d '\n' + echo -n 3.30.2 + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml + cp /builddir/build/SOURCES/nss-config.xml . + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml + cp /builddir/build/SOURCES/setup-nsssysinit.xml . + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml + cp /builddir/build/SOURCES/pkcs11.txt.xml . + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml + xmlto man nss-config.xml Note: Writing nss-config.1 + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml + xmlto man setup-nsssysinit.xml Note: Writing setup-nsssysinit.1 + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml + xmlto man pkcs11.txt.xml Note: Writing pkcs11.txt.5 + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/cert8.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/cert9.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/key3.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/key4.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/secmod.db.xml . + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man cert8.db.xml Note: Writing cert8.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man cert9.db.xml Note: Writing cert9.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man key3.db.xml Note: Writing key3.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man key4.db.xml Note: Writing key4.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man secmod.db.xml Note: Writing secmod.db.5 + exit 0 Executing(%install): /bin/sh -e /var/tmp/rpm-tmp.rLoC4b + umask 022 + cd /builddir/build/BUILD + '[' /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm '!=' / ']' + rm -rf /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm ++ dirname /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm + mkdir -p /builddir/build/BUILDROOT + mkdir /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm + cd nss-3.30.2 + /usr/bin/rm -rf /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3/templates + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/bin + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/lib + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/lib/nss/unsupported-tools + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/lib/pkgconfig + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/share/doc/nss-tools + mkdir -p /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/share/man/man1 + mkdir -p /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/share/man/man5 + touch /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/lib/libnssckbi.so + /usr/bin/install -p -m 755 dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/lib/nss/libnssckbi.so + for file in libnss3.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/lib + for file in libnss3.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/lib + for file in libnss3.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/lib + for file in libnss3.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/lib + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//etc/pki/nssdb + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-cert8.db /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//etc/pki/nssdb/cert8.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-key3.db /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//etc/pki/nssdb/key3.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-secmod.db /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//etc/pki/nssdb/secmod.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-cert9.db /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//etc/pki/nssdb/cert9.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-key4.db /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//etc/pki/nssdb/key4.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/system-pkcs11.txt /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//etc/pki/nssdb/pkcs11.txt + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/lib + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/lib + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/lib + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/certutil /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/cmsutil /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/crlutil /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/modutil /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/signtool /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/signver /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/ssltap /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/bin + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/atob /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/btoa /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/derdump /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/listsuites /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/ocspclnt /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/pp /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/selfserv /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/strsclnt /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/symkeyutil /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/tstclnt /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/vfyserv /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/vfychain /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/lib/nss/unsupported-tools + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/cert.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/certdb.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/certt.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/cmmf.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/cmmft.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/cms.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/cmsreclist.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/cmst.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/crmf.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/crmft.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/cryptohi.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/cryptoht.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/jar-ds.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/jar.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/jarfile.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/key.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/keyhi.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/keyt.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/keythi.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/nss.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/nssbase.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/nssbaset.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/nssckbi.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/nssckepv.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/nssckft.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/nssckfw.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/nssckfwc.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/nssckfwt.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/nssckg.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/nssckmdt.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/nssckt.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/ocsp.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/ocspt.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/p12.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/p12plcy.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/p12t.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/pk11func.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/pk11pqg.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/pk11priv.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/pk11pub.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/pk11sdr.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/pkcs12.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/pkcs12t.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/pkcs7t.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/preenc.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/sechash.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/secmime.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/secmod.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/secmodt.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/secpkcs5.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/secpkcs7.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/smime.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/ssl.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/sslerr.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/sslproto.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/public/nss/*.h + /usr/bin/install -p -m 644 dist/public/nss/sslt.h /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3 + for file in dist/private/nss/nssck.api + /usr/bin/install -p -m 644 dist/private/nss/nssck.api /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/include/nss3/templates + /usr/bin/install -p -m 644 ./dist/pkgconfig/nss.pc /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/lib/pkgconfig/nss.pc + /usr/bin/install -p -m 755 ./dist/pkgconfig/nss-config /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/bin/nss-config + /usr/bin/install -p -m 755 ./dist/pkgconfig/setup-nsssysinit.sh /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/bin/setup-nsssysinit.sh + ln -r -s -f /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/bin/setup-nsssysinit.sh /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm//usr/bin/setup-nsssysinit + for f in nss-config setup-nsssysinit + install -c -m 644 nss-config.1 /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/share/man/man1/nss-config.1 + for f in nss-config setup-nsssysinit + install -c -m 644 setup-nsssysinit.1 /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/share/man/man1/setup-nsssysinit.1 + for f in ""certutil cmsutil crlutil derdump modutil pk12util signtool signver ssltap vfychain vfyserv"" + install -c -m 644 ./dist/docs/nroff/certutil.1 /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/share/man/man1/certutil.1 + for f in ""certutil cmsutil crlutil derdump modutil pk12util signtool signver ssltap vfychain vfyserv"" + install -c -m 644 ./dist/docs/nroff/cmsutil.1 /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/share/man/man1/cmsutil.1 + for f in ""certutil cmsutil crlutil derdump modutil pk12util signtool signver ssltap vfychain vfyserv"" + install -c -m 644 ./dist/docs/nroff/crlutil.1 /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/share/man/man1/crlutil.1 + for f in ""certutil cmsutil crlutil derdump modutil pk12util signtool signver ssltap vfychain vfyserv"" + install -c -m 644 ./dist/docs/nroff/derdump.1 /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/share/man/man1/derdump.1 + for f in ""certutil cmsutil crlutil derdump modutil pk12util signtool signver ssltap vfychain vfyserv"" + install -c -m 644 ./dist/docs/nroff/modutil.1 /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/share/man/man1/modutil.1 + for f in ""certutil cmsutil crlutil derdump modutil pk12util signtool signver ssltap vfychain vfyserv"" + install -c -m 644 ./dist/docs/nroff/pk12util.1 /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/share/man/man1/pk12util.1 + for f in ""certutil cmsutil crlutil derdump modutil pk12util signtool signver ssltap vfychain vfyserv"" + install -c -m 644 ./dist/docs/nroff/signtool.1 /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/share/man/man1/signtool.1 + for f in ""certutil cmsutil crlutil derdump modutil pk12util signtool signver ssltap vfychain vfyserv"" + install -c -m 644 ./dist/docs/nroff/signver.1 /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/share/man/man1/signver.1 + for f in ""certutil cmsutil crlutil derdump modutil pk12util signtool signver ssltap vfychain vfyserv"" + install -c -m 644 ./dist/docs/nroff/ssltap.1 /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/share/man/man1/ssltap.1 + for f in ""certutil cmsutil crlutil derdump modutil pk12util signtool signver ssltap vfychain vfyserv"" + install -c -m 644 ./dist/docs/nroff/vfychain.1 /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/share/man/man1/vfychain.1 + for f in ""certutil cmsutil crlutil derdump modutil pk12util signtool signver ssltap vfychain vfyserv"" + install -c -m 644 ./dist/docs/nroff/vfyserv.1 /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/share/man/man1/vfyserv.1 + install -c -m 644 ./dist/docs/nroff/pp.1 /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/share/doc/nss-tools/pp.1 + for f in pkcs11.txt + install -c -m 644 pkcs11.txt.5 /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/share/man/man5/pkcs11.txt.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 cert8.db.5 /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/share/man/man5/cert8.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 cert9.db.5 /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/share/man/man5/cert9.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 key3.db.5 /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/share/man/man5/key3.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 key4.db.5 /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/share/man/man5/key4.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 secmod.db.5 /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/share/man/man5/secmod.db.5 + /usr/lib/rpm/find-debuginfo.sh --strict-build-id -m --run-dwz --dwz-low-mem-die-limit 10000000 --dwz-max-die-limit 50000000 /builddir/build/BUILD/nss-3.30.2 extracting debug info from /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/bin/crlutil extracting debug info from /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/bin/modutil extracting debug info from /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/bin/pk12util extracting debug info from /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/bin/ssltap extracting debug info from /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/bin/signver extracting debug info from /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/bin/certutil extracting debug info from /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/bin/signtool extracting debug info from /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/bin/cmsutil extracting debug info from /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/lib/libssl3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/lib/libsmime3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/lib/nss/unsupported-tools/atob extracting debug info from /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/lib/nss/unsupported-tools/vfychain extracting debug info from /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/lib/nss/unsupported-tools/ocspclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/lib/nss/unsupported-tools/pp extracting debug info from /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/lib/nss/unsupported-tools/tstclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/lib/nss/unsupported-tools/strsclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/lib/nss/unsupported-tools/derdump extracting debug info from /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/lib/nss/unsupported-tools/vfyserv extracting debug info from /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/lib/nss/unsupported-tools/selfserv extracting debug info from /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/lib/nss/unsupported-tools/symkeyutil extracting debug info from /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/lib/nss/unsupported-tools/listsuites extracting debug info from /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/lib/nss/unsupported-tools/btoa extracting debug info from /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/lib/nss/libnssckbi.so extracting debug info from /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/lib/libnsssysinit.so extracting debug info from /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/lib/libnss3.so /usr/lib/rpm/sepdebugcrcfix: Updated 25 CRC32s, 0 CRC32s did match. cpio: nss-3.30.2/nss/cmd/modutil/lex.Pk11Install_yy.cpp: Cannot stat: No such file or directory cpio: nss-3.30.2/nss/cmd/modutil/ytab.c: Cannot stat: No such file or directory 25152 blocks + /usr/lib/rpm/check-buildroot + /usr/lib/rpm/brp-compress + /usr/lib/rpm/brp-strip-static-archive /usr/bin/strip + /usr/lib/rpm/brp-python-bytecompile /usr/bin/python 1 + /usr/lib/rpm/brp-python-hardlink Executing(%check): /bin/sh -e /var/tmp/rpm-tmp.FQaRR0 + umask 022 + cd /builddir/build/BUILD + cd nss-3.30.2 + '[' 0 -eq 1 ']' + FREEBL_NO_DEPEND=1 + export FREEBL_NO_DEPEND + export BUILD_OPT=1 + BUILD_OPT=1 + export NSS_BLTEST_NOT_AVAILABLE=1 + NSS_BLTEST_NOT_AVAILABLE=1 + export SOFTOKEN_LIB_DIR=/usr/lib + SOFTOKEN_LIB_DIR=/usr/lib + export NSS_IGNORE_SYSTEM_POLICY=1 + NSS_IGNORE_SYSTEM_POLICY=1 ++ find ./nss/tests ++ grep -c ' ' + SPACEISBAD=0 + : + '[' 0 -ne 0 ']' ++ perl -e 'print 9000 + int rand 1000' + MYRAND=9208 + echo 9208 9208 selfserv_9208 + RANDSERV=selfserv_9208 + echo selfserv_9208 ++ ls -d ./dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin + DISTBINDIR=./dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin + echo ./dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin ./dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin ++ pwd + pushd /builddir/build/BUILD/nss-3.30.2 ~/build/BUILD/nss-3.30.2 ~/build/BUILD/nss-3.30.2 + cd ./dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin + ln -s selfserv selfserv_9208 + popd ~/build/BUILD/nss-3.30.2 + find ./nss/tests -type f + grep -v '\.db$' + xargs grep -lw selfserv + grep -v '\.crt$' + grep -v '\.crl$' + xargs -l perl -pi -e 's/\bselfserv\b/selfserv_9208/g' + grep -vw CVS + killall selfserv_9208 selfserv_9208: no process found + : + rm -rf ./tests_results + pushd ./nss/tests/ ~/build/BUILD/nss-3.30.2/nss/tests ~/build/BUILD/nss-3.30.2 ++ echo + SKIP_NSS_TEST_SUITE= + '[' x == x ']' + HOST=localhost + DOMSUF=localdomain + PORT=9208 + NSS_CYCLES= + NSS_TESTS='libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains ec gtests ssl_gtests' + NSS_SSL_TESTS= + NSS_SSL_RUN= + ./all.sh testdir is /builddir/build/BUILD/nss-3.30.2/tests_results/security init.sh init: Creating /builddir/build/BUILD/nss-3.30.2/tests_results/security which: no domainname in (.:/builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin:/builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/sbin:/usr/local/sbin) ******************************************** Platform: Linux4.10_arm_cc_glibc_PTH_OPT.OBJ Results: localhost.1 ******************************************** init.sh init: Testing PATH .:/builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin:/builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/sbin:/usr/local/sbin against LIB /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib: Running tests for libpkix TIMESTAMP libpkix BEGIN: Wed May 10 11:41:20 UTC 2017 TIMESTAMP libpkix END: Wed May 10 11:41:20 UTC 2017 Running tests for cert TIMESTAMP cert BEGIN: Wed May 10 11:41:20 UTC 2017 cert.sh: Certutil and Crlutil Tests with ECC =============================== cert.sh: #1: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/CA -f ../tests.pw cert.sh: #2: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #3: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/CA -o root.cert cert.sh: #5: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA -f ../tests.pw cert.sh: #6: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #7: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #9: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #11: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #13: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA -f ../tests.pw cert.sh: #14: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #15: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #16: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #17: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #18: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #19: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #20: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #21: Exporting Root Cert - PASSED cert.sh: Creating an DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #22: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #23: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #24: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #25: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #26: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #27: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #28: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #29: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #30: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #31: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #32: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #33: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #34: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #35: Exporting DSA Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #36: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #37: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #38: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #39: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #40: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #41: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #42: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #43: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #44: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #45: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #46: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #47: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #48: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #49: Exporting EC Root Cert - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_server -f ../tests.pw cert.sh: #50: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #51: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #52: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #53: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #54: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #55: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #56: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #57: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #58: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA/clientCA-dsa.ca.cert cert.sh: #59: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #60: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #61: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #62: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #63: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #64: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #65: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA/clientCA-ec.ca.cert cert.sh: #66: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #67: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #68: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #69: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #70: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA/serverCA-dsa.ca.cert cert.sh: #71: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #72: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #73: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #74: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #75: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA/serverCA-ec.ca.cert cert.sh: #76: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #77: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #78: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_client -f ../tests.pw cert.sh: #79: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #80: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #81: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #82: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #83: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #84: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #85: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #86: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #87: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA/serverCA-dsa.ca.cert cert.sh: #88: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #89: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #90: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #91: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #92: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #93: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #94: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA/serverCA-ec.ca.cert cert.sh: #95: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #96: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #97: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #98: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #99: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #100: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #101: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #102: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #103: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #104: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA/clientCA-ec.ca.cert cert.sh: #105: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #106: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/clientCA/clientCA-dsa.ca.cert cert.sh: #107: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw cert.sh: #108: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #109: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -i ../CA/TestCA.ca.cert cert.sh: #110: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #111: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -i ../CA/TestCA-ec.ca.cert cert.sh: #112: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #113: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #114: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #115: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #116: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #117: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #118: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #119: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #120: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #121: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #122: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #123: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #124: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #125: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #126: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #127: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #128: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #129: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -i ../CA/TestCA.ca.cert cert.sh: #130: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #131: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -i ../CA/TestCA-ec.ca.cert cert.sh: #132: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #133: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #134: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #135: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #136: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #137: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #138: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #139: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #140: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #141: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #142: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #143: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #144: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #145: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #146: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #147: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #148: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #149: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #150: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #151: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #152: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #153: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #154: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #155: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #156: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #157: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #158: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #159: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #160: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #161: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #162: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #163: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #164: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #165: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/alicedir -f ../tests.pw cert.sh: #166: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #167: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/alicedir -i ../CA/TestCA.ca.cert cert.sh: #168: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #169: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #170: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #171: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #172: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #173: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #174: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #175: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #176: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #177: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #178: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #179: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #180: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #181: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #182: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #183: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #184: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #185: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/bobdir -f ../tests.pw cert.sh: #186: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #187: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/bobdir -i ../CA/TestCA.ca.cert cert.sh: #188: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #189: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #190: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #191: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #192: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #193: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #194: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #195: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #196: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #197: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #198: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #199: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #200: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #201: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #202: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #203: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #204: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #205: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/dave -f ../tests.pw cert.sh: #206: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #207: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/dave -i ../CA/TestCA.ca.cert cert.sh: #208: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #209: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #210: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #211: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #212: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #213: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #214: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #215: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #216: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #217: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #218: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #219: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #220: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #221: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #222: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #223: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #224: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #225: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/eve -f ../tests.pw cert.sh: #226: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #227: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/eve -i ../CA/TestCA.ca.cert cert.sh: #228: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #229: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #230: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #231: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #232: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #233: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #234: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #235: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #236: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #237: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #238: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #239: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #240: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #241: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #242: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #243: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #244: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #245: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #246: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #247: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #248: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #249: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #250: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #251: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #252: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #253: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips -f ../tests.fipspw cert.sh: #254: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #255: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #256: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #257: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/eccurves -f ../tests.pw cert.sh: #258: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #259: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #260: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #261: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #262: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #263: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #264: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #265: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #266: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #267: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #268: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #269: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw cert.sh: #270: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #271: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #272: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #273: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #274: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #275: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #276: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #277: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #278: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #279: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #280: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #281: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #282: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #283: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #284: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #285: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #286: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #287: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #288: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #289: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:3e:bf Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Wed May 10 11:42:03 2017 Not After : Thu Aug 10 11:42:03 2017 Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:bf:0e:ae:a6:3b:75:4d:49:32:5e:75:5c:31:bb:56: 60:09:d8:8c:a5:62:14:a4:a1:a0:32:4c:51:ab:4b:79: f3:6b:fb:b0:ec:d6:6d:b2:40:31:d8:02:4f:62:a4:85: f4:80:9d:45:af:2f:0a:06:b3:15:4a:48:93:bc:85:94: c1:f5:a9:db:93:c3:a8:eb:bb:17:92:7d:65:b0:7b:9b: be:b0:e1:4c:93:3d:33:8d:3d:b6:fb:07:d9:8b:5b:ce: 0e:83:79:8d:cd:f3:a6:49:79:b8:57:c2:cf:f8:39:8e: c3:f8:ad:16:11:6a:a3:86:5c:cb:e4:27:4c:af:23:2e: e1:41:f5:5e:6c:d9:77:29:2e:6f:50:e4:76:5b:78:a7: 3b:5b:f1:e5:a1:96:c8:a7:c4:21:75:e3:2c:f6:7f:ac: 04:c3:81:25:bb:6d:ba:70:15:9c:ec:4e:1c:2b:05:27: b5:89:bb:51:42:a3:fc:1c:c5:c9:29:6f:ae:0f:5a:7d: 3c:6c:a6:44:26:91:f6:90:88:04:02:72:43:bb:be:53: 08:d2:03:1e:23:72:60:d2:bd:00:aa:20:34:c5:bd:ba: 08:bc:f6:f9:c1:52:4e:b3:22:66:34:a4:dc:ba:43:29: 27:39:3c:74:4d:63:e7:2d:08:c9:d9:a0:eb:34:7e:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cf:08:b6:a8:c0:f4:6a:04:b9:89:61:6a:1d:40:12:c3: 91:30:be:64:9d:d9:a8:d1:fb:0d:7c:d3:d2:47:a3:a4: 9b:39:a1:63:62:85:9e:0f:b9:b8:77:67:2b:ee:d6:0a: 6b:ec:3a:0a:bd:e4:2c:a6:72:a8:8d:97:19:f9:36:6e: da:f0:e0:62:14:fa:ef:ad:c1:ad:e9:89:4f:dd:d9:85: b4:21:aa:d3:fb:61:f5:79:cb:fb:89:d4:1a:18:01:ca: 0f:68:9c:55:19:a8:4d:a9:8e:d5:91:f3:c0:38:9c:f8: 9b:42:e3:fa:d8:d9:33:a0:13:9c:f1:0f:33:eb:4b:62: ca:0e:16:23:5e:9f:a8:44:dc:a4:87:08:a7:ef:47:cf: 8d:08:cd:1c:c4:3b:1b:30:07:87:a0:11:0f:b6:46:1b: 9f:d1:69:2e:30:b7:64:01:37:10:88:78:d0:47:f2:3e: b2:e6:be:bc:81:4f:6d:f0:69:36:2e:df:dc:98:99:58: a7:53:bf:97:a4:9a:ed:24:9a:e6:83:a6:57:69:2b:5f: a2:21:89:0e:fd:15:16:ad:36:58:3a:a9:bf:66:14:38: aa:c3:0c:12:ad:ff:e6:1a:98:53:68:2a:eb:ce:23:51: f3:fc:b6:73:5b:93:5d:30:89:92:e3:53:6f:1e:c1:db Fingerprint (SHA-256): 99:38:37:D2:66:EC:64:FC:43:84:AA:C6:6A:1A:8C:CC:49:C3:09:1D:E3:B8:12:50:8F:FF:56:DD:0E:E8:09:A8 Fingerprint (SHA1): 81:39:C8:7E:94:28:A2:71:9F:34:DE:FA:8A:B5:28:94:19:F9:8A:C4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #290: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:3e:c1 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Wed May 10 11:42:04 2017 Not After : Thu Aug 10 11:42:04 2017 Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:7e:28:05:93:c7:da:ac:16:ed:81:5c:b7:e8:46:f5: 87:74:fe:4b:c5:5c:cb:67:e4:04:37:94:8e:30:1c:e5: 45:dc:3a:8d:ff:ad:30:d1:d3:e7:74:b0:4d:00:6b:e4: 45:b1:60:c9:b2:a4:e3:84:02:cc:fc:13:44:e5:8e:f4: 05:3c:97:6a:27:4d:c1:d7:8c:30:cf:1e:99:d5:9f:bf: d6:b6:ca:90:3b:df:63:e7:13:a2:b0:c4:57:fc:a3:a1: 76:c7:b6:a0:e6:4f:f2:83:56:ba:29:94:59:b6:94:c3: 8a:26:89:4a:6c:54:e7:05:d1:ad:d8:4b:3d:14:5c:f3: 41:86:34:1f:04:0d:18:70:9a:e1:2c:eb:f7:a8:f4:08: 60:9a:48:2d:58:b2:3c:c4:4c:16:f0:fa:c3:e4:66:39: 8f:17:bb:fe:a8:02:a7:14:e8:4a:4d:ba:19:db:61:4a: 1f:d7:aa:59:d6:bc:78:1b:29:ee:89:21:96:80:fb:a8: 60:67:68:b5:12:6a:50:f5:d1:69:07:f4:c3:22:ea:21: 09:80:31:f3:e4:4e:67:2c:3b:6e:f0:b0:2e:64:63:85: 0b:be:f1:bb:79:ad:89:5d:b8:85:24:a7:6f:8b:4e:42: 30:cd:38:26:5a:04:aa:45:1c:57:c5:8f:9e:16:4e:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:58:90:d3:39:3d:be:a6:82:aa:da:57:b1:e0:1c:3a: 3d:ff:de:1b:40:e2:4a:f8:67:48:04:09:0b:5e:d5:eb: 98:f2:a7:d1:9b:b1:75:6f:8f:4b:0e:1a:46:d1:f7:5a: c5:48:15:06:3a:26:15:b9:84:83:42:73:04:bb:e2:da: 87:49:62:a1:b2:ba:95:82:8e:12:bf:8a:bb:53:38:af: 91:f0:62:d0:69:f6:c9:70:77:c4:6e:43:0b:89:de:34: 80:29:2c:d5:e2:fa:03:a1:0e:01:e5:7a:48:67:dc:bb: 2a:dc:82:51:40:82:d7:d0:c0:36:27:8f:5b:b0:17:a9: 1f:f1:11:c7:85:7b:07:31:4b:13:61:1c:e1:fd:6e:f8: ab:07:1f:13:ae:d7:25:49:66:4b:30:28:e8:ed:fd:47: 2b:93:82:bf:54:5b:cb:2d:b2:ce:7e:4b:e3:c1:6e:3b: af:fe:3b:38:86:56:ee:70:72:19:fb:9f:4a:73:61:dd: 9d:3a:51:d5:03:fa:0d:a2:09:9f:eb:4f:9f:0f:b8:e4: 34:b3:98:86:e1:34:94:36:b5:08:f3:3a:a0:28:16:0d: cb:92:41:9f:0d:aa:df:d9:ba:99:76:a6:e4:ed:ed:13: a5:6d:2f:66:4d:a1:04:7e:c4:57:cd:89:ef:7e:68:2d Fingerprint (SHA-256): FF:C3:4D:40:D7:6C:3F:D7:0E:C7:A9:05:E7:1C:FB:85:3E:7C:85:B0:DB:78:81:33:BF:3D:54:92:34:06:19:3E Fingerprint (SHA1): 11:CC:C5:47:0A:81:30:C8:9E:39:B7:8A:EF:14:39:B4:24:33:80:D5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #291: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:3e:c3 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Wed May 10 11:42:05 2017 Not After : Thu Aug 10 11:42:05 2017 Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:7b:20:6b:bd:88:98:ac:a6:81:58:ce:b5:b4:ae:c3: 4a:82:32:4b:bc:ba:18:99:79:93:bf:54:ff:6f:6f:7d: dc:7c:6b:7b:f5:d8:ff:0e:6e:21:dd:37:21:cb:47:57: 42:40:41:43:14:c8:b9:6a:a4:4a:b1:90:e5:09:cc:d7: 0e:58:6c:01:62:72:38:bf:a5:e6:3e:86:5e:69:2e:a1: 36:cc:fb:4f:19:03:41:c8:e0:f9:6a:27:4e:27:4a:7a: a9:f8:00:6e:0c:99:32:ff:ca:e9:74:24:e2:ed:65:e2: 17:87:16:54:3a:9f:5a:31:96:ce:f8:db:b3:3e:10:49: 6f:a9:cb:b7:b1:48:6f:93:95:89:0d:4b:8e:5c:6f:15: 7a:88:0d:f5:d0:50:4c:ea:cd:db:1c:45:15:95:66:f5: e8:36:3c:26:51:1b:97:0a:90:09:7d:c3:d2:a7:3b:d5: 2d:ff:f0:dd:a4:ab:e5:cc:df:fc:2e:c6:67:0f:26:84: fd:b8:23:50:38:f7:0d:cf:28:e9:e1:76:dd:0d:29:7a: e3:a9:c8:ee:55:d5:5b:e6:08:28:d4:da:02:17:06:46: ca:cd:2b:c8:01:47:12:e0:f4:69:57:c0:a0:23:c9:9f: f2:6d:a1:8b:48:fb:e7:d6:2e:5f:eb:d2:8b:6d:00:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1e:48:0b:3c:49:73:75:4d:6d:51:3c:f4:cb:06:a4:0e: da:cb:64:55:50:ba:02:3d:da:1c:93:7c:1b:f1:72:45: 49:1b:ab:04:8b:55:23:c3:96:5c:c7:d9:05:76:d4:87: a2:32:42:55:9b:b6:52:6e:d8:32:e5:82:4d:65:30:31: 04:ba:de:c7:12:86:04:98:93:62:a3:eb:cf:4d:ea:e7: 25:2c:66:ca:ac:68:32:ba:d8:97:a6:0c:69:5b:78:f8: 9e:bb:ad:c7:0f:4a:9c:16:8f:88:1c:b6:63:a5:cc:80: e1:32:25:27:5a:69:b5:43:82:5d:83:83:75:36:05:54: 6a:e6:0c:9e:ac:ee:66:32:0d:22:1a:ab:27:67:6d:69: fa:30:30:00:6e:df:6d:29:0b:c3:c6:f2:28:25:f3:70: f1:7d:25:05:0f:eb:aa:03:f6:46:ec:c7:77:f6:84:bc: 62:0d:77:58:82:ed:25:c9:9c:21:f7:05:41:23:1d:ab: 8d:9f:56:1d:22:90:2d:93:27:be:a8:5b:c4:0c:f5:06: 8d:f3:9c:75:4f:c8:c8:18:10:62:b4:f9:ad:84:0a:5b: 1f:ae:ba:5a:e1:fd:11:7f:cf:d1:ac:9e:48:cf:62:3b: 5f:da:a2:2a:c2:d4:9a:17:41:3e:17:fa:b0:d6:09:4d Fingerprint (SHA-256): F4:3A:A3:16:28:AF:A4:72:3F:95:18:92:F8:E8:D7:7E:B3:C9:F9:B1:3F:4C:3C:C8:FF:60:57:1E:74:61:2B:CA Fingerprint (SHA1): 20:37:2B:82:CE:D5:1D:E0:9C:E1:30:E3:CC:48:EA:DB:EC:FB:B8:45 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #292: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:3e:c5 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Wed May 10 11:42:06 2017 Not After : Thu Aug 10 11:42:06 2017 Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:9d:10:39:56:8d:29:d4:ca:f5:b5:df:1d:ae:dd:94: 55:b6:47:36:b0:3c:2e:2a:b5:87:96:dc:4d:e5:57:0f: eb:25:ff:84:f8:f5:19:a8:93:68:a8:16:7c:35:47:86: e1:71:09:09:c9:ae:59:72:c9:74:3f:9e:84:38:4a:b4: 42:64:f5:cb:e5:ce:ee:69:40:64:00:bd:b8:69:27:00: 50:a5:3c:12:d2:77:e7:cf:e2:51:a2:ba:77:93:40:4d: 5d:89:ba:56:bd:5b:d8:6d:98:4a:8f:9f:0b:98:8c:39: 55:2a:65:d1:fe:50:38:41:41:b6:85:21:d3:8f:30:2b: d1:24:9e:72:f9:dc:62:7a:b1:1e:27:46:9d:9a:e2:83: 7e:b8:14:22:b3:a5:c9:b0:78:b3:c5:4e:79:90:33:09: b0:90:f1:18:1e:2d:d5:9a:2f:92:1a:d6:68:e3:e8:62: 9a:6e:b4:e8:2f:60:fc:ad:5c:70:72:61:54:97:18:a6: eb:2a:c2:c0:d8:da:3b:5f:fa:a1:9a:be:ca:cc:7d:e7: 2a:a7:0a:b5:22:8e:bb:ce:6f:c1:b2:08:fe:c8:04:9f: d8:99:b6:ff:ea:6a:76:07:d5:9e:13:d7:7c:c8:18:0f: ab:7b:d5:ff:83:01:11:ee:c0:3e:d2:d8:0d:f4:9f:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:76:38:d2:5f:27:97:ce:d4:f8:58:ff:43:2d:dd:0f: 7d:32:cc:34:f0:8e:6a:0c:6c:fe:8d:f7:c1:e0:75:32: 11:b2:58:6d:72:d7:2f:6a:2a:d1:98:38:18:60:13:9c: f2:06:2b:b1:35:34:f8:86:8b:f6:f0:1d:a2:16:4b:4a: 88:ca:e4:e0:84:d8:56:7c:12:28:3d:89:b3:e6:0e:b7: 19:17:1b:30:a1:29:13:54:3f:b0:46:6b:00:8d:20:0b: 31:e2:52:33:48:4c:fc:f4:f6:dc:c6:cd:09:28:9b:a7: 1f:5f:29:e7:85:cc:29:27:6b:d7:a4:2f:5f:f6:91:f7: 3d:c1:3b:87:b1:fe:a2:8e:48:e0:03:be:00:36:d9:10: c4:d1:53:12:40:82:41:41:6a:b8:c2:16:fa:52:b3:c1: 07:0c:ac:f3:cc:46:ff:da:07:a6:ac:80:7a:51:64:83: 4e:ee:65:1e:ba:ed:14:93:d9:bb:84:af:23:23:fe:8c: 37:24:ed:02:a4:a9:09:8a:2a:c0:0c:53:a5:2f:92:17: 92:35:89:58:c5:84:0a:68:d0:8b:5f:49:5f:bb:91:62: bf:0e:1f:d8:1e:28:ea:c9:e4:b0:9d:a4:40:9b:3d:44: a5:c0:e4:02:de:ad:5d:b0:3f:39:4a:7c:9c:4f:5a:32 Fingerprint (SHA-256): F2:04:C0:8E:AB:47:90:B9:B4:AF:CF:39:0B:67:43:DB:2E:DD:DC:D3:7F:2C:69:63:0A:52:C2:EC:95:62:B5:35 Fingerprint (SHA1): D0:81:1A:84:FE:BC:0F:55:C1:F5:9C:A0:6B:10:93:14:0C:D0:9E:0B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #293: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:3e:c7 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Wed May 10 11:42:07 2017 Not After : Thu Aug 10 11:42:07 2017 Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:61:e3:01:a1:8f:6d:75:8f:7c:0a:42:4c:af:12:a9: 75:bf:a8:65:a1:c1:6a:63:73:88:8b:af:07:67:2d:09: 69:31:dc:e4:8a:1b:b3:bc:e0:e0:01:14:8a:f0:8a:85: 52:9c:24:c2:99:96:1f:89:7f:e5:36:81:7a:12:ea:f8: d9:d6:dc:be:b5:bc:33:e4:5a:68:ed:c3:f7:3a:86:63: 04:72:96:66:b7:98:09:76:2b:4e:dd:e4:02:26:6b:9a: fd:25:af:4d:f3:c7:19:e3:c5:20:f6:8f:06:a4:23:df: ad:56:a2:79:5d:47:d5:48:75:51:60:0d:22:b7:45:ff: ef:ac:81:11:da:22:df:ed:5d:58:62:e6:3e:11:cf:a8: ba:70:dc:8a:1f:75:22:14:70:c7:af:62:a3:0e:97:2e: 84:88:79:75:2a:38:4a:25:88:2b:ee:57:3e:3d:c6:ec: 73:7b:7f:5b:e4:2b:86:ac:25:b0:e3:e4:5a:ef:70:3f: 92:82:21:71:75:9c:84:98:c1:a9:99:13:94:58:38:77: dd:f5:b1:c9:f9:68:a7:3f:f4:c9:03:55:06:9c:07:7d: a9:a5:00:8e:5c:74:75:de:13:1b:a9:c9:7d:10:4f:b8: 45:f0:a6:0c:82:8b:51:e8:3e:55:d6:33:fa:f4:51:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:46:82:b0:63:77:5d:25:72:d0:41:6c:7e:43:e7:11: cc:20:52:c3:ab:03:c7:6f:f9:2e:f3:7d:f9:be:f3:78: bd:cc:f6:00:a3:2a:9a:56:d7:fe:b3:19:de:24:14:c4: a3:19:16:05:0b:e2:0e:c0:78:6b:2a:cc:2f:fd:1d:a4: fe:63:59:94:84:e0:f9:fa:fa:f7:33:e2:15:c9:02:7a: c3:89:f0:d6:03:1d:be:56:40:f5:3e:0e:ac:44:b6:97: 01:2f:3f:83:d5:99:65:a1:10:bb:af:5c:a4:43:cb:97: bf:1f:2e:24:06:83:87:1d:92:b4:4d:65:96:95:b3:80: 26:0e:a3:10:09:1c:6e:28:9c:8f:00:b4:ce:f7:64:68: 61:73:55:de:df:7d:ce:f4:46:c1:33:54:a0:53:cd:8f: 27:99:33:9d:2c:d2:c7:59:8e:32:e0:78:ff:0f:18:41: 6b:8c:6e:31:f6:12:52:56:cb:5d:c7:cc:84:50:a9:55: f9:89:4d:17:61:e9:58:d4:9e:71:39:07:24:2a:9e:63: 0c:f5:6c:fc:55:e1:f4:97:2b:38:35:15:d6:64:ec:bd: 56:ac:68:6d:a2:e1:ef:6c:5e:3f:54:e3:82:6f:c1:6d: 48:32:36:ce:0c:07:af:a6:2d:4a:8d:69:27:30:0c:87 Fingerprint (SHA-256): EA:A9:7E:14:C2:B6:25:D7:D3:F0:B0:FC:DE:CB:57:0F:DA:05:69:E7:56:0E:C1:AB:80:C1:D1:60:85:FF:46:49 Fingerprint (SHA1): 16:46:2C:CF:29:C5:75:67:E8:8C:97:50:05:C2:9F:C4:EE:D1:06:A4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #294: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:3e:c8 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Wed May 10 11:42:08 2017 Not After : Thu Aug 10 11:42:08 2017 Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:9a:3b:b4:c1:6a:35:7c:1a:38:29:6d:7a:a8:db:25: 57:1e:52:98:30:80:dd:6a:32:03:1b:c8:c8:8d:2a:c0: a4:d4:3b:79:2b:9b:f4:a0:d2:f3:ff:7a:28:b3:49:80: 9b:b1:f0:3c:84:96:c8:d6:a5:06:a6:d1:29:4a:b0:c1: 47:06:93:91:30:2b:81:05:27:fb:2b:92:56:20:24:f2: 7c:e6:b4:ff:51:77:c8:81:b5:cf:2c:1a:75:b8:ed:73: d8:4e:ce:cf:f4:4f:89:eb:6c:6f:85:60:42:3e:ca:b0: 1a:cf:e2:97:2c:0f:f7:33:d7:be:5a:ad:9b:dc:af:2c: 32:71:7f:c2:ab:f6:23:12:65:d3:64:d5:c9:82:da:aa: ae:29:bc:e9:ad:15:cc:42:a3:8d:41:62:68:83:ab:84: 0c:d0:20:57:b9:20:8d:d0:9c:1a:9a:7c:51:37:79:1e: da:da:9c:55:59:48:47:2d:21:02:07:c6:d8:5d:eb:11: f6:64:c1:3b:ff:32:8e:cc:cd:83:f0:54:ef:56:4f:a3: 70:25:71:91:54:bb:65:9a:96:34:85:bc:f2:2c:82:12: 00:b7:41:dc:1a:71:73:71:6b:92:de:08:4b:cb:83:ff: 21:59:a2:64:aa:5c:91:31:e0:02:1a:99:a8:f1:a2:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:94:3d:c5:2c:17:48:7d:ff:13:8c:d1:7a:65:f3:39: 6c:f9:d8:08:1c:44:cf:bd:a9:95:96:85:06:5d:35:ac: 84:95:9c:ae:c8:02:42:36:ab:c8:6a:d6:b4:8a:43:bf: e9:65:0a:af:1d:c3:38:04:74:53:7f:95:ae:09:2a:0d: a6:7f:45:e2:c9:06:df:ed:16:60:e0:07:0f:eb:04:07: 6b:ea:2c:1c:30:5c:bb:18:37:07:60:30:f7:da:d2:d1: f1:05:50:fd:ee:5d:12:c7:03:b6:c6:54:de:11:cd:44: 3d:82:ad:a1:3a:97:d1:2e:41:e8:46:51:5a:83:b5:0b: 92:27:78:fb:7c:d1:1b:04:3e:a9:92:0a:0f:58:b2:35: f3:ef:6d:10:a3:81:3f:05:78:d8:0e:9f:b0:d2:00:f2: d9:b1:38:b5:89:09:f5:9e:e1:24:4d:19:b5:16:5d:1c: 5c:7e:19:9f:2a:56:56:0e:c5:73:4f:85:bd:33:31:43: 40:92:ed:91:76:51:d0:e4:a9:02:22:9e:f0:b3:a6:3e: fc:0d:7a:0e:6a:e9:ec:9b:dc:0c:c2:b1:05:7b:e5:47: e5:8a:af:46:46:6b:4e:99:19:a3:08:c9:96:29:d9:17: 47:6c:4a:b6:86:a5:c5:61:b8:fc:51:8b:58:86:df:21 Fingerprint (SHA-256): 71:6B:5C:BB:AC:EB:DD:53:A4:D3:AD:66:20:D0:0E:74:E1:A6:E5:BC:63:D9:38:7C:96:33:E7:06:99:87:D1:14 Fingerprint (SHA1): 76:5D:56:E7:92:39:67:CB:99:CC:82:93:EB:FC:36:E4:A1:4B:5F:3A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #295: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:3e:cc Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Wed May 10 11:42:11 2017 Not After : Thu Aug 10 11:42:11 2017 Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:2b:00:a7:a4:7f:e1:18:2a:23:55:0b:a4:f2:88:ae: 04:b6:f1:a5:17:84:d7:09:21:4f:45:89:65:a5:67:84: c2:4b:42:cd:ac:fd:d2:67:6c:6f:6d:81:0c:19:5d:61: 6b:88:89:29:d2:30:ff:1c:49:eb:5b:90:6d:29:5a:2d: bb:a6:fe:99:34:4c:d6:77:4b:05:78:8f:91:89:cc:4e: e1:bd:72:56:b2:08:63:a5:4b:f7:39:16:89:18:2b:0d: ab:29:0c:3c:a4:5e:c1:4f:c4:e7:d6:47:7a:39:e1:82: 7f:98:17:7a:b8:ee:fb:32:3e:1c:5e:19:af:48:fe:8f: d5:e6:e4:5a:58:18:7a:60:d1:e7:ab:63:01:1d:32:b1: ba:39:03:05:ec:6d:0e:30:86:17:ad:d2:ed:22:e6:3d: e1:51:43:89:c6:5c:38:55:5a:32:99:78:a5:62:5a:28: a1:c6:1d:73:08:36:3a:b4:88:03:8b:03:d3:c2:9a:c7: c0:f1:e2:ff:11:10:62:79:64:f2:84:b8:ed:50:31:94: 19:5b:6b:89:6b:d2:c8:d9:ca:97:fa:3b:f3:da:41:c4: d6:e8:36:b8:39:45:87:82:d4:16:d2:0b:3b:2d:ca:04: 39:5c:ca:40:95:5a:66:f4:ae:5e:61:35:a9:45:cb:47 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 01:b8:67:7f:0c:2f:cf:e6:9e:ee:fd:d3:4f:a7:03:fc: 65:6d:93:da:bf:e8:f3:80:2c:1c:d2:1d:4b:2d:8e:d9: b3:c4:b6:ec:8d:5b:70:51:99:4b:7f:2f:79:ed:2b:7a: 7f:d6:b1:0c:18:90:af:cc:0d:4d:88:a8:36:18:85:83: 19:7a:8c:aa:4f:b1:49:17:e7:77:6e:17:f2:db:47:8a: fb:bf:39:5f:cf:9e:48:2f:67:2a:2a:4c:e8:14:f0:14: 80:fd:15:99:4a:a4:c8:13:3a:4e:1e:17:29:db:fb:99: 91:58:f2:06:91:d4:fa:a6:87:4a:e9:9a:2a:89:ad:1f: 60:ab:dc:2a:87:14:13:20:50:03:92:13:63:99:74:22: f4:7d:4f:97:c1:cd:e9:99:42:b2:24:05:14:37:44:25: d4:fa:57:1f:e2:bc:b7:1c:66:c7:bb:7a:99:04:95:ca: 4f:af:12:56:c8:52:db:dc:af:72:db:74:ff:e1:b6:37: 9f:34:28:7c:12:9b:47:ab:ea:3b:56:1e:4e:c0:12:7d: c4:ea:45:3c:1b:e5:58:cc:f7:17:fd:98:b2:f1:18:ad: ca:ea:72:ae:5d:01:a4:05:48:00:51:48:13:69:c6:f1: a1:69:61:be:6b:ba:50:f6:c5:6c:b8:81:95:06:c0:cb Fingerprint (SHA-256): B7:4C:F3:6C:9A:91:4F:29:48:4F:49:2B:C5:FA:93:A4:0B:59:42:05:C7:22:25:4F:0B:87:3C:DD:EC:7E:91:E2 Fingerprint (SHA1): 92:AA:1B:0C:37:58:48:28:AD:D7:E5:35:E6:A8:BC:83:99:30:E1:28 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #296: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:3e:cf Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Wed May 10 11:42:12 2017 Not After : Thu Aug 10 11:42:12 2017 Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:ee:90:91:7b:67:e9:20:26:db:d6:b5:65:a0:f9:a1: 63:70:3f:9d:a2:d4:68:2b:ae:88:45:28:57:c1:39:66: 0d:dc:33:cf:6b:d0:2a:55:86:cd:06:f2:3e:31:3c:23: ce:4a:f6:b3:26:da:f5:bc:33:6c:d7:e1:57:d6:bc:af: f8:27:c9:b8:3d:f1:ce:1b:3e:77:67:48:ec:6e:f7:9b: 0e:36:48:a4:ce:4c:9e:2c:9e:d2:9c:b5:0c:b7:75:69: c5:5e:3f:1d:bd:5b:b2:e7:dc:81:be:b7:f7:a7:e1:44: 5f:9e:9c:ee:f5:05:4a:d0:69:2d:53:77:d8:1d:ee:db: e9:8a:d7:0c:02:47:91:b1:b7:0b:7d:8d:53:20:ff:e1: 86:3e:ee:bc:2f:8f:69:94:d5:48:e6:ec:fd:f8:63:3d: 7b:73:e0:2f:78:1d:db:f4:12:b6:e0:6d:9c:14:50:0d: bc:8e:b6:c6:79:ad:2a:6e:69:80:54:00:be:ff:0c:86: 9b:eb:a5:67:9c:4c:16:ec:d9:64:5f:0a:1a:60:32:19: c7:85:b9:fc:d9:1c:ca:3f:52:96:3f:26:31:4d:1c:a5: 86:28:f9:91:8a:8e:f5:ad:4b:e2:e5:29:2e:9d:ba:5b: 72:e3:7c:70:08:31:eb:cd:8b:cf:22:f3:ca:23:15:0d Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:51:92:28:cf:80:c4:2d:73:89:90:87:5f:51:86:f7: 0b:dd:d6:10:25:1a:b9:bc:6b:44:e6:53:80:18:15:89: b9:76:c6:e3:ea:f7:ad:81:f6:50:46:16:f7:33:cb:e3: 53:b5:a5:dd:90:d5:44:e5:99:08:5e:1e:3e:82:2f:3e: 8f:99:69:60:03:fe:89:ec:0a:e7:59:95:d3:64:9a:a8: 7e:59:ec:04:35:35:1b:bf:d7:bf:4d:fb:f1:44:ec:2a: 4b:18:44:16:b6:8c:4f:58:10:04:ca:56:7c:60:7c:a8: f0:e4:d5:c1:04:1d:7f:da:7b:6e:4d:c5:5c:65:8b:bd: 76:01:2f:c0:d1:47:dd:d3:a2:ca:3e:3d:de:91:ac:2a: 39:a2:6e:0a:96:aa:3f:0b:73:39:c4:42:3d:1a:7b:aa: ca:8b:eb:17:ae:15:db:63:5c:9b:c4:8a:52:4a:9b:e0: a9:49:10:8d:40:86:21:7d:84:e7:f4:57:0f:24:c7:e8: 6a:b5:0b:dd:8c:c5:70:f8:d3:c8:de:e4:3a:ea:7e:75: f1:ec:8a:88:95:de:e7:df:de:c8:04:5d:5e:37:da:48: d8:94:81:43:bf:c9:48:8f:da:f5:c5:af:45:e7:1a:c1: 79:99:63:69:a8:02:64:76:92:3d:8c:43:04:86:53:1c Fingerprint (SHA-256): 04:0F:FF:7F:5C:FD:9E:32:35:6D:AF:AE:73:9E:FF:54:86:E5:F7:09:EC:6A:9B:04:CD:DB:44:EE:BD:B9:81:88 Fingerprint (SHA1): 67:92:65:87:62:12:8F:AE:40:9D:3C:F5:11:B6:9A:91:A8:B4:15:B3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #297: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:3e:d2 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Wed May 10 11:42:13 2017 Not After : Thu Aug 10 11:42:13 2017 Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:5d:3b:04:cc:16:2f:03:01:76:ad:36:6c:60:1f:85: fa:52:fa:0e:87:8a:e3:ab:8c:47:e3:44:4c:fd:d7:5d: d8:85:38:a6:9b:7b:0b:f6:a8:59:3f:49:f1:7e:43:a2: 1d:99:83:b7:36:d9:b3:1f:e3:e1:0b:2a:b5:6d:92:ef: e6:d5:2b:62:10:41:a6:a4:96:1e:03:74:6e:c0:77:f8: d7:4b:a9:ac:86:95:ab:60:95:bc:3c:5a:23:26:98:d0: 42:4b:3a:0c:e2:3c:1a:ff:8b:70:e8:52:e8:48:47:95: 7f:dc:0e:c8:fc:c8:51:cf:29:8c:61:4a:c6:b6:2d:91: a0:40:4a:de:41:e7:12:50:de:1e:b2:9e:49:43:ac:d1: a9:88:bb:fc:78:d1:39:bb:5d:d8:77:91:b6:20:b1:84: 64:17:7d:89:61:c0:94:84:08:80:79:32:d4:17:47:27: 42:a2:bb:a8:7a:e6:b3:10:45:83:8d:f3:ed:1d:3d:f6: 9e:67:df:4a:16:ea:1a:13:40:67:c3:79:1e:56:4c:04: 53:12:6b:f9:fd:e9:fb:db:29:1d:d7:70:5c:8c:01:72: 67:ad:bd:35:66:6f:01:f7:2f:44:c8:b2:20:59:f7:51: dd:d0:4c:c5:9c:27:88:48:5b:0f:aa:cb:e7:7a:dc:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:4e:e4:a2:ef:22:5e:a7:2f:f5:83:f7:62:7b:69:3a: 58:39:c2:0d:6e:ce:dd:b1:99:0c:2f:2f:54:71:aa:8b: 1d:1d:1f:b3:bf:99:37:31:58:32:5a:c2:8b:91:11:38: af:9e:e4:79:c8:60:1d:84:91:9a:d2:5c:39:aa:8e:8d: 89:a8:44:35:20:d5:05:5d:ac:7e:72:01:f3:5b:01:e4: 08:0c:d3:13:64:10:6f:57:91:8a:3d:54:1a:bf:dc:cc: 48:d3:2c:4d:86:22:b8:9e:18:93:89:4e:a9:1f:af:b8: e7:00:8b:ec:cf:34:df:25:2f:ae:eb:c9:eb:25:c4:23: 9e:fd:d8:ca:1d:38:20:8c:98:f9:5d:7e:f1:72:af:2e: 7a:9d:08:12:2d:7f:9a:d7:39:62:d1:d8:bd:1e:60:b7: 84:c2:9a:c5:19:16:7e:f5:c8:95:4f:8d:d0:04:f7:4e: 44:38:87:41:03:1e:41:69:44:d9:1d:e4:36:06:14:0b: 0a:6b:66:ca:97:bc:ae:41:fa:58:80:19:f6:87:2c:e9: 75:eb:dd:60:4a:41:4c:2f:92:a4:0a:79:20:c3:4d:3c: 02:4c:f6:bd:19:fa:26:26:0c:02:85:d2:b8:3b:ab:06: b5:66:6f:eb:84:66:d9:33:a1:a2:b2:78:c7:f5:b9:29 Fingerprint (SHA-256): 5A:8A:8D:33:A3:81:C1:6D:10:82:6E:01:5A:64:7F:B3:F8:9A:B8:07:4E:18:F1:4E:76:82:7E:8B:92:19:29:2C Fingerprint (SHA1): ED:FE:99:C9:40:09:CC:DE:25:0B:F5:E9:8B:DC:5A:21:8F:89:C6:14 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #298: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:3e:d4 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed May 10 11:42:15 2017 Not After : Thu Aug 10 11:42:15 2017 Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:03:6e:96:0a:d1:03:c1:a9:e1:2f:53:ef:1b:6b:32: 71:10:10:63:2e:3e:bc:46:fd:4a:96:5b:e7:0a:c2:98: a6:fa:2f:c4:e2:f4:8c:f0:e9:fc:c7:26:38:bc:ce:26: ed:49:ef:64:d6:41:95:78:2a:3e:59:dc:80:2e:09:0c: b9:e9:03:ad:7e:d1:23:ee:94:6b:78:c0:16:d0:9d:19: fc:ff:c1:bd:70:13:33:f4:c5:b5:78:02:b1:00:5c:bb: f0:ef:52:1f:6e:98:30:ef:55:1f:be:be:56:2c:0a:a3: a4:c8:9b:62:d1:47:ac:be:ab:e3:38:aa:40:f0:90:ce: 43:bd:65:4f:8c:a2:52:1a:90:f9:7c:1a:c3:b6:bb:7f: b5:b2:c2:38:ae:31:c7:16:fa:4b:d2:2d:51:e3:cb:d0: af:e1:9b:b1:45:11:87:25:2d:92:09:17:1c:98:db:8f: e9:59:4c:6e:10:e4:d6:46:d0:95:aa:f3:a9:44:0b:77: a6:20:d4:5c:af:10:36:bf:d1:c9:1b:e3:d7:7a:89:22: 04:fd:4b:42:35:7e:db:4c:1f:77:0a:1e:11:28:4b:ad: f3:92:29:25:f7:4c:b1:d2:47:c5:68:1d:be:c1:09:0b: e4:74:3f:3b:e2:07:1a:2b:55:e8:b5:0c:31:0a:e0:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:a4:dd:8e:66:6e:72:fe:27:83:69:7a:b6:c8:f1:34: 43:20:44:4d:97:9d:3e:2b:22:7f:d0:04:13:24:99:ae: 3e:4e:c1:b1:23:9b:a0:cf:ad:eb:21:a3:ba:95:92:2a: 7a:c7:16:e9:3e:09:d2:7d:d6:02:84:1a:5e:07:91:a2: 04:cc:dd:8a:07:fa:9d:f0:fb:72:e2:bb:3d:cc:6c:0e: d9:68:9f:12:ab:3d:d0:4d:4b:2f:3e:7b:0c:0d:51:be: c3:75:34:68:45:9f:1b:6e:24:69:f5:0e:ff:8e:44:5f: e6:2a:a1:1c:93:3e:f2:58:5f:50:61:fa:6f:86:02:1c: 72:93:92:5f:f8:5d:9a:5a:2f:6e:33:30:ec:08:a5:19: d0:d0:e2:80:38:14:e3:9f:ed:38:fe:12:2f:5f:cd:b8: 75:22:f1:7b:9d:67:4c:4f:d0:cd:f6:00:7d:e4:c4:59: 2a:b6:87:e5:d2:20:ac:6f:94:d3:37:7a:35:7f:0d:6f: a7:18:2a:3f:00:f1:0b:c9:c0:0c:96:be:24:3f:2d:f8: e2:12:13:bf:ac:82:cb:b5:64:9a:9c:b9:0f:f0:a9:a6: 3a:0f:2c:37:3b:44:7c:64:c1:b9:c5:dd:49:8d:cb:d6: 85:0d:81:0a:11:fe:6e:c4:09:03:e4:fe:0c:4d:ee:bd Fingerprint (SHA-256): 40:53:DC:8B:26:2C:19:F8:7F:C4:6F:35:23:12:D4:A3:63:87:E2:91:45:F1:D5:45:FF:0C:EB:67:F8:CB:A1:82 Fingerprint (SHA1): 0B:E4:D8:87:43:50:F1:D1:39:84:57:8C:6E:6B:B8:60:CD:55:FF:FC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #299: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:3e:d9 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed May 10 11:42:17 2017 Not After : Thu Aug 10 11:42:17 2017 Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:4f:99:c6:16:73:44:dd:24:f8:03:2f:a2:14:c7:9e: 2f:7d:7a:8a:6c:0e:c0:3c:1c:46:7f:f6:88:23:e1:ff: 00:82:35:2a:96:d7:e7:6a:e1:a4:ce:05:44:49:8c:7f: 41:0e:b7:f0:a2:3b:87:2d:e3:ab:8c:31:6c:20:30:55: 75:49:ab:d5:76:fb:0f:73:61:22:a4:53:02:8d:c4:b1: 04:4f:95:bf:30:50:84:d1:b2:f5:3e:60:4d:17:26:e9: 8a:04:60:b4:17:d6:77:e3:de:c8:2e:06:e8:d6:c4:0d: 20:36:5c:8c:cc:36:ce:39:f8:ec:b2:c0:c9:2b:7f:10: 38:98:47:8b:d8:37:f4:aa:23:d1:20:aa:a3:66:82:3d: 7b:da:fe:6a:1b:d5:46:2a:6d:82:cc:98:b9:6a:40:d6: 5a:aa:99:47:dd:04:a9:0f:37:02:b2:71:89:ff:97:41: b1:05:0b:d4:0a:70:47:7c:d5:92:e0:4c:2b:60:42:af: de:21:6c:06:45:95:60:89:dc:0a:4d:64:7e:c1:3d:df: eb:80:b8:e2:00:ea:82:a2:6f:2c:ec:00:9f:fa:32:d3: bd:69:ce:e2:31:f9:87:5f:cd:7b:4e:12:fb:f8:83:6f: c3:ee:ee:87:7f:f3:fe:7f:39:47:7f:4c:d7:52:64:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:e2:3c:af:1e:cb:b1:f4:1b:8a:47:c2:e6:e3:22:dc: f8:49:f8:c7:29:fa:0e:ce:0e:30:77:8c:e5:c5:eb:82: c8:fb:22:18:27:48:a2:d0:a1:4d:1e:83:1b:e9:55:0b: 61:bb:07:9d:3f:8c:a5:56:12:5e:0e:d9:e7:74:d2:5c: dd:68:0c:12:d2:6b:c7:86:41:b2:95:4b:ee:a0:37:36: 4c:7f:af:d0:e0:d2:fb:5b:6b:db:9f:aa:58:54:88:a4: 48:d1:fc:06:13:c6:dc:eb:45:1f:e1:d1:5a:42:41:77: 77:93:1f:c5:0d:12:25:57:dd:a7:b0:30:e9:19:18:bd: be:ae:20:30:70:4c:07:22:9d:dd:53:78:73:f1:ec:45: 85:4a:a6:4e:c2:e1:20:56:b9:29:12:98:5c:48:05:6e: e3:a1:90:d7:45:e7:fb:71:78:b5:e9:d2:be:01:89:64: eb:fb:bd:54:fa:ae:f0:01:2c:1e:f4:82:c8:1c:67:d9: 0b:6a:9b:61:31:c6:4b:de:01:81:cd:75:73:28:80:02: 22:06:99:16:57:3a:d0:0d:3f:19:e8:67:99:63:9f:03: f7:28:7c:e9:a9:1a:95:3a:20:47:60:45:01:88:c5:31: fd:c2:97:8d:e7:56:4e:a1:29:34:bb:87:c3:3e:d5:16 Fingerprint (SHA-256): 8C:30:39:83:EE:76:FA:60:81:76:F4:B6:D1:77:FC:24:BE:02:83:B3:45:90:8F:29:16:71:26:5A:27:2C:D0:16 Fingerprint (SHA1): 56:7C:8A:43:98:23:12:E8:69:98:83:C2:25:14:D2:CC:7E:8B:80:94 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #300: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #301: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #302: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #303: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:3e:e4 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Wed May 10 11:42:22 2017 Not After : Thu Aug 10 11:42:22 2017 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:41:ec:ce:86:73:1c:c6:44:a5:d2:bf:4c:1f:06:cf: 28:18:1d:2e:c8:52:8a:bc:bc:e6:ca:11:0c:9d:db:b7: 73:50:9a:90:64:8f:be:3f:e9:d7:bb:3d:d5:2a:6f:92: 1d:68:7e:52:25:2e:94:25:da:1a:06:19:f3:ec:87:e0: 34:3c:bf:d5:0f:f2:c1:5d:39:16:c2:e8:89:78:24:41: 67:49:36:0b:ca:9e:1c:36:df:02:44:a9:4c:a7:8f:2c: 34:b7:eb:fa:47:ea:4c:54:da:f0:57:f9:4b:db:d6:40: 15:c3:b9:1f:4c:fe:3e:e5:88:94:72:cd:fd:47:23:6f: 8b:dc:07:c1:cf:d7:b4:70:3a:91:ae:8a:4b:3c:d3:f8: b8:5b:a1:40:34:f8:56:61:72:fa:ff:e8:fd:bf:ed:a1: 32:58:75:25:bf:ac:94:13:a9:dc:93:7c:1b:17:9d:6e: 12:10:41:f2:3d:9d:f0:eb:5d:23:a9:43:96:3c:e5:d4: 75:c9:dc:5c:46:fc:e6:06:90:63:58:b2:14:da:78:61: af:33:d3:ab:33:b9:eb:88:56:92:69:24:ed:9e:14:ce: 6d:90:1d:61:99:a8:07:e6:93:ba:c2:d8:48:3e:48:47: 57:ca:cd:a1:64:5d:ba:b9:ff:97:5d:c6:45:ad:86:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c2:d1:3b:ed:8a:44:18:f5:89:8b:03:e7:a9:a1:a5:0a: 76:de:ee:2c:c0:47:92:1c:d0:c7:34:d1:f6:7a:8a:b2: e9:f6:70:36:23:96:b1:85:46:f7:df:d7:33:16:2f:b5: 7b:f4:bf:a1:7b:a3:da:af:d4:23:c6:58:31:6f:77:d4: e5:d8:87:7a:b6:5b:ea:e0:a5:d5:a0:d8:b5:60:63:b5: 77:1c:51:2b:c3:58:f2:05:ad:96:6e:d0:21:d7:1a:ac: 7b:21:5a:d0:7b:46:f4:34:51:98:3b:b3:66:00:7c:36: 6b:d9:9e:0e:a7:b2:29:d6:ef:fd:97:32:d9:b3:70:ee: 46:4a:16:65:aa:c2:eb:54:11:68:01:33:a9:0c:00:8a: f2:3b:d4:a9:5f:46:c8:6b:39:ee:3b:d3:90:51:b2:d6: a2:f4:7d:a2:be:95:b0:6d:56:04:08:2c:ce:45:26:c9: 9b:96:97:32:05:13:40:50:1e:48:fb:21:1a:bd:ab:d1: 32:48:f9:b9:86:63:87:d3:a2:21:fb:aa:8c:bd:34:3c: b2:d1:96:3c:49:f6:6c:f8:c2:e1:b8:a6:c0:2a:64:72: 00:1d:94:ea:b5:13:50:34:23:b0:e0:8e:43:4b:b0:25: 50:ff:0e:fa:d5:68:77:a6:ac:d1:97:1f:c9:36:c2:44 Fingerprint (SHA-256): 41:71:87:F7:A1:7B:65:9C:87:3C:24:CB:9C:3E:F4:5B:55:79:2D:0B:E4:72:19:E4:46:A0:54:37:BE:C1:94:EE Fingerprint (SHA1): 96:10:D1:1D:5C:A9:15:38:16:94:99:47:95:5F:A5:EA:33:CB:43:0B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #304: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/sanext.der cert.sh: #305: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #306: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #307: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #308: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #309: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #310: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #311: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:3e:ec Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Wed May 10 11:42:26 2017 Not After : Thu Aug 10 11:42:26 2017 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:5b:0b:d5:3a:d7:81:83:07:0a:df:e3:6c:c4:5d:aa: 0e:c6:9b:3b:95:e2:63:f1:f4:fd:8f:eb:46:92:70:ca: a4:1c:1d:98:cf:2c:d5:ba:1b:38:cf:dd:53:7f:62:dd: a1:01:60:92:78:7b:33:93:a3:0c:00:f7:ea:fc:51:6a: db:68:5e:74:98:a5:4b:00:66:a5:7e:d2:60:1a:f2:54: d7:9c:de:ae:00:43:0f:ac:07:61:c9:a1:84:c4:79:25: 20:26:d6:98:ab:cc:34:94:66:41:27:1c:eb:dd:a1:c2: 0f:0b:22:c0:bd:56:7c:00:cc:06:88:41:77:d4:2e:3c: 91:9d:f6:72:2f:df:98:24:ea:8f:17:ba:51:4e:85:45: 39:22:38:e8:99:b2:4d:a3:94:a8:e8:ae:87:4e:02:fb: 4c:f5:64:9e:31:4d:9e:5e:eb:8d:96:de:66:5e:db:be: 5b:9a:c9:b5:2d:af:9f:e7:64:ad:5e:f4:ae:3c:a9:78: 19:77:98:ee:90:81:74:91:b9:ce:84:e6:ee:9a:d2:e8: 16:6d:16:33:9b:63:fc:43:36:36:b4:93:d9:7d:13:8f: a2:5c:0f:64:a5:a9:29:6b:2a:30:01:5a:d9:31:b0:b8: 81:63:cc:f0:43:04:ea:67:d2:6a:b9:2f:07:f6:1f:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:d6:2a:ef:1b:9a:a7:37:ac:c2:60:76:61:04:f8:6e: 2f:e4:00:a2:a3:ec:51:fa:f1:dd:ab:c2:e6:fe:c8:7e: c3:73:30:d6:11:f7:dd:41:98:c2:79:53:8c:d1:24:73: d1:33:a4:53:77:c8:5f:9b:07:b2:f3:5e:b4:a6:b5:90: e0:02:b2:80:32:b8:b7:47:70:7e:9b:86:ca:08:41:fc: 44:d3:ac:80:7a:b8:9b:93:c9:25:a9:1d:10:c3:bd:46: 3e:f7:cd:c8:e5:db:c8:26:11:e4:3c:81:7b:89:c6:f6: 94:98:4b:3b:28:2e:f1:9f:92:a5:2b:4f:b1:41:bc:7a: c3:de:ef:8c:7e:39:d8:7b:11:66:5a:3f:44:72:83:6e: ac:f9:c0:99:c5:58:1c:cc:13:4b:db:5f:1f:a6:61:26: e9:a6:1d:ae:b3:33:65:16:08:a1:f4:f3:a6:62:23:b0: 9f:ce:8c:1d:a7:a5:31:98:2d:ea:db:e4:e9:df:ba:0d: 6a:99:c6:1f:22:73:6b:8c:fe:21:09:b9:10:13:00:bd: 85:6c:1b:40:69:ab:93:45:1c:2b:85:7c:33:64:41:1d: b8:b6:6c:a7:d7:01:d1:a2:34:ae:79:47:a9:09:f6:63: b3:6c:49:bd:9d:9f:9b:6e:9a:7c:1c:95:eb:84:36:31 Fingerprint (SHA-256): 4D:0B:1F:D8:A9:9D:D4:8F:76:FD:80:21:71:04:52:E4:BF:E8:08:52:F2:4B:05:43:48:26:0D:6C:56:1C:90:F4 Fingerprint (SHA1): 18:34:40:D5:9D:07:8E:43:05:F5:FF:90:6E:1D:75:9E:8B:49:DE:43 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #312: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #313: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #314: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/dbpass -f ../tests.pw cert.sh: #315: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #316: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #317: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/dbpass -o root.cert cert.sh: #318: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #319: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #320: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #321: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #322: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #323: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -i ../CA/TestCA.ca.cert cert.sh: #324: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #325: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #326: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #327: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #328: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #329: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #330: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #331: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #332: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #333: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #334: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #335: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #336: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #337: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #338: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #339: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #340: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #341: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #342: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #343: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/CA -o root.cert cert.sh: #344: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #345: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #346: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #347: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #348: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #349: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #350: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #351: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #352: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #353: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #354: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #355: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #356: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #357: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #358: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #359: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #360: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #361: perform selftest - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #362: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #363: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #364: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #365: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #366: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #367: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #368: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #369: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #370: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #371: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #372: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #373: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #374: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #375: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #376: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #377: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #378: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #379: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #380: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #381: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #382: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #383: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #384: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #385: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #386: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #387: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #388: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #389: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #390: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #391: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #392: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #393: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #394: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #395: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #396: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #397: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #398: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #399: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #400: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #401: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #402: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #403: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #404: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #405: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #406: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #407: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #408: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #409: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #410: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #411: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #412: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #413: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #414: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #415: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #416: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #417: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #418: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #419: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #420: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #421: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #422: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #423: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #424: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #425: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #426: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #427: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #428: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #429: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #430: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #431: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #432: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #433: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #434: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #435: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #436: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #437: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #438: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #439: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #440: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #441: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #442: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #443: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #444: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #445: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #446: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #447: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #448: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #449: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #450: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #451: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #452: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #453: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #454: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #455: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #456: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #457: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #458: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #459: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #460: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #461: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #462: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #463: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #464: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #465: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #466: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #467: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #468: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #469: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #470: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #471: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #472: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #473: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #474: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #475: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #476: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #477: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #478: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #479: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #480: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #481: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #482: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #483: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #484: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #485: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #486: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #487: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #488: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #489: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #490: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #491: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #492: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #493: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #494: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #495: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #496: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #497: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #498: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #499: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #500: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #501: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #502: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #503: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #504: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #505: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #506: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #507: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #508: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #509: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #510: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #511: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #512: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #513: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #514: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #515: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #516: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #517: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #518: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #519: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #520: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #521: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #522: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #523: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #524: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #525: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #526: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #527: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #528: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #529: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #530: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #531: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #532: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #533: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #534: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #535: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #536: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #537: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #538: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #539: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #540: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #541: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #542: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #543: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #544: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #545: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #546: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #547: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #548: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #549: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #550: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #551: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #552: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #553: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #554: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #555: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #556: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #557: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #558: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #559: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #560: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #561: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #562: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #563: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #564: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #565: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #566: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #567: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #568: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #569: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #570: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #571: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #572: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #573: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Wed May 10 11:43:20 UTC 2017 Running tests for dbtests TIMESTAMP dbtests BEGIN: Wed May 10 11:43:20 UTC 2017 dbtests.sh: CERT and Key DB Tests =============================== --------------------------------------------------------------- | test opening the database read/write in a nonexisting directory --------------------------------------------------------------- certutil: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #574: Certutil didn't work in a nonexisting dir 255 - PASSED dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #575: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED --------------------------------------------------------------- | test force opening the database in a nonexisting directory --------------------------------------------------------------- dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtests.sh: #576: Dbtest force succeeded in a nonexisting dir 0 - PASSED --------------------------------------------------------------- | test opening the database readonly in an empty directory --------------------------------------------------------------- tstclnt: unable to open cert database: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #577: Tstclnt didn't work in an empty dir 1 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/emptydir database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/emptydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #578: Dbtest readonly didn't work in an empty dir 46 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/emptydir dbtests.sh: #579: Dbtest logout after empty DB Init has key - PASSED dbdir selected is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/emptydir dbtests.sh: #580: Dbtest password DB Init maintains needlogin state - PASSED certutil: could not find certificate named "xxxx": SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #581: Certutil didn't work in an empty dir 255 - PASSED --------------------------------------------------------------- | test force opening the database readonly in a empty directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/emptydir database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/emptydir/key3.db" does not exist. dbtests.sh: #582: Dbtest force readonly succeeded in an empty dir 0 - PASSED --------------------------------------------------------------- | test opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir/secmod.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir/cert8.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir/key3.db" is not writeable. dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #583: Dbtest r/w didn't work in an readonly dir 46 - PASSED certutil: could not find certificate named "TestUser": SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #584: Certutil didn't work in an readonly dir 255 - PASSED --------------------------------------------------------------- | test opening the database ronly in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir/secmod.db database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir/cert8.db database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir/key3.db dbtests.sh: #585: Dbtest readonly succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | test force opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir/secmod.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir/cert8.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir/key3.db" is not writeable. dbtests.sh: #586: Dbtest force succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | ls -l /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir --------------------------------------------------------------- dr-xr-xr-x. 2 mockbuild mockbuild 4096 May 10 11:43 /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir -r--r-----. 1 mockbuild mockbuild 1222 May 10 11:43 /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir/TestUser-dsa.cert -r--r-----. 1 mockbuild mockbuild 1424 May 10 11:43 /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir/TestUser-dsamixed.cert -r--r-----. 1 mockbuild mockbuild 579 May 10 11:43 /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir/TestUser-ec.cert -r--r-----. 1 mockbuild mockbuild 705 May 10 11:43 /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir/TestUser-ecmixed.cert -r--r-----. 1 mockbuild mockbuild 870 May 10 11:43 /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir/TestUser.cert -r--------. 1 mockbuild mockbuild 229376 May 10 11:43 /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir/cert8.db -r--------. 1 mockbuild mockbuild 114688 May 10 11:43 /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir/key3.db -r--r-----. 1 mockbuild mockbuild 393 May 10 11:43 /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir/req -r--------. 1 mockbuild mockbuild 16384 May 10 11:43 /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ronlydir/secmod.db --------------------------------------------------------------- | test creating a new cert with a conflicting nickname --------------------------------------------------------------- /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/conflictdir certutil: could not add certificate to token or database: SEC_ERROR_ADDING_CERT: Error adding certificate to database. dbtests.sh: #587: Nicknane conflict test, could not import conflict nickname 255 - PASSED --------------------------------------------------------------- | test importing an old cert to a conflicting nickname --------------------------------------------------------------- Certificate: Data: Version: 3 (0x2) Serial Number: 40 (0x28) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:51 2017 Not After : Tue May 10 11:41:51 2022 Subject: "CN=Bob,E=Bob@bogus.com,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:bb:a5:2a:b2:3a:a9:cf:a0:38:da:12:15:a2:53:3a: 1f:4b:60:7e:23:c6:2c:5c:93:7f:7b:2b:fc:d1:28:7d: 99:17:2e:5a:06:dc:8d:f4:4e:cc:e2:18:7d:09:07:b5: 76:b0:32:1e:4a:ab:87:f4:3f:d3:e2:f3:c8:fc:0a:80: 70:ab:cd:4b:7e:27:1e:c6:da:d0:03:df:34:c4:5d:d8: 4a:dd:84:36:0b:87:b5:68:1e:b9:82:c6:9f:6a:03:fd: 1a:68:f4:10:73:63:28:f2:69:cf:da:29:9c:29:82:c6: ca:5b:d9:fd:b2:5c:d7:a0:fe:47:f0:7b:62:7f:e2:4f: b3:eb:fd:25:e7:53:09:cd:cb:d2:c3:0e:60:e0:3d:be: 52:93:0c:93:d7:0b:f2:67:b5:ac:df:5f:89:31:11:5c: fb:c9:b0:19:a9:bc:5c:35:28:fa:0e:e1:5a:11:77:1c: c7:79:51:a0:d8:b8:28:db:0b:da:48:d0:d5:38:66:0e: 15:fe:bd:f8:31:67:43:7b:64:a3:18:c4:b4:3f:9b:db: 42:bf:95:d0:b9:ce:ae:27:78:fd:db:53:b9:a3:bb:70: 68:42:e2:ec:6c:0b:01:49:d0:0a:f8:59:38:0a:64:ea: 4d:4c:35:59:d3:33:f0:79:17:a1:01:e3:cf:13:30:0b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:d9:89:26:8b:5c:00:a7:39:fb:0d:ff:44:44:a9:06: 3e:f0:4d:d7:b5:9a:96:de:22:e4:0f:53:35:bc:ca:d5: 39:2b:15:9a:97:ca:ef:45:c8:7a:16:4c:52:da:29:53: 07:55:e8:e4:c0:5f:86:36:92:52:8e:3c:97:0f:7b:c0: 9f:39:e5:aa:0c:bb:df:35:09:f6:75:e8:2d:23:c5:35: 72:f5:46:81:a6:28:9b:3d:0b:c9:6a:b5:16:07:7e:c4: a7:97:43:b5:5a:36:46:52:21:ec:d8:5b:3e:25:d5:13: a8:0b:17:23:82:82:d3:09:b6:b5:85:23:85:04:d7:00: 48:9f:e8:9d:fd:36:7b:91:77:95:31:73:b6:a4:f7:75: 93:f8:88:e9:f0:e7:91:61:c3:96:5e:91:98:9f:90:6e: 31:4f:fe:f0:c5:70:98:76:9f:18:c9:2d:6b:cc:55:6a: 3b:1b:d6:ee:cb:8b:df:df:ff:7d:7c:b5:87:70:36:dd: 95:07:52:e5:fc:28:3a:67:03:20:b7:40:4d:d9:00:57: b2:a6:bc:06:6b:f9:55:30:ca:f7:0c:0e:53:4e:c1:8f: ee:5d:7e:1b:d4:c1:f9:f7:6a:6c:1c:69:48:1e:2a:b4: 10:e7:35:c0:36:4a:d1:d0:f0:98:87:f7:7d:14:54:0a Fingerprint (SHA-256): 05:C4:83:49:FA:C8:79:C9:A8:D2:4D:09:43:4B:A3:43:C7:C6:00:0D:1A:49:C1:14:AA:4F:F3:0D:29:E8:88:DA Fingerprint (SHA1): 04:B7:19:B0:04:13:89:C7:CC:DC:78:6B:E6:4E:92:3E:AB:D5:A4:D1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: dbtests.sh: #588: Nicknane conflict test-setting nickname conflict was correctly rejected - PASSED TIMESTAMP dbtests END: Wed May 10 11:43:21 UTC 2017 Running tests for tools TIMESTAMP tools BEGIN: Wed May 10 11:43:21 UTC 2017 tools.sh: Tools Tests with ECC =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #589: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 77:80:3b:9b:30:95:45:c8:0b:b7:53:3d:09:62:a8:1b Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #590: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #591: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #592: Exporting Alice's email EC cert & key (pk12util -o) - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #593: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ff:7f:86:83:09:4c:4c:b7:8f:f3:50:49:2a:76:83:77 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed May 10 11:41:32 2017 Not After : Tue May 10 11:41:32 2067 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:00:05:68:88:c0:15:13:15:d2:06:64:38:93:77:95: 25:9a:17:ab:ea:e7:0f:15:ad:f2:dd:82:a3:6f:0a:af: 9a:a4:db:dc:bd:32:55:ca:2a:79:99:fd:41:cb:cb:27: 61:25:00:d5:48:08:af:58:9d:71:57:5e:e5:42:10:d6: 69:40:fb:01:ab:80:c2:88:9d:a4:36:9a:b7:67:dc:8b: 82:3d:a0:98:dc:1b:05:eb:83:00:cf:e5:ad:49:3a:c4: 17:e7:b7:e9:6b:16:9c:ab:de:05:bb:45:a1:15:1a:0a: b5:a0:60:6d:e3:3c:fa:e6:52:fd:95:3a:d0:dd:04:28: fc:77:e5:ec:67 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:88:02:42:01:99:07:26:ef:ed:b0:a4:6d:d3:1c: 10:bf:8c:1d:73:89:68:89:a3:03:c6:01:44:17:5d:a2: 30:86:73:f9:f0:ec:e6:d0:c5:e3:d5:45:2d:e9:ee:a2: 8f:bd:e3:7c:0a:a9:2f:d8:cf:7d:ed:39:ca:97:9f:9c: 67:e1:05:c1:f5:59:38:02:42:01:8d:33:b9:6b:db:e0: b5:53:a0:75:5b:10:b5:5a:c5:e4:ae:da:f9:a2:c2:1d: 0d:2d:d2:cc:1b:41:f6:c1:96:c7:78:ba:2a:9a:fd:da: 65:9c:de:2e:2d:c5:2c:30:11:19:66:51:0a:8b:94:02: 99:be:0a:92:96:b3:dd:ec:1a:a4:c3 Fingerprint (SHA-256): C8:52:91:B3:AC:17:62:95:23:45:EB:9E:A0:59:AB:47:15:9C:32:EB:D3:4A:65:21:C8:83:00:4B:A7:D1:3A:AB Fingerprint (SHA1): 77:D3:D1:30:56:7F:B1:F5:E3:52:EF:84:9B:48:D6:C0:5A:4A:FE:9A Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed May 10 11:41:50 2017 Not After : Tue May 10 11:41:50 2022 Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:ab:09:ed:bc:5a:5b:a9:04:15:49:3b:39:b0:f3:a9: 90:54:0e:e8:3f:92:37:0c:2b:d1:49:f2:07:d1:4c:1b: 06:81:b1:33:ac:f1:5a:10:00:33:50:e6:95:cf:c2:1c: 24:55:5e:e7:c7:2b:a8:ce:c2:50:35:66:eb:21:74:73: 77:c1:1f:74:68:10:2c:0f:8b:9a:cb:9a:76:36:68:cb: f7:47:59:6a:d5:bd:d9:b5:af:c0:e0:21:5a:da:b8:22: d8 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:88:02:42:01:27:95:e8:5e:63:a3:ec:53:20:a2: 8c:4c:c2:0c:22:8c:86:aa:eb:71:2d:91:fa:66:9c:9e: 84:db:5b:f8:f9:da:e7:13:73:a8:e8:db:13:52:0f:2e: 2c:31:4c:33:25:62:9f:70:61:ef:61:4d:e6:b8:57:13: d2:65:40:ac:2a:d2:33:02:42:01:7d:05:7b:a5:11:6a: c7:37:bf:11:97:ea:46:57:66:54:e8:84:77:a8:89:48: ab:9c:6c:bd:f1:d3:12:86:16:fd:07:70:37:1b:c6:f6: c8:54:d5:89:46:62:b4:1d:0e:25:88:2e:b6:4c:b9:76: 43:f8:c6:08:fd:33:c5:05:62:fa:da Fingerprint (SHA-256): E8:31:B8:84:8C:22:42:6F:BD:45:3E:48:41:78:F3:76:C6:49:9B:98:EA:8E:3C:46:5C:43:14:30:EA:72:6C:7E Fingerprint (SHA1): F8:E3:60:9E:57:B3:49:D8:25:7F:38:DA:95:FB:08:58:E4:84:C1:AC Friendly Name: Alice-ec tools.sh: #594: Listing Alice's pk12 EC file (pk12util -l) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #595: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 31:02:e8:e8:5b:6f:8c:3a:84:a3:24:41:8d:ba:9e:71 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #596: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #597: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #598: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 90:67:f6:01:96:0b:0b:a2:19:87:2e:0b:9f:48:32:47 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #599: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #600: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #601: Exporting with [RC2-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: ff:67:98:8c:c3:0a:2e:59:01:9b:14:d8:4d:f6:81:0e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #602: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #603: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #604: Exporting with [RC2-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: f2:a0:31:89:52:ff:0d:71:4a:6e:11:16:e5:e3:6a:6e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #605: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #606: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #607: Exporting with [RC2-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 4e:6f:9f:d1:9a:33:95:94:02:90:f2:4b:48:b0:a8:59 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #608: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #609: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #610: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: c2:c4:1d:5a:b0:22:38:77:0b:06:3f:e5:04:2a:39:e6 Iteration Count: 2000 (0x7d0) tools.sh: #611: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #612: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #613: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f5:bf:34:7b:5d:ac:d7:3b:9b:ac:05:ee:99:cd:6f:e7 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #614: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #615: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #616: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ce:d0:a9:07:08:4f:64:6b:48:24:4d:95:28:3e:1e:32 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #617: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #618: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #619: Exporting with [DES-EDE3-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3a:7c:88:a3:3e:a8:c6:6b:90:89:ae:5f:df:00:41:74 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #620: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #621: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #622: Exporting with [DES-EDE3-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 31:27:7e:a5:9c:b3:ad:30:6e:9a:b5:8e:38:19:df:a1 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #623: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #624: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #625: Exporting with [DES-EDE3-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c4:28:46:12:03:07:5f:d5:9a:ae:b4:bb:7b:22:1e:bf Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #626: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #627: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #628: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bb:24:a9:30:ac:80:76:99:f5:3f:75:e8:bd:a4:9b:76 Iteration Count: 2000 (0x7d0) tools.sh: #629: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #630: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #631: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f2:6e:3e:f4:fe:11:96:b3:d0:12:3d:29:24:23:d8:c6 Iteration Count: 2000 (0x7d0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:90:c9:6a:09:19:77:70:04:9d:7f:9d:39:86:35: 3d:ea Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #632: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #633: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #634: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 02:29:ab:cb:74:19:fc:15:7c:49:56:4f:a4:ab:f5:b7 Iteration Count: 2000 (0x7d0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:3c:c4:fb:69:71:51:de:67:69:8e:82:64:36:f2: 8a:86 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #635: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #636: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #637: Exporting with [AES-128-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fe:78:c4:1f:d5:3f:34:88:fe:eb:b8:b4:fa:ec:3b:79 Iteration Count: 2000 (0x7d0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:61:9b:16:b8:47:6a:97:5c:da:f9:4a:00:7b:0f: 4e:e0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #638: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #639: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #640: Exporting with [AES-128-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ee:16:33:60:98:c0:ac:40:66:e3:05:d5:7c:55:74:d8 Iteration Count: 2000 (0x7d0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:03:b9:54:06:5d:56:c6:bf:cb:4e:67:0b:d0:0e: c8:f7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #641: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #642: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #643: Exporting with [AES-128-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 90:3d:94:9d:bc:d6:14:61:1b:1b:30:4c:a9:c8:4f:69 Iteration Count: 2000 (0x7d0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:81:8d:4e:ff:c8:53:ed:da:ff:6f:51:a3:a3:b5: f8:aa Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #644: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #645: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #646: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 99:2e:49:4d:1f:13:65:a1:fb:44:7a:78:a9:91:a3:5d Iteration Count: 2000 (0x7d0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:5b:79:14:1c:be:e8:d7:3c:63:16:6d:e9:c1:d3: 34:af tools.sh: #647: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #648: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #649: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 47:1b:92:a2:2a:33:09:df:0b:eb:df:26:38:c0:dd:28 Iteration Count: 2000 (0x7d0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:61:2e:cc:aa:25:51:f2:f6:3c:cc:27:38:86:6c: d5:70 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #650: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #651: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #652: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 79:70:3c:d5:8c:da:5b:11:8b:b4:eb:01:3f:21:d0:f8 Iteration Count: 2000 (0x7d0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:2c:6d:ff:32:8d:f7:d3:f3:68:e0:cb:8a:c5:56: d4:df Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #653: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #654: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #655: Exporting with [AES-192-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d7:92:03:0e:d9:d8:5f:98:df:b1:77:75:26:92:47:3f Iteration Count: 2000 (0x7d0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:0d:76:b8:65:ac:c7:64:af:bf:3a:cb:e3:e6:31: b5:a2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #656: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #657: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #658: Exporting with [AES-192-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: df:62:22:02:46:92:1e:63:87:d2:de:5e:8f:1d:88:dc Iteration Count: 2000 (0x7d0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:ef:9c:52:52:06:14:d5:c0:4c:31:8a:a6:a8:f3: 61:be Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #659: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #660: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #661: Exporting with [AES-192-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 13:fb:e6:ba:bb:32:48:16:fb:e6:18:78:76:89:72:ee Iteration Count: 2000 (0x7d0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:13:39:40:00:5d:cb:fa:b9:1e:72:18:ee:db:23: 9f:85 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #662: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #663: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #664: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: df:b8:ef:73:53:03:32:7c:e7:bf:2a:b8:5f:4f:cf:24 Iteration Count: 2000 (0x7d0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:3f:30:26:84:29:8d:78:31:74:45:d8:5f:b3:34: 57:6e tools.sh: #665: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #666: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #667: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 51:52:d3:42:8d:72:83:ac:99:9e:29:1e:0b:a2:3e:6e Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:d6:40:8f:5b:f1:95:ca:6f:a7:0f:01:68:b8:21: 24:67 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #668: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #669: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #670: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 10:ee:65:35:03:0d:91:c5:8a:72:2b:3e:19:2b:64:2a Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:c3:15:26:95:5f:0f:58:a7:4e:fd:8f:f6:30:55: dd:0b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #671: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #672: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #673: Exporting with [AES-256-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 69:b4:84:2b:51:21:a0:13:62:62:33:a7:95:d1:a1:bd Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:a4:92:f6:ee:2e:e6:d4:09:fb:0e:6c:93:8d:b8: 1c:bc Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #674: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #675: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #676: Exporting with [AES-256-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4d:3d:26:9c:2a:f0:80:b1:5d:7b:a8:7b:51:65:51:1e Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:5c:b7:98:97:05:ff:36:c7:2b:77:21:9c:67:ff: 35:84 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #677: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #678: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #679: Exporting with [AES-256-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 20:3b:f1:fc:3d:f9:1a:fa:7e:6e:95:28:bd:6b:01:26 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:02:0f:e1:cf:36:38:ee:62:3b:6c:21:e1:18:c7: a1:e2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #680: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #681: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #682: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d6:04:dc:ee:ba:66:8e:d5:01:36:f1:8b:e9:23:04:73 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:e1:68:ee:f5:a4:cf:6b:34:f1:eb:37:74:0b:74: ad:2b tools.sh: #683: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #684: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #685: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 46:1e:ea:6b:3a:6d:e9:0e:7e:19:dd:2d:93:61:36:ee Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:b2:cc:e0:93:c8:30:8f:0a:3c:e7:5b:78:cb:31: b3:7d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #686: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #687: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #688: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 67:a9:17:5a:4e:bd:d4:f9:7f:f4:f4:e4:0b:c0:6b:29 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:f7:42:0c:87:11:7e:31:ea:06:ea:ce:2b:c8:be: cc:64 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #689: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #690: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #691: Exporting with [CAMELLIA-128-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a5:d9:04:b9:f2:33:a8:9d:0f:24:d1:8f:34:1e:9b:40 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:9e:7c:f8:1f:89:65:49:34:bd:6a:ea:68:00:43: 02:7d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #692: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #693: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #694: Exporting with [CAMELLIA-128-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 37:49:38:9c:02:33:59:15:80:77:db:3c:54:55:0e:dc Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:ee:7e:79:f9:30:1e:41:46:a5:7d:3f:97:ed:06: 67:fa Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #695: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #696: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #697: Exporting with [CAMELLIA-128-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4e:00:07:8d:11:7f:be:aa:99:c2:74:57:24:cd:ff:2c Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:38:67:da:f5:df:3a:e8:eb:f6:a1:ea:e3:3b:bf: bc:b3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #698: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #699: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #700: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7f:10:d9:6a:7d:82:9c:01:c3:a3:e9:cc:04:12:ce:2e Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:b1:45:80:62:e2:82:8c:7c:f6:0d:16:80:5b:22: 83:b5 tools.sh: #701: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #702: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #703: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5a:6f:6a:bf:d9:5e:a1:22:f9:95:fd:3a:36:10:04:a6 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:7f:c4:aa:e5:d6:3e:79:6f:ea:ac:d2:e2:7a:c6: 1f:e2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #704: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #705: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #706: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 03:6f:41:de:0d:9a:cb:70:37:4a:bb:e0:a3:ab:36:e8 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:74:8c:c2:6d:13:b2:0f:cc:50:60:fd:eb:e9:80: 94:e3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #707: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #708: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #709: Exporting with [CAMELLIA-192-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 80:d5:f8:13:da:e0:91:41:3e:44:af:31:ed:3b:86:99 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:aa:6b:d6:28:f4:3c:4c:d6:52:8b:69:61:32:02: d7:be Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #710: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #711: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #712: Exporting with [CAMELLIA-192-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0a:f2:59:27:0a:d3:f6:17:7d:a5:11:d1:6c:a6:37:72 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:77:3d:0a:0f:32:81:ca:d7:6e:40:c2:b8:9f:9a: de:e3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #713: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #714: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #715: Exporting with [CAMELLIA-192-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 31:49:73:9e:45:a1:3e:49:fb:ef:af:c6:d3:2c:73:85 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:65:65:3d:ea:d3:4b:d2:df:f1:19:c1:89:b2:22: 32:b6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #716: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #717: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #718: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e4:3f:3a:7b:4f:b2:16:c4:d7:c6:43:ed:04:b0:f0:30 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:a7:f4:ca:8e:09:88:9b:af:8b:24:65:7c:13:44: de:ab tools.sh: #719: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #720: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #721: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 39:7b:c2:16:c8:bf:f2:4c:da:cd:8c:c4:5f:82:ac:ec Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:a3:26:93:fd:cb:45:45:d6:5a:bf:ac:bc:cf:bd: 6b:07 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #722: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #723: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #724: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 37:22:b5:5f:f5:7f:44:aa:69:a4:b9:9d:3e:ce:a4:f8 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:4d:ae:79:70:55:fc:d8:13:2d:18:d7:99:4c:0b: 44:02 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #725: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #726: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #727: Exporting with [CAMELLIA-256-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ed:b5:f5:9a:6c:f0:72:cd:15:4a:79:e7:5f:8a:19:44 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:a8:d6:84:24:08:5f:f0:ef:b9:fc:1f:f3:6e:8c: bf:a2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #728: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #729: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #730: Exporting with [CAMELLIA-256-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 00:a7:ff:91:11:ee:92:1f:c9:f6:5f:b9:db:cd:a9:8f Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:2d:f0:42:77:d8:9c:f2:a4:3a:4a:b5:d2:24:74: 0e:9e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #731: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #732: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #733: Exporting with [CAMELLIA-256-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8c:b0:50:7b:74:17:b7:7c:1e:1c:dc:ac:9b:86:32:77 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:c9:28:66:98:d5:c9:1d:f4:29:2b:ae:a1:0a:62: a7:70 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #734: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #735: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #736: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b9:88:5c:63:1b:8f:8a:1e:79:3a:40:58:b3:6b:b4:5f Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:6a:77:df:16:24:45:fd:29:56:32:4a:97:47:13: 2d:ba tools.sh: #737: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #738: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #739: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: cb:6e:b0:e6:0a:7d:1b:2e:55:22:19:11:43:6d:28:c0 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #740: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #741: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #742: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 8a:8d:3b:27:72:94:f3:7d:43:58:72:e6:f8:7e:d4:0f Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #743: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #744: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #745: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: cc:68:da:19:69:71:bd:38:a9:b3:14:4a:18:24:5e:ed Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #746: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #747: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #748: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 22:8b:1a:79:a8:1d:3d:81:ab:b7:9a:f5:d3:bb:6f:46 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #749: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #750: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #751: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: b3:3a:d6:d8:e9:74:17:ab:f2:30:ea:83:50:ce:ab:76 Iteration Count: 2000 (0x7d0) tools.sh: #752: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #753: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #754: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: cc:b8:47:29:13:cb:6e:f4:c9:7a:70:89:9a:02:3c:f3 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #755: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #756: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #757: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 95:31:ee:49:db:57:8d:44:54:dd:f6:0c:c8:ff:40:f3 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #758: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #759: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #760: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: ac:df:9f:09:d4:d7:34:71:a7:46:6f:1b:b5:22:4b:a0 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #761: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #762: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #763: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 80:28:29:79:44:c6:15:94:5c:b3:d4:0d:fe:4c:59:82 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #764: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #765: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #766: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 15:9c:43:0e:69:30:35:79:9a:e8:03:ea:50:ac:5c:c1 Iteration Count: 2000 (0x7d0) tools.sh: #767: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #768: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #769: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 47:9e:bf:19:60:a0:aa:65:a6:b2:84:76:59:9d:1a:ca Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #770: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #771: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #772: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 93:af:38:1a:ef:fb:4b:8e:1e:9f:a5:0b:3d:b8:72:6a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #773: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #774: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #775: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 10:bb:04:6a:df:95:2a:9a:3f:00:c8:8d:69:d3:5f:3e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #776: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #777: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #778: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 59:78:b4:b9:40:2f:b9:8c:57:02:be:45:2e:bf:1b:c6 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #779: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #780: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #781: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 01:03:ec:7b:85:05:93:02:db:a9:a0:e2:ed:18:e7:36 Iteration Count: 2000 (0x7d0) tools.sh: #782: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #783: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #784: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 54:7d:59:64:fd:af:a5:a7:8e:20:c4:65:b6:06:41:56 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #785: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #786: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #787: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8a:c2:8c:08:b9:ac:fa:0e:30:cc:23:36:bf:34:04:06 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #788: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #789: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #790: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 57:b8:44:03:8c:fe:b4:ca:23:32:8f:b7:f6:9e:b8:5a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #791: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #792: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #793: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5a:42:0e:8f:96:ea:96:57:52:25:5b:64:56:b1:b9:7d Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #794: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #795: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #796: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 18:17:84:a6:69:f1:be:ed:db:07:8a:aa:c1:4e:a7:44 Iteration Count: 2000 (0x7d0) tools.sh: #797: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #798: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #799: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 18:a8:2d:e0:7c:be:1a:65:24:10:5d:56:a9:a4:77:d8 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #800: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #801: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #802: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d2:62:2c:02:0b:de:18:32:e8:7a:2a:91:15:36:50:fa Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #803: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #804: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #805: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 61:2d:3e:1f:10:e4:08:72:64:40:c7:a1:ba:4c:d0:62 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #806: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #807: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #808: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3b:9d:16:1b:3e:4e:99:b3:68:8e:d9:82:6f:17:f8:f1 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #809: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #810: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #811: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a7:58:e6:ae:1f:37:c6:b9:42:de:f5:a8:aa:eb:0e:4e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #812: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #813: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #814: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c7:8e:d1:d1:d4:c4:ec:7f:89:20:79:a6:c1:5a:fb:0d Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #815: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #816: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #817: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c8:ca:2b:f4:84:18:81:4e:c8:1c:64:f0:ea:8e:f0:ce Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #818: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #819: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #820: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 92:5a:68:75:9c:c6:08:cf:05:5c:2d:1b:40:ea:70:0f Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #821: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #822: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #823: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1c:a0:c7:2d:26:7e:7a:1e:ff:59:a0:9a:4f:4e:39:6a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #824: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #825: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #826: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 08:a5:22:b4:c5:5f:26:86:ea:6e:9e:80:f2:a2:e9:36 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #827: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #828: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #829: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #830: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #831: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 37%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) tree "../tools/html" signed successfully tools.sh: #832: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #833: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #834: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html --> sign.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 37%) tree "../tools/html" signed successfully tools.sh: #835: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #836: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #837: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Wed May 10 11:43:36 UTC 2017 Running tests for fips TIMESTAMP fips BEGIN: Wed May 10 11:43:36 UTC 2017 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #838: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #839: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 56ada9822a1ced475dbd58d6714e3c6778f4bd87 NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #840: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #841: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #842: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #843: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #844: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #845: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #846: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #847: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #848: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #849: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #850: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 56ada9822a1ced475dbd58d6714e3c6778f4bd87 FIPS_PUB_140_Test_Certificate fips.sh: #851: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #852: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #853: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #854: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #855: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 56ada9822a1ced475dbd58d6714e3c6778f4bd87 FIPS_PUB_140_Test_Certificate fips.sh: #856: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #857: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #858: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest1.so /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so -o -8 -b 5 cp /usr/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle Changing byte 0x00033918 (211224): from 01 (1) to 21 (33) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/fips/mangle dbtest -r -d ../fips fips.sh: #859: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Wed May 10 11:44:00 UTC 2017 Running tests for sdr TIMESTAMP sdr BEGIN: Wed May 10 11:44:00 UTC 2017 sdr.sh: SDR Tests =============================== sdr.sh: Creating an SDR key/SDR Encrypt - Value 1 sdrtest -d . -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests.v1.1556 -t "Test1" sdr.sh: #860: Creating SDR Key/Encrypt - Value 1 - PASSED sdr.sh: SDR Encrypt - Value 2 sdrtest -d . -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests.v2.1556 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #861: Encrypt - Value 2 - PASSED sdr.sh: SDR Encrypt - Value 3 sdrtest -d . -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests.v3.1556 -t "1234567" sdr.sh: #862: Encrypt - Value 3 - PASSED sdr.sh: SDR Decrypt - Value 1 sdrtest -d . -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests.v1.1556 -t "Test1" sdr.sh: #863: Decrypt - Value 1 - PASSED sdr.sh: SDR Decrypt - Value 2 sdrtest -d . -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests.v2.1556 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #864: Decrypt - Value 2 - PASSED sdr.sh: SDR Decrypt - Value 3 sdrtest -d . -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests.v3.1556 -t "1234567" sdr.sh: #865: Decrypt - Value 3 - PASSED TIMESTAMP sdr END: Wed May 10 11:44:01 UTC 2017 Running tests for crmf TIMESTAMP crmf BEGIN: Wed May 10 11:44:01 UTC 2017 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #866: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #867: CMMF test . - PASSED TIMESTAMP crmf END: Wed May 10 11:44:01 UTC 2017 Running tests for smime TIMESTAMP smime BEGIN: Wed May 10 11:44:01 UTC 2017 smime.sh: S/MIME Tests with ECC =============================== smime.sh: Signing Detached Message {SHA1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #868: Create Detached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #869: Verifying Alice's Detached Signature (SHA1) . - PASSED smime.sh: Signing Attached Message (SHA1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #870: Create Attached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1 smime.sh: #871: Decode Alice's Attached Signature (SHA1) . - PASSED diff alice.txt alice.data.SHA1 smime.sh: #872: Compare Attached Signed Data and Original (SHA1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA1} ------------------ cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #873: Create Detached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #874: Verifying Alice's Detached Signature (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA1) ------------------ cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #875: Create Attached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.SHA1 smime.sh: #876: Decode Alice's Attached Signature (ECDSA w/ SHA1) . - PASSED diff alice.txt alice-ec.data.SHA1 smime.sh: #877: Compare Attached Signed Data and Original (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Detached Message {SHA256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #878: Create Detached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #879: Verifying Alice's Detached Signature (SHA256) . - PASSED smime.sh: Signing Attached Message (SHA256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #880: Create Attached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256 smime.sh: #881: Decode Alice's Attached Signature (SHA256) . - PASSED diff alice.txt alice.data.SHA256 smime.sh: #882: Compare Attached Signed Data and Original (SHA256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA256} ------------------ cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #883: Create Detached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #884: Verifying Alice's Detached Signature (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA256) ------------------ cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #885: Create Attached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.SHA256 smime.sh: #886: Decode Alice's Attached Signature (ECDSA w/ SHA256) . - PASSED diff alice.txt alice-ec.data.SHA256 smime.sh: #887: Compare Attached Signed Data and Original (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Detached Message {SHA384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #888: Create Detached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #889: Verifying Alice's Detached Signature (SHA384) . - PASSED smime.sh: Signing Attached Message (SHA384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #890: Create Attached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384 smime.sh: #891: Decode Alice's Attached Signature (SHA384) . - PASSED diff alice.txt alice.data.SHA384 smime.sh: #892: Compare Attached Signed Data and Original (SHA384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA384} ------------------ cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #893: Create Detached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #894: Verifying Alice's Detached Signature (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA384) ------------------ cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #895: Create Attached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.SHA384 smime.sh: #896: Decode Alice's Attached Signature (ECDSA w/ SHA384) . - PASSED diff alice.txt alice-ec.data.SHA384 smime.sh: #897: Compare Attached Signed Data and Original (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Detached Message {SHA512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #898: Create Detached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #899: Verifying Alice's Detached Signature (SHA512) . - PASSED smime.sh: Signing Attached Message (SHA512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #900: Create Attached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512 smime.sh: #901: Decode Alice's Attached Signature (SHA512) . - PASSED diff alice.txt alice.data.SHA512 smime.sh: #902: Compare Attached Signed Data and Original (SHA512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA512} ------------------ cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #903: Create Detached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #904: Verifying Alice's Detached Signature (ECDSA w/ SHA512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA512) ------------------ cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #905: Create Attached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.SHA512 smime.sh: #906: Decode Alice's Attached Signature (ECDSA w/ SHA512) . - PASSED diff alice.txt alice-ec.data.SHA512 smime.sh: #907: Compare Attached Signed Data and Original (ECDSA w/ SHA512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #908: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #909: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #910: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@bogus.com,dave@bogus.com smime.sh: #911: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@bogus.net smime.sh: #912: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #913: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #914: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #915: Decrypt with a Multiple Email cert . - PASSED smime.sh: #916: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #917: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #918: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \ -d ../alicedir > co.der smime.sh: #919: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #920: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@bogus.com" > alice.enc smime.sh: #921: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #922: Decode Encrypted-Data . - PASSED smime.sh: #923: Compare Decoded and Original Data . - PASSED smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #924: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice.env -o alice_p7.data smime.sh: #925: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #926: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #927: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #928: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Wed May 10 11:44:05 UTC 2017 Running tests for ssl TIMESTAMP ssl BEGIN: Wed May 10 11:44:05 UTC 2017 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:06 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 11888 >/dev/null 2>/dev/null selfserv_9208 with PID 11888 found at Wed May 10 11:44:06 UTC 2017 selfserv_9208 with PID 11888 started at Wed May 10 11:44:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #929: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 11888 at Wed May 10 11:44:06 UTC 2017 kill -USR1 11888 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 11888 killed at Wed May 10 11:44:06 UTC 2017 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:06 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 11944 >/dev/null 2>/dev/null selfserv_9208 with PID 11944 found at Wed May 10 11:44:06 UTC 2017 selfserv_9208 with PID 11944 started at Wed May 10 11:44:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #930: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 11944 at Wed May 10 11:44:06 UTC 2017 kill -USR1 11944 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 11944 killed at Wed May 10 11:44:06 UTC 2017 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:06 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 12000 >/dev/null 2>/dev/null selfserv_9208 with PID 12000 found at Wed May 10 11:44:07 UTC 2017 selfserv_9208 with PID 12000 started at Wed May 10 11:44:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #931: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 12000 at Wed May 10 11:44:07 UTC 2017 kill -USR1 12000 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 12000 killed at Wed May 10 11:44:07 UTC 2017 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:07 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 12068 >/dev/null 2>/dev/null selfserv_9208 with PID 12068 found at Wed May 10 11:44:07 UTC 2017 selfserv_9208 with PID 12068 started at Wed May 10 11:44:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #932: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 12068 at Wed May 10 11:44:07 UTC 2017 kill -USR1 12068 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 12068 killed at Wed May 10 11:44:07 UTC 2017 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:07 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 12124 >/dev/null 2>/dev/null selfserv_9208 with PID 12124 found at Wed May 10 11:44:07 UTC 2017 selfserv_9208 with PID 12124 started at Wed May 10 11:44:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #933: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 12124 at Wed May 10 11:44:08 UTC 2017 kill -USR1 12124 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 12124 killed at Wed May 10 11:44:08 UTC 2017 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:08 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 12180 >/dev/null 2>/dev/null selfserv_9208 with PID 12180 found at Wed May 10 11:44:08 UTC 2017 selfserv_9208 with PID 12180 started at Wed May 10 11:44:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #934: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 12180 at Wed May 10 11:44:08 UTC 2017 kill -USR1 12180 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 12180 killed at Wed May 10 11:44:08 UTC 2017 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:08 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 12248 >/dev/null 2>/dev/null selfserv_9208 with PID 12248 found at Wed May 10 11:44:08 UTC 2017 selfserv_9208 with PID 12248 started at Wed May 10 11:44:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #935: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 12248 at Wed May 10 11:44:09 UTC 2017 kill -USR1 12248 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 12248 killed at Wed May 10 11:44:09 UTC 2017 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:09 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 12304 >/dev/null 2>/dev/null selfserv_9208 with PID 12304 found at Wed May 10 11:44:09 UTC 2017 selfserv_9208 with PID 12304 started at Wed May 10 11:44:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #936: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 12304 at Wed May 10 11:44:09 UTC 2017 kill -USR1 12304 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 12304 killed at Wed May 10 11:44:09 UTC 2017 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:09 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 12360 >/dev/null 2>/dev/null selfserv_9208 with PID 12360 found at Wed May 10 11:44:09 UTC 2017 selfserv_9208 with PID 12360 started at Wed May 10 11:44:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #937: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 12360 at Wed May 10 11:44:09 UTC 2017 kill -USR1 12360 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 12360 killed at Wed May 10 11:44:09 UTC 2017 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:10 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 12428 >/dev/null 2>/dev/null selfserv_9208 with PID 12428 found at Wed May 10 11:44:10 UTC 2017 selfserv_9208 with PID 12428 started at Wed May 10 11:44:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #938: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 12428 at Wed May 10 11:44:10 UTC 2017 kill -USR1 12428 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 12428 killed at Wed May 10 11:44:10 UTC 2017 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:10 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 12484 >/dev/null 2>/dev/null selfserv_9208 with PID 12484 found at Wed May 10 11:44:10 UTC 2017 selfserv_9208 with PID 12484 started at Wed May 10 11:44:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #939: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 12484 at Wed May 10 11:44:10 UTC 2017 kill -USR1 12484 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 12484 killed at Wed May 10 11:44:10 UTC 2017 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:10 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 12540 >/dev/null 2>/dev/null selfserv_9208 with PID 12540 found at Wed May 10 11:44:10 UTC 2017 selfserv_9208 with PID 12540 started at Wed May 10 11:44:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #940: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 12540 at Wed May 10 11:44:11 UTC 2017 kill -USR1 12540 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 12540 killed at Wed May 10 11:44:11 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:11 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 12608 >/dev/null 2>/dev/null selfserv_9208 with PID 12608 found at Wed May 10 11:44:11 UTC 2017 selfserv_9208 with PID 12608 started at Wed May 10 11:44:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #941: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 12608 at Wed May 10 11:44:11 UTC 2017 kill -USR1 12608 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 12608 killed at Wed May 10 11:44:11 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:11 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 12664 >/dev/null 2>/dev/null selfserv_9208 with PID 12664 found at Wed May 10 11:44:11 UTC 2017 selfserv_9208 with PID 12664 started at Wed May 10 11:44:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #942: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 12664 at Wed May 10 11:44:11 UTC 2017 kill -USR1 12664 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 12664 killed at Wed May 10 11:44:11 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:11 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 12720 >/dev/null 2>/dev/null selfserv_9208 with PID 12720 found at Wed May 10 11:44:11 UTC 2017 selfserv_9208 with PID 12720 started at Wed May 10 11:44:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #943: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 12720 at Wed May 10 11:44:12 UTC 2017 kill -USR1 12720 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 12720 killed at Wed May 10 11:44:12 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:12 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 12788 >/dev/null 2>/dev/null selfserv_9208 with PID 12788 found at Wed May 10 11:44:12 UTC 2017 selfserv_9208 with PID 12788 started at Wed May 10 11:44:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #944: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 12788 at Wed May 10 11:44:12 UTC 2017 kill -USR1 12788 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 12788 killed at Wed May 10 11:44:12 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:12 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 12844 >/dev/null 2>/dev/null selfserv_9208 with PID 12844 found at Wed May 10 11:44:12 UTC 2017 selfserv_9208 with PID 12844 started at Wed May 10 11:44:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 12844 at Wed May 10 11:44:13 UTC 2017 kill -USR1 12844 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 12844 killed at Wed May 10 11:44:13 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:13 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 12900 >/dev/null 2>/dev/null selfserv_9208 with PID 12900 found at Wed May 10 11:44:13 UTC 2017 selfserv_9208 with PID 12900 started at Wed May 10 11:44:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #946: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 12900 at Wed May 10 11:44:13 UTC 2017 kill -USR1 12900 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 12900 killed at Wed May 10 11:44:13 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:13 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 12968 >/dev/null 2>/dev/null selfserv_9208 with PID 12968 found at Wed May 10 11:44:13 UTC 2017 selfserv_9208 with PID 12968 started at Wed May 10 11:44:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #947: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 12968 at Wed May 10 11:44:13 UTC 2017 kill -USR1 12968 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 12968 killed at Wed May 10 11:44:13 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:14 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 13024 >/dev/null 2>/dev/null selfserv_9208 with PID 13024 found at Wed May 10 11:44:14 UTC 2017 selfserv_9208 with PID 13024 started at Wed May 10 11:44:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #948: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 13024 at Wed May 10 11:44:14 UTC 2017 kill -USR1 13024 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 13024 killed at Wed May 10 11:44:14 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:14 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 13080 >/dev/null 2>/dev/null selfserv_9208 with PID 13080 found at Wed May 10 11:44:14 UTC 2017 selfserv_9208 with PID 13080 started at Wed May 10 11:44:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #949: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 13080 at Wed May 10 11:44:14 UTC 2017 kill -USR1 13080 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 13080 killed at Wed May 10 11:44:14 UTC 2017 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:14 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 13148 >/dev/null 2>/dev/null selfserv_9208 with PID 13148 found at Wed May 10 11:44:14 UTC 2017 selfserv_9208 with PID 13148 started at Wed May 10 11:44:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #950: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 13148 at Wed May 10 11:44:15 UTC 2017 kill -USR1 13148 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 13148 killed at Wed May 10 11:44:15 UTC 2017 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:15 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 13204 >/dev/null 2>/dev/null selfserv_9208 with PID 13204 found at Wed May 10 11:44:15 UTC 2017 selfserv_9208 with PID 13204 started at Wed May 10 11:44:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #951: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 13204 at Wed May 10 11:44:15 UTC 2017 kill -USR1 13204 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 13204 killed at Wed May 10 11:44:15 UTC 2017 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:15 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 13260 >/dev/null 2>/dev/null selfserv_9208 with PID 13260 found at Wed May 10 11:44:15 UTC 2017 selfserv_9208 with PID 13260 started at Wed May 10 11:44:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #952: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 13260 at Wed May 10 11:44:16 UTC 2017 kill -USR1 13260 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 13260 killed at Wed May 10 11:44:16 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:16 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 13329 >/dev/null 2>/dev/null selfserv_9208 with PID 13329 found at Wed May 10 11:44:16 UTC 2017 selfserv_9208 with PID 13329 started at Wed May 10 11:44:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #953: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 13329 at Wed May 10 11:44:16 UTC 2017 kill -USR1 13329 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 13329 killed at Wed May 10 11:44:16 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:16 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 13385 >/dev/null 2>/dev/null selfserv_9208 with PID 13385 found at Wed May 10 11:44:16 UTC 2017 selfserv_9208 with PID 13385 started at Wed May 10 11:44:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #954: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 13385 at Wed May 10 11:44:16 UTC 2017 kill -USR1 13385 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 13385 killed at Wed May 10 11:44:16 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:16 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 13441 >/dev/null 2>/dev/null selfserv_9208 with PID 13441 found at Wed May 10 11:44:16 UTC 2017 selfserv_9208 with PID 13441 started at Wed May 10 11:44:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #955: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 13441 at Wed May 10 11:44:17 UTC 2017 kill -USR1 13441 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 13441 killed at Wed May 10 11:44:17 UTC 2017 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:17 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:17 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 13509 >/dev/null 2>/dev/null selfserv_9208 with PID 13509 found at Wed May 10 11:44:17 UTC 2017 selfserv_9208 with PID 13509 started at Wed May 10 11:44:17 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #956: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 13509 at Wed May 10 11:44:17 UTC 2017 kill -USR1 13509 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 13509 killed at Wed May 10 11:44:17 UTC 2017 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:17 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:17 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 13565 >/dev/null 2>/dev/null selfserv_9208 with PID 13565 found at Wed May 10 11:44:17 UTC 2017 selfserv_9208 with PID 13565 started at Wed May 10 11:44:17 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #957: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 13565 at Wed May 10 11:44:17 UTC 2017 kill -USR1 13565 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 13565 killed at Wed May 10 11:44:18 UTC 2017 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:18 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 13621 >/dev/null 2>/dev/null selfserv_9208 with PID 13621 found at Wed May 10 11:44:18 UTC 2017 selfserv_9208 with PID 13621 started at Wed May 10 11:44:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #958: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 13621 at Wed May 10 11:44:18 UTC 2017 kill -USR1 13621 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 13621 killed at Wed May 10 11:44:18 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:18 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 13689 >/dev/null 2>/dev/null selfserv_9208 with PID 13689 found at Wed May 10 11:44:18 UTC 2017 selfserv_9208 with PID 13689 started at Wed May 10 11:44:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #959: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 13689 at Wed May 10 11:44:18 UTC 2017 kill -USR1 13689 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 13689 killed at Wed May 10 11:44:18 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:18 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 13745 >/dev/null 2>/dev/null selfserv_9208 with PID 13745 found at Wed May 10 11:44:18 UTC 2017 selfserv_9208 with PID 13745 started at Wed May 10 11:44:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #960: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 13745 at Wed May 10 11:44:19 UTC 2017 kill -USR1 13745 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 13745 killed at Wed May 10 11:44:19 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:19 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:19 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 13801 >/dev/null 2>/dev/null selfserv_9208 with PID 13801 found at Wed May 10 11:44:19 UTC 2017 selfserv_9208 with PID 13801 started at Wed May 10 11:44:19 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #961: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 13801 at Wed May 10 11:44:19 UTC 2017 kill -USR1 13801 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 13801 killed at Wed May 10 11:44:19 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:19 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:19 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 13869 >/dev/null 2>/dev/null selfserv_9208 with PID 13869 found at Wed May 10 11:44:19 UTC 2017 selfserv_9208 with PID 13869 started at Wed May 10 11:44:19 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #962: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 13869 at Wed May 10 11:44:19 UTC 2017 kill -USR1 13869 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 13869 killed at Wed May 10 11:44:19 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:19 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 13925 >/dev/null 2>/dev/null selfserv_9208 with PID 13925 found at Wed May 10 11:44:20 UTC 2017 selfserv_9208 with PID 13925 started at Wed May 10 11:44:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #963: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 13925 at Wed May 10 11:44:20 UTC 2017 kill -USR1 13925 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 13925 killed at Wed May 10 11:44:20 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:20 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 13981 >/dev/null 2>/dev/null selfserv_9208 with PID 13981 found at Wed May 10 11:44:20 UTC 2017 selfserv_9208 with PID 13981 started at Wed May 10 11:44:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #964: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 13981 at Wed May 10 11:44:20 UTC 2017 kill -USR1 13981 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 13981 killed at Wed May 10 11:44:20 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:20 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14049 >/dev/null 2>/dev/null selfserv_9208 with PID 14049 found at Wed May 10 11:44:20 UTC 2017 selfserv_9208 with PID 14049 started at Wed May 10 11:44:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #965: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 14049 at Wed May 10 11:44:21 UTC 2017 kill -USR1 14049 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14049 killed at Wed May 10 11:44:21 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:21 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14105 >/dev/null 2>/dev/null selfserv_9208 with PID 14105 found at Wed May 10 11:44:21 UTC 2017 selfserv_9208 with PID 14105 started at Wed May 10 11:44:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #966: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 14105 at Wed May 10 11:44:21 UTC 2017 kill -USR1 14105 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14105 killed at Wed May 10 11:44:21 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:21 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14161 >/dev/null 2>/dev/null selfserv_9208 with PID 14161 found at Wed May 10 11:44:21 UTC 2017 selfserv_9208 with PID 14161 started at Wed May 10 11:44:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #967: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 14161 at Wed May 10 11:44:22 UTC 2017 kill -USR1 14161 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14161 killed at Wed May 10 11:44:22 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:22 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14229 >/dev/null 2>/dev/null selfserv_9208 with PID 14229 found at Wed May 10 11:44:22 UTC 2017 selfserv_9208 with PID 14229 started at Wed May 10 11:44:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #968: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 14229 at Wed May 10 11:44:22 UTC 2017 kill -USR1 14229 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14229 killed at Wed May 10 11:44:22 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:22 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14285 >/dev/null 2>/dev/null selfserv_9208 with PID 14285 found at Wed May 10 11:44:22 UTC 2017 selfserv_9208 with PID 14285 started at Wed May 10 11:44:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #969: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 14285 at Wed May 10 11:44:23 UTC 2017 kill -USR1 14285 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14285 killed at Wed May 10 11:44:23 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:23 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14341 >/dev/null 2>/dev/null selfserv_9208 with PID 14341 found at Wed May 10 11:44:23 UTC 2017 selfserv_9208 with PID 14341 started at Wed May 10 11:44:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #970: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 14341 at Wed May 10 11:44:23 UTC 2017 kill -USR1 14341 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14341 killed at Wed May 10 11:44:23 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:23 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14409 >/dev/null 2>/dev/null selfserv_9208 with PID 14409 found at Wed May 10 11:44:23 UTC 2017 selfserv_9208 with PID 14409 started at Wed May 10 11:44:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #971: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 14409 at Wed May 10 11:44:24 UTC 2017 kill -USR1 14409 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14409 killed at Wed May 10 11:44:24 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:24 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:24 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14465 >/dev/null 2>/dev/null selfserv_9208 with PID 14465 found at Wed May 10 11:44:24 UTC 2017 selfserv_9208 with PID 14465 started at Wed May 10 11:44:24 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #972: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 14465 at Wed May 10 11:44:24 UTC 2017 kill -USR1 14465 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14465 killed at Wed May 10 11:44:24 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:24 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:24 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14521 >/dev/null 2>/dev/null selfserv_9208 with PID 14521 found at Wed May 10 11:44:24 UTC 2017 selfserv_9208 with PID 14521 started at Wed May 10 11:44:24 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #973: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 14521 at Wed May 10 11:44:25 UTC 2017 kill -USR1 14521 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14521 killed at Wed May 10 11:44:25 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:25 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:25 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14589 >/dev/null 2>/dev/null selfserv_9208 with PID 14589 found at Wed May 10 11:44:25 UTC 2017 selfserv_9208 with PID 14589 started at Wed May 10 11:44:25 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #974: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 14589 at Wed May 10 11:44:25 UTC 2017 kill -USR1 14589 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14589 killed at Wed May 10 11:44:25 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:25 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:25 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14645 >/dev/null 2>/dev/null selfserv_9208 with PID 14645 found at Wed May 10 11:44:25 UTC 2017 selfserv_9208 with PID 14645 started at Wed May 10 11:44:25 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #975: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 14645 at Wed May 10 11:44:26 UTC 2017 kill -USR1 14645 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14645 killed at Wed May 10 11:44:26 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:26 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:26 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14701 >/dev/null 2>/dev/null selfserv_9208 with PID 14701 found at Wed May 10 11:44:26 UTC 2017 selfserv_9208 with PID 14701 started at Wed May 10 11:44:26 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #976: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 14701 at Wed May 10 11:44:26 UTC 2017 kill -USR1 14701 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14701 killed at Wed May 10 11:44:26 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:26 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:26 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14769 >/dev/null 2>/dev/null selfserv_9208 with PID 14769 found at Wed May 10 11:44:26 UTC 2017 selfserv_9208 with PID 14769 started at Wed May 10 11:44:26 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #977: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 14769 at Wed May 10 11:44:27 UTC 2017 kill -USR1 14769 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14769 killed at Wed May 10 11:44:27 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:27 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:27 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14825 >/dev/null 2>/dev/null selfserv_9208 with PID 14825 found at Wed May 10 11:44:27 UTC 2017 selfserv_9208 with PID 14825 started at Wed May 10 11:44:27 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #978: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 14825 at Wed May 10 11:44:27 UTC 2017 kill -USR1 14825 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14825 killed at Wed May 10 11:44:27 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:27 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:27 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14881 >/dev/null 2>/dev/null selfserv_9208 with PID 14881 found at Wed May 10 11:44:27 UTC 2017 selfserv_9208 with PID 14881 started at Wed May 10 11:44:27 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #979: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 14881 at Wed May 10 11:44:27 UTC 2017 kill -USR1 14881 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14881 killed at Wed May 10 11:44:27 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:28 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:28 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14949 >/dev/null 2>/dev/null selfserv_9208 with PID 14949 found at Wed May 10 11:44:28 UTC 2017 selfserv_9208 with PID 14949 started at Wed May 10 11:44:28 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #980: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 14949 at Wed May 10 11:44:28 UTC 2017 kill -USR1 14949 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14949 killed at Wed May 10 11:44:28 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:28 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:28 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15005 >/dev/null 2>/dev/null selfserv_9208 with PID 15005 found at Wed May 10 11:44:28 UTC 2017 selfserv_9208 with PID 15005 started at Wed May 10 11:44:28 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #981: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 15005 at Wed May 10 11:44:28 UTC 2017 kill -USR1 15005 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15005 killed at Wed May 10 11:44:28 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:29 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:29 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15061 >/dev/null 2>/dev/null selfserv_9208 with PID 15061 found at Wed May 10 11:44:29 UTC 2017 selfserv_9208 with PID 15061 started at Wed May 10 11:44:29 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #982: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 15061 at Wed May 10 11:44:29 UTC 2017 kill -USR1 15061 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15061 killed at Wed May 10 11:44:29 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:29 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:29 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15129 >/dev/null 2>/dev/null selfserv_9208 with PID 15129 found at Wed May 10 11:44:29 UTC 2017 selfserv_9208 with PID 15129 started at Wed May 10 11:44:29 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #983: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 15129 at Wed May 10 11:44:30 UTC 2017 kill -USR1 15129 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15129 killed at Wed May 10 11:44:30 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:30 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:30 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15185 >/dev/null 2>/dev/null selfserv_9208 with PID 15185 found at Wed May 10 11:44:30 UTC 2017 selfserv_9208 with PID 15185 started at Wed May 10 11:44:30 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #984: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 15185 at Wed May 10 11:44:31 UTC 2017 kill -USR1 15185 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15185 killed at Wed May 10 11:44:31 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:31 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:31 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15241 >/dev/null 2>/dev/null selfserv_9208 with PID 15241 found at Wed May 10 11:44:31 UTC 2017 selfserv_9208 with PID 15241 started at Wed May 10 11:44:31 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #985: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 15241 at Wed May 10 11:44:31 UTC 2017 kill -USR1 15241 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15241 killed at Wed May 10 11:44:31 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:32 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:32 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15309 >/dev/null 2>/dev/null selfserv_9208 with PID 15309 found at Wed May 10 11:44:32 UTC 2017 selfserv_9208 with PID 15309 started at Wed May 10 11:44:32 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #986: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 15309 at Wed May 10 11:44:32 UTC 2017 kill -USR1 15309 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15309 killed at Wed May 10 11:44:32 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:32 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:32 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15365 >/dev/null 2>/dev/null selfserv_9208 with PID 15365 found at Wed May 10 11:44:32 UTC 2017 selfserv_9208 with PID 15365 started at Wed May 10 11:44:32 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #987: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 15365 at Wed May 10 11:44:33 UTC 2017 kill -USR1 15365 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15365 killed at Wed May 10 11:44:33 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:33 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:33 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15421 >/dev/null 2>/dev/null selfserv_9208 with PID 15421 found at Wed May 10 11:44:33 UTC 2017 selfserv_9208 with PID 15421 started at Wed May 10 11:44:33 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #988: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 15421 at Wed May 10 11:44:33 UTC 2017 kill -USR1 15421 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15421 killed at Wed May 10 11:44:33 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:33 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:33 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15489 >/dev/null 2>/dev/null selfserv_9208 with PID 15489 found at Wed May 10 11:44:33 UTC 2017 selfserv_9208 with PID 15489 started at Wed May 10 11:44:33 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #989: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 15489 at Wed May 10 11:44:34 UTC 2017 kill -USR1 15489 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15489 killed at Wed May 10 11:44:34 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:34 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:34 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15545 >/dev/null 2>/dev/null selfserv_9208 with PID 15545 found at Wed May 10 11:44:34 UTC 2017 selfserv_9208 with PID 15545 started at Wed May 10 11:44:34 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #990: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 15545 at Wed May 10 11:44:34 UTC 2017 kill -USR1 15545 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15545 killed at Wed May 10 11:44:34 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:34 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:34 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15601 >/dev/null 2>/dev/null selfserv_9208 with PID 15601 found at Wed May 10 11:44:34 UTC 2017 selfserv_9208 with PID 15601 started at Wed May 10 11:44:34 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #991: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 15601 at Wed May 10 11:44:35 UTC 2017 kill -USR1 15601 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15601 killed at Wed May 10 11:44:35 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:35 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:35 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15669 >/dev/null 2>/dev/null selfserv_9208 with PID 15669 found at Wed May 10 11:44:35 UTC 2017 selfserv_9208 with PID 15669 started at Wed May 10 11:44:35 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #992: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 15669 at Wed May 10 11:44:35 UTC 2017 kill -USR1 15669 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15669 killed at Wed May 10 11:44:35 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:35 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:35 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15725 >/dev/null 2>/dev/null selfserv_9208 with PID 15725 found at Wed May 10 11:44:35 UTC 2017 selfserv_9208 with PID 15725 started at Wed May 10 11:44:35 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #993: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 15725 at Wed May 10 11:44:36 UTC 2017 kill -USR1 15725 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15725 killed at Wed May 10 11:44:36 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:36 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:36 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15781 >/dev/null 2>/dev/null selfserv_9208 with PID 15781 found at Wed May 10 11:44:36 UTC 2017 selfserv_9208 with PID 15781 started at Wed May 10 11:44:36 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #994: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 15781 at Wed May 10 11:44:36 UTC 2017 kill -USR1 15781 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15781 killed at Wed May 10 11:44:36 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:37 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:37 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15849 >/dev/null 2>/dev/null selfserv_9208 with PID 15849 found at Wed May 10 11:44:37 UTC 2017 selfserv_9208 with PID 15849 started at Wed May 10 11:44:37 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #995: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 15849 at Wed May 10 11:44:37 UTC 2017 kill -USR1 15849 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15849 killed at Wed May 10 11:44:37 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:37 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:37 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15905 >/dev/null 2>/dev/null selfserv_9208 with PID 15905 found at Wed May 10 11:44:37 UTC 2017 selfserv_9208 with PID 15905 started at Wed May 10 11:44:37 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #996: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 15905 at Wed May 10 11:44:37 UTC 2017 kill -USR1 15905 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15905 killed at Wed May 10 11:44:38 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:38 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:38 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15961 >/dev/null 2>/dev/null selfserv_9208 with PID 15961 found at Wed May 10 11:44:38 UTC 2017 selfserv_9208 with PID 15961 started at Wed May 10 11:44:38 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #997: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 15961 at Wed May 10 11:44:38 UTC 2017 kill -USR1 15961 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15961 killed at Wed May 10 11:44:38 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:38 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:38 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16029 >/dev/null 2>/dev/null selfserv_9208 with PID 16029 found at Wed May 10 11:44:38 UTC 2017 selfserv_9208 with PID 16029 started at Wed May 10 11:44:38 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #998: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 16029 at Wed May 10 11:44:39 UTC 2017 kill -USR1 16029 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16029 killed at Wed May 10 11:44:39 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:39 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:39 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16085 >/dev/null 2>/dev/null selfserv_9208 with PID 16085 found at Wed May 10 11:44:39 UTC 2017 selfserv_9208 with PID 16085 started at Wed May 10 11:44:39 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #999: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 16085 at Wed May 10 11:44:39 UTC 2017 kill -USR1 16085 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16085 killed at Wed May 10 11:44:39 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:39 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:39 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16141 >/dev/null 2>/dev/null selfserv_9208 with PID 16141 found at Wed May 10 11:44:39 UTC 2017 selfserv_9208 with PID 16141 started at Wed May 10 11:44:39 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #1000: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 16141 at Wed May 10 11:44:40 UTC 2017 kill -USR1 16141 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16141 killed at Wed May 10 11:44:40 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:40 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:40 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16209 >/dev/null 2>/dev/null selfserv_9208 with PID 16209 found at Wed May 10 11:44:40 UTC 2017 selfserv_9208 with PID 16209 started at Wed May 10 11:44:40 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1001: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 16209 at Wed May 10 11:44:40 UTC 2017 kill -USR1 16209 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16209 killed at Wed May 10 11:44:40 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:40 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:40 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16265 >/dev/null 2>/dev/null selfserv_9208 with PID 16265 found at Wed May 10 11:44:40 UTC 2017 selfserv_9208 with PID 16265 started at Wed May 10 11:44:40 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1002: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 16265 at Wed May 10 11:44:41 UTC 2017 kill -USR1 16265 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16265 killed at Wed May 10 11:44:41 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:41 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:41 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16321 >/dev/null 2>/dev/null selfserv_9208 with PID 16321 found at Wed May 10 11:44:41 UTC 2017 selfserv_9208 with PID 16321 started at Wed May 10 11:44:41 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1003: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 16321 at Wed May 10 11:44:41 UTC 2017 kill -USR1 16321 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16321 killed at Wed May 10 11:44:41 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:41 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:41 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16389 >/dev/null 2>/dev/null selfserv_9208 with PID 16389 found at Wed May 10 11:44:41 UTC 2017 selfserv_9208 with PID 16389 started at Wed May 10 11:44:41 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1004: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 16389 at Wed May 10 11:44:41 UTC 2017 kill -USR1 16389 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16389 killed at Wed May 10 11:44:41 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:42 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:42 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16445 >/dev/null 2>/dev/null selfserv_9208 with PID 16445 found at Wed May 10 11:44:42 UTC 2017 selfserv_9208 with PID 16445 started at Wed May 10 11:44:42 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1005: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 16445 at Wed May 10 11:44:42 UTC 2017 kill -USR1 16445 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16445 killed at Wed May 10 11:44:42 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:42 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:42 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16501 >/dev/null 2>/dev/null selfserv_9208 with PID 16501 found at Wed May 10 11:44:42 UTC 2017 selfserv_9208 with PID 16501 started at Wed May 10 11:44:42 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1006: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 16501 at Wed May 10 11:44:42 UTC 2017 kill -USR1 16501 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16501 killed at Wed May 10 11:44:42 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:42 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:42 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16570 >/dev/null 2>/dev/null selfserv_9208 with PID 16570 found at Wed May 10 11:44:42 UTC 2017 selfserv_9208 with PID 16570 started at Wed May 10 11:44:42 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #1007: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 16570 at Wed May 10 11:44:43 UTC 2017 kill -USR1 16570 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16570 killed at Wed May 10 11:44:43 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:43 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:43 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16626 >/dev/null 2>/dev/null selfserv_9208 with PID 16626 found at Wed May 10 11:44:43 UTC 2017 selfserv_9208 with PID 16626 started at Wed May 10 11:44:43 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1008: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 16626 at Wed May 10 11:44:43 UTC 2017 kill -USR1 16626 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16626 killed at Wed May 10 11:44:43 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:43 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:43 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16683 >/dev/null 2>/dev/null selfserv_9208 with PID 16683 found at Wed May 10 11:44:43 UTC 2017 selfserv_9208 with PID 16683 started at Wed May 10 11:44:43 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #1009: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 16683 at Wed May 10 11:44:44 UTC 2017 kill -USR1 16683 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16683 killed at Wed May 10 11:44:44 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:44 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:44 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16751 >/dev/null 2>/dev/null selfserv_9208 with PID 16751 found at Wed May 10 11:44:44 UTC 2017 selfserv_9208 with PID 16751 started at Wed May 10 11:44:44 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1010: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 16751 at Wed May 10 11:44:44 UTC 2017 kill -USR1 16751 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16751 killed at Wed May 10 11:44:44 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:44 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:44 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16807 >/dev/null 2>/dev/null selfserv_9208 with PID 16807 found at Wed May 10 11:44:44 UTC 2017 selfserv_9208 with PID 16807 started at Wed May 10 11:44:44 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1011: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 16807 at Wed May 10 11:44:45 UTC 2017 kill -USR1 16807 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16807 killed at Wed May 10 11:44:45 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:44:45 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:45 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16863 >/dev/null 2>/dev/null selfserv_9208 with PID 16863 found at Wed May 10 11:44:45 UTC 2017 selfserv_9208 with PID 16863 started at Wed May 10 11:44:45 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1012: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 16863 at Wed May 10 11:44:45 UTC 2017 kill -USR1 16863 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16863 killed at Wed May 10 11:44:45 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:45 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:45 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16931 >/dev/null 2>/dev/null selfserv_9208 with PID 16931 found at Wed May 10 11:44:45 UTC 2017 selfserv_9208 with PID 16931 started at Wed May 10 11:44:45 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1013: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 16931 at Wed May 10 11:44:45 UTC 2017 kill -USR1 16931 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16931 killed at Wed May 10 11:44:45 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:46 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:46 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16987 >/dev/null 2>/dev/null selfserv_9208 with PID 16987 found at Wed May 10 11:44:46 UTC 2017 selfserv_9208 with PID 16987 started at Wed May 10 11:44:46 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1014: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 16987 at Wed May 10 11:44:46 UTC 2017 kill -USR1 16987 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16987 killed at Wed May 10 11:44:46 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:46 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:46 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17043 >/dev/null 2>/dev/null selfserv_9208 with PID 17043 found at Wed May 10 11:44:46 UTC 2017 selfserv_9208 with PID 17043 started at Wed May 10 11:44:46 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1015: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 17043 at Wed May 10 11:44:46 UTC 2017 kill -USR1 17043 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17043 killed at Wed May 10 11:44:46 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:46 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:46 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17112 >/dev/null 2>/dev/null selfserv_9208 with PID 17112 found at Wed May 10 11:44:46 UTC 2017 selfserv_9208 with PID 17112 started at Wed May 10 11:44:46 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #1016: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 17112 at Wed May 10 11:44:47 UTC 2017 kill -USR1 17112 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17112 killed at Wed May 10 11:44:47 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:47 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:47 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17168 >/dev/null 2>/dev/null selfserv_9208 with PID 17168 found at Wed May 10 11:44:47 UTC 2017 selfserv_9208 with PID 17168 started at Wed May 10 11:44:47 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1017: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 17168 at Wed May 10 11:44:47 UTC 2017 kill -USR1 17168 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17168 killed at Wed May 10 11:44:47 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:47 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:47 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17224 >/dev/null 2>/dev/null selfserv_9208 with PID 17224 found at Wed May 10 11:44:47 UTC 2017 selfserv_9208 with PID 17224 started at Wed May 10 11:44:47 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #1018: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 17224 at Wed May 10 11:44:48 UTC 2017 kill -USR1 17224 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17224 killed at Wed May 10 11:44:48 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:48 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17301 >/dev/null 2>/dev/null selfserv_9208 with PID 17301 found at Wed May 10 11:44:48 UTC 2017 selfserv_9208 with PID 17301 started at Wed May 10 11:44:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1019: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 17301 at Wed May 10 11:44:48 UTC 2017 kill -USR1 17301 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17301 killed at Wed May 10 11:44:48 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:48 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17357 >/dev/null 2>/dev/null selfserv_9208 with PID 17357 found at Wed May 10 11:44:48 UTC 2017 selfserv_9208 with PID 17357 started at Wed May 10 11:44:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1020: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 17357 at Wed May 10 11:44:49 UTC 2017 kill -USR1 17357 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17357 killed at Wed May 10 11:44:49 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:49 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:49 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17413 >/dev/null 2>/dev/null selfserv_9208 with PID 17413 found at Wed May 10 11:44:49 UTC 2017 selfserv_9208 with PID 17413 started at Wed May 10 11:44:49 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1021: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 17413 at Wed May 10 11:44:49 UTC 2017 kill -USR1 17413 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17413 killed at Wed May 10 11:44:49 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:49 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:49 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17481 >/dev/null 2>/dev/null selfserv_9208 with PID 17481 found at Wed May 10 11:44:49 UTC 2017 selfserv_9208 with PID 17481 started at Wed May 10 11:44:49 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #1022: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 17481 at Wed May 10 11:44:50 UTC 2017 kill -USR1 17481 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17481 killed at Wed May 10 11:44:50 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:50 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:50 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17537 >/dev/null 2>/dev/null selfserv_9208 with PID 17537 found at Wed May 10 11:44:50 UTC 2017 selfserv_9208 with PID 17537 started at Wed May 10 11:44:50 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1023: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 17537 at Wed May 10 11:44:50 UTC 2017 kill -USR1 17537 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17537 killed at Wed May 10 11:44:50 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:50 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:50 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17593 >/dev/null 2>/dev/null selfserv_9208 with PID 17593 found at Wed May 10 11:44:50 UTC 2017 selfserv_9208 with PID 17593 started at Wed May 10 11:44:50 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #1024: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 17593 at Wed May 10 11:44:50 UTC 2017 kill -USR1 17593 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17593 killed at Wed May 10 11:44:50 UTC 2017 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:51 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:51 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17661 >/dev/null 2>/dev/null selfserv_9208 with PID 17661 found at Wed May 10 11:44:51 UTC 2017 selfserv_9208 with PID 17661 started at Wed May 10 11:44:51 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1025: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 17661 at Wed May 10 11:44:51 UTC 2017 kill -USR1 17661 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17661 killed at Wed May 10 11:44:51 UTC 2017 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:51 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:51 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17717 >/dev/null 2>/dev/null selfserv_9208 with PID 17717 found at Wed May 10 11:44:51 UTC 2017 selfserv_9208 with PID 17717 started at Wed May 10 11:44:51 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1026: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 17717 at Wed May 10 11:44:51 UTC 2017 kill -USR1 17717 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17717 killed at Wed May 10 11:44:51 UTC 2017 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:51 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:51 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17773 >/dev/null 2>/dev/null selfserv_9208 with PID 17773 found at Wed May 10 11:44:51 UTC 2017 selfserv_9208 with PID 17773 started at Wed May 10 11:44:51 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1027: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 17773 at Wed May 10 11:44:52 UTC 2017 kill -USR1 17773 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17773 killed at Wed May 10 11:44:52 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:52 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:52 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17841 >/dev/null 2>/dev/null selfserv_9208 with PID 17841 found at Wed May 10 11:44:52 UTC 2017 selfserv_9208 with PID 17841 started at Wed May 10 11:44:52 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #1028: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 17841 at Wed May 10 11:44:52 UTC 2017 kill -USR1 17841 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17841 killed at Wed May 10 11:44:52 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:52 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:52 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17897 >/dev/null 2>/dev/null selfserv_9208 with PID 17897 found at Wed May 10 11:44:52 UTC 2017 selfserv_9208 with PID 17897 started at Wed May 10 11:44:52 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1029: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 17897 at Wed May 10 11:44:53 UTC 2017 kill -USR1 17897 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17897 killed at Wed May 10 11:44:53 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:53 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17953 >/dev/null 2>/dev/null selfserv_9208 with PID 17953 found at Wed May 10 11:44:53 UTC 2017 selfserv_9208 with PID 17953 started at Wed May 10 11:44:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #1030: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 17953 at Wed May 10 11:44:53 UTC 2017 kill -USR1 17953 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17953 killed at Wed May 10 11:44:53 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:53 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18021 >/dev/null 2>/dev/null selfserv_9208 with PID 18021 found at Wed May 10 11:44:53 UTC 2017 selfserv_9208 with PID 18021 started at Wed May 10 11:44:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1031: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 18021 at Wed May 10 11:44:53 UTC 2017 kill -USR1 18021 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18021 killed at Wed May 10 11:44:53 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:53 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18077 >/dev/null 2>/dev/null selfserv_9208 with PID 18077 found at Wed May 10 11:44:53 UTC 2017 selfserv_9208 with PID 18077 started at Wed May 10 11:44:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1032: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 18077 at Wed May 10 11:44:54 UTC 2017 kill -USR1 18077 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18077 killed at Wed May 10 11:44:54 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:54 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:54 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18133 >/dev/null 2>/dev/null selfserv_9208 with PID 18133 found at Wed May 10 11:44:54 UTC 2017 selfserv_9208 with PID 18133 started at Wed May 10 11:44:54 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1033: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 18133 at Wed May 10 11:44:54 UTC 2017 kill -USR1 18133 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18133 killed at Wed May 10 11:44:54 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:54 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:54 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18201 >/dev/null 2>/dev/null selfserv_9208 with PID 18201 found at Wed May 10 11:44:54 UTC 2017 selfserv_9208 with PID 18201 started at Wed May 10 11:44:54 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #1034: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 18201 at Wed May 10 11:44:55 UTC 2017 kill -USR1 18201 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18201 killed at Wed May 10 11:44:55 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:55 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18257 >/dev/null 2>/dev/null selfserv_9208 with PID 18257 found at Wed May 10 11:44:55 UTC 2017 selfserv_9208 with PID 18257 started at Wed May 10 11:44:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1035: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 18257 at Wed May 10 11:44:55 UTC 2017 kill -USR1 18257 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18257 killed at Wed May 10 11:44:55 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:55 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18313 >/dev/null 2>/dev/null selfserv_9208 with PID 18313 found at Wed May 10 11:44:55 UTC 2017 selfserv_9208 with PID 18313 started at Wed May 10 11:44:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #1036: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 18313 at Wed May 10 11:44:55 UTC 2017 kill -USR1 18313 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18313 killed at Wed May 10 11:44:55 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:56 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18381 >/dev/null 2>/dev/null selfserv_9208 with PID 18381 found at Wed May 10 11:44:56 UTC 2017 selfserv_9208 with PID 18381 started at Wed May 10 11:44:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1037: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 18381 at Wed May 10 11:44:56 UTC 2017 kill -USR1 18381 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18381 killed at Wed May 10 11:44:56 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:56 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18437 >/dev/null 2>/dev/null selfserv_9208 with PID 18437 found at Wed May 10 11:44:56 UTC 2017 selfserv_9208 with PID 18437 started at Wed May 10 11:44:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1038: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 18437 at Wed May 10 11:44:56 UTC 2017 kill -USR1 18437 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18437 killed at Wed May 10 11:44:56 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:56 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18493 >/dev/null 2>/dev/null selfserv_9208 with PID 18493 found at Wed May 10 11:44:56 UTC 2017 selfserv_9208 with PID 18493 started at Wed May 10 11:44:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1039: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 18493 at Wed May 10 11:44:56 UTC 2017 kill -USR1 18493 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18493 killed at Wed May 10 11:44:57 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:57 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18561 >/dev/null 2>/dev/null selfserv_9208 with PID 18561 found at Wed May 10 11:44:57 UTC 2017 selfserv_9208 with PID 18561 started at Wed May 10 11:44:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #1040: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 18561 at Wed May 10 11:44:57 UTC 2017 kill -USR1 18561 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18561 killed at Wed May 10 11:44:57 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:57 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18617 >/dev/null 2>/dev/null selfserv_9208 with PID 18617 found at Wed May 10 11:44:57 UTC 2017 selfserv_9208 with PID 18617 started at Wed May 10 11:44:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1041: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 18617 at Wed May 10 11:44:57 UTC 2017 kill -USR1 18617 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18617 killed at Wed May 10 11:44:57 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:57 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18673 >/dev/null 2>/dev/null selfserv_9208 with PID 18673 found at Wed May 10 11:44:57 UTC 2017 selfserv_9208 with PID 18673 started at Wed May 10 11:44:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #1042: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 18673 at Wed May 10 11:44:58 UTC 2017 kill -USR1 18673 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18673 killed at Wed May 10 11:44:58 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:58 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18741 >/dev/null 2>/dev/null selfserv_9208 with PID 18741 found at Wed May 10 11:44:58 UTC 2017 selfserv_9208 with PID 18741 started at Wed May 10 11:44:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1043: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 18741 at Wed May 10 11:44:58 UTC 2017 kill -USR1 18741 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18741 killed at Wed May 10 11:44:58 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:58 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18797 >/dev/null 2>/dev/null selfserv_9208 with PID 18797 found at Wed May 10 11:44:58 UTC 2017 selfserv_9208 with PID 18797 started at Wed May 10 11:44:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1044: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 18797 at Wed May 10 11:44:59 UTC 2017 kill -USR1 18797 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18797 killed at Wed May 10 11:44:59 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:44:59 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:59 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18853 >/dev/null 2>/dev/null selfserv_9208 with PID 18853 found at Wed May 10 11:44:59 UTC 2017 selfserv_9208 with PID 18853 started at Wed May 10 11:44:59 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1045: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 18853 at Wed May 10 11:44:59 UTC 2017 kill -USR1 18853 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18853 killed at Wed May 10 11:44:59 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:44:59 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:44:59 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18921 >/dev/null 2>/dev/null selfserv_9208 with PID 18921 found at Wed May 10 11:44:59 UTC 2017 selfserv_9208 with PID 18921 started at Wed May 10 11:44:59 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #1046: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 18921 at Wed May 10 11:45:00 UTC 2017 kill -USR1 18921 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18921 killed at Wed May 10 11:45:00 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:45:00 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18977 >/dev/null 2>/dev/null selfserv_9208 with PID 18977 found at Wed May 10 11:45:00 UTC 2017 selfserv_9208 with PID 18977 started at Wed May 10 11:45:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1047: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 18977 at Wed May 10 11:45:00 UTC 2017 kill -USR1 18977 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18977 killed at Wed May 10 11:45:00 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:45:00 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19033 >/dev/null 2>/dev/null selfserv_9208 with PID 19033 found at Wed May 10 11:45:00 UTC 2017 selfserv_9208 with PID 19033 started at Wed May 10 11:45:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #1048: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 19033 at Wed May 10 11:45:01 UTC 2017 kill -USR1 19033 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19033 killed at Wed May 10 11:45:01 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:45:01 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19101 >/dev/null 2>/dev/null selfserv_9208 with PID 19101 found at Wed May 10 11:45:01 UTC 2017 selfserv_9208 with PID 19101 started at Wed May 10 11:45:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1049: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 19101 at Wed May 10 11:45:01 UTC 2017 kill -USR1 19101 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19101 killed at Wed May 10 11:45:01 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:45:01 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19157 >/dev/null 2>/dev/null selfserv_9208 with PID 19157 found at Wed May 10 11:45:01 UTC 2017 selfserv_9208 with PID 19157 started at Wed May 10 11:45:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1050: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 19157 at Wed May 10 11:45:02 UTC 2017 kill -USR1 19157 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19157 killed at Wed May 10 11:45:02 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:45:02 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19213 >/dev/null 2>/dev/null selfserv_9208 with PID 19213 found at Wed May 10 11:45:02 UTC 2017 selfserv_9208 with PID 19213 started at Wed May 10 11:45:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1051: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 19213 at Wed May 10 11:45:02 UTC 2017 kill -USR1 19213 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19213 killed at Wed May 10 11:45:02 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:45:02 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19281 >/dev/null 2>/dev/null selfserv_9208 with PID 19281 found at Wed May 10 11:45:02 UTC 2017 selfserv_9208 with PID 19281 started at Wed May 10 11:45:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #1052: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 19281 at Wed May 10 11:45:03 UTC 2017 kill -USR1 19281 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19281 killed at Wed May 10 11:45:03 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:45:03 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19337 >/dev/null 2>/dev/null selfserv_9208 with PID 19337 found at Wed May 10 11:45:03 UTC 2017 selfserv_9208 with PID 19337 started at Wed May 10 11:45:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1053: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 19337 at Wed May 10 11:45:03 UTC 2017 kill -USR1 19337 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19337 killed at Wed May 10 11:45:03 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:45:03 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19393 >/dev/null 2>/dev/null selfserv_9208 with PID 19393 found at Wed May 10 11:45:03 UTC 2017 selfserv_9208 with PID 19393 started at Wed May 10 11:45:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #1054: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 19393 at Wed May 10 11:45:04 UTC 2017 kill -USR1 19393 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19393 killed at Wed May 10 11:45:04 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:45:04 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19461 >/dev/null 2>/dev/null selfserv_9208 with PID 19461 found at Wed May 10 11:45:04 UTC 2017 selfserv_9208 with PID 19461 started at Wed May 10 11:45:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1055: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 19461 at Wed May 10 11:45:04 UTC 2017 kill -USR1 19461 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19461 killed at Wed May 10 11:45:04 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:45:04 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19517 >/dev/null 2>/dev/null selfserv_9208 with PID 19517 found at Wed May 10 11:45:04 UTC 2017 selfserv_9208 with PID 19517 started at Wed May 10 11:45:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1056: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 19517 at Wed May 10 11:45:05 UTC 2017 kill -USR1 19517 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19517 killed at Wed May 10 11:45:05 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:45:05 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:05 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19573 >/dev/null 2>/dev/null selfserv_9208 with PID 19573 found at Wed May 10 11:45:05 UTC 2017 selfserv_9208 with PID 19573 started at Wed May 10 11:45:05 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1057: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 19573 at Wed May 10 11:45:05 UTC 2017 kill -USR1 19573 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19573 killed at Wed May 10 11:45:05 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:45:06 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19641 >/dev/null 2>/dev/null selfserv_9208 with PID 19641 found at Wed May 10 11:45:06 UTC 2017 selfserv_9208 with PID 19641 started at Wed May 10 11:45:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #1058: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 19641 at Wed May 10 11:45:06 UTC 2017 kill -USR1 19641 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19641 killed at Wed May 10 11:45:06 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:45:06 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19697 >/dev/null 2>/dev/null selfserv_9208 with PID 19697 found at Wed May 10 11:45:06 UTC 2017 selfserv_9208 with PID 19697 started at Wed May 10 11:45:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1059: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 19697 at Wed May 10 11:45:07 UTC 2017 kill -USR1 19697 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19697 killed at Wed May 10 11:45:07 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:45:07 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19753 >/dev/null 2>/dev/null selfserv_9208 with PID 19753 found at Wed May 10 11:45:07 UTC 2017 selfserv_9208 with PID 19753 started at Wed May 10 11:45:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #1060: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 19753 at Wed May 10 11:45:07 UTC 2017 kill -USR1 19753 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19753 killed at Wed May 10 11:45:07 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:45:07 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19821 >/dev/null 2>/dev/null selfserv_9208 with PID 19821 found at Wed May 10 11:45:07 UTC 2017 selfserv_9208 with PID 19821 started at Wed May 10 11:45:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1061: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 19821 at Wed May 10 11:45:08 UTC 2017 kill -USR1 19821 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19821 killed at Wed May 10 11:45:08 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:45:08 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19877 >/dev/null 2>/dev/null selfserv_9208 with PID 19877 found at Wed May 10 11:45:08 UTC 2017 selfserv_9208 with PID 19877 started at Wed May 10 11:45:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1062: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 19877 at Wed May 10 11:45:08 UTC 2017 kill -USR1 19877 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19877 killed at Wed May 10 11:45:08 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:45:08 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19933 >/dev/null 2>/dev/null selfserv_9208 with PID 19933 found at Wed May 10 11:45:08 UTC 2017 selfserv_9208 with PID 19933 started at Wed May 10 11:45:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1063: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 19933 at Wed May 10 11:45:09 UTC 2017 kill -USR1 19933 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19933 killed at Wed May 10 11:45:09 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:45:09 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20001 >/dev/null 2>/dev/null selfserv_9208 with PID 20001 found at Wed May 10 11:45:09 UTC 2017 selfserv_9208 with PID 20001 started at Wed May 10 11:45:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #1064: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 20001 at Wed May 10 11:45:09 UTC 2017 kill -USR1 20001 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20001 killed at Wed May 10 11:45:09 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:45:09 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20057 >/dev/null 2>/dev/null selfserv_9208 with PID 20057 found at Wed May 10 11:45:09 UTC 2017 selfserv_9208 with PID 20057 started at Wed May 10 11:45:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1065: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 20057 at Wed May 10 11:45:10 UTC 2017 kill -USR1 20057 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20057 killed at Wed May 10 11:45:10 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:45:10 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20113 >/dev/null 2>/dev/null selfserv_9208 with PID 20113 found at Wed May 10 11:45:10 UTC 2017 selfserv_9208 with PID 20113 started at Wed May 10 11:45:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #1066: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 20113 at Wed May 10 11:45:11 UTC 2017 kill -USR1 20113 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20113 killed at Wed May 10 11:45:11 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:45:11 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20181 >/dev/null 2>/dev/null selfserv_9208 with PID 20181 found at Wed May 10 11:45:11 UTC 2017 selfserv_9208 with PID 20181 started at Wed May 10 11:45:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1067: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 20181 at Wed May 10 11:45:11 UTC 2017 kill -USR1 20181 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20181 killed at Wed May 10 11:45:11 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:45:11 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20237 >/dev/null 2>/dev/null selfserv_9208 with PID 20237 found at Wed May 10 11:45:11 UTC 2017 selfserv_9208 with PID 20237 started at Wed May 10 11:45:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1068: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 20237 at Wed May 10 11:45:11 UTC 2017 kill -USR1 20237 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20237 killed at Wed May 10 11:45:11 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:45:11 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20293 >/dev/null 2>/dev/null selfserv_9208 with PID 20293 found at Wed May 10 11:45:11 UTC 2017 selfserv_9208 with PID 20293 started at Wed May 10 11:45:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1069: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 20293 at Wed May 10 11:45:12 UTC 2017 kill -USR1 20293 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20293 killed at Wed May 10 11:45:12 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:45:12 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20361 >/dev/null 2>/dev/null selfserv_9208 with PID 20361 found at Wed May 10 11:45:12 UTC 2017 selfserv_9208 with PID 20361 started at Wed May 10 11:45:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #1070: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 20361 at Wed May 10 11:45:12 UTC 2017 kill -USR1 20361 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20361 killed at Wed May 10 11:45:12 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:45:12 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20417 >/dev/null 2>/dev/null selfserv_9208 with PID 20417 found at Wed May 10 11:45:12 UTC 2017 selfserv_9208 with PID 20417 started at Wed May 10 11:45:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1071: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 20417 at Wed May 10 11:45:13 UTC 2017 kill -USR1 20417 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20417 killed at Wed May 10 11:45:13 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:45:13 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20473 >/dev/null 2>/dev/null selfserv_9208 with PID 20473 found at Wed May 10 11:45:13 UTC 2017 selfserv_9208 with PID 20473 started at Wed May 10 11:45:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #1072: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 20473 at Wed May 10 11:45:13 UTC 2017 kill -USR1 20473 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20473 killed at Wed May 10 11:45:13 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:45:13 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20541 >/dev/null 2>/dev/null selfserv_9208 with PID 20541 found at Wed May 10 11:45:13 UTC 2017 selfserv_9208 with PID 20541 started at Wed May 10 11:45:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1073: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 20541 at Wed May 10 11:45:14 UTC 2017 kill -USR1 20541 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20541 killed at Wed May 10 11:45:14 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:45:14 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20597 >/dev/null 2>/dev/null selfserv_9208 with PID 20597 found at Wed May 10 11:45:14 UTC 2017 selfserv_9208 with PID 20597 started at Wed May 10 11:45:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1074: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 20597 at Wed May 10 11:45:14 UTC 2017 kill -USR1 20597 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20597 killed at Wed May 10 11:45:14 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:45:14 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20653 >/dev/null 2>/dev/null selfserv_9208 with PID 20653 found at Wed May 10 11:45:14 UTC 2017 selfserv_9208 with PID 20653 started at Wed May 10 11:45:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1075: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 20653 at Wed May 10 11:45:15 UTC 2017 kill -USR1 20653 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20653 killed at Wed May 10 11:45:15 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:45:15 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20721 >/dev/null 2>/dev/null selfserv_9208 with PID 20721 found at Wed May 10 11:45:15 UTC 2017 selfserv_9208 with PID 20721 started at Wed May 10 11:45:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #1076: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 20721 at Wed May 10 11:45:15 UTC 2017 kill -USR1 20721 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20721 killed at Wed May 10 11:45:15 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:45:15 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20777 >/dev/null 2>/dev/null selfserv_9208 with PID 20777 found at Wed May 10 11:45:15 UTC 2017 selfserv_9208 with PID 20777 started at Wed May 10 11:45:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1077: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 20777 at Wed May 10 11:45:16 UTC 2017 kill -USR1 20777 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20777 killed at Wed May 10 11:45:16 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:45:16 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20833 >/dev/null 2>/dev/null selfserv_9208 with PID 20833 found at Wed May 10 11:45:16 UTC 2017 selfserv_9208 with PID 20833 started at Wed May 10 11:45:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #1078: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 20833 at Wed May 10 11:45:16 UTC 2017 kill -USR1 20833 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20833 killed at Wed May 10 11:45:16 UTC 2017 ssl.sh: Cache CRL SSL Client Tests - with ECC =============================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/authin.tl.tmp 0 selfserv_9208 starting at Wed May 10 11:45:16 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:16 UTC 2017 selfserv_9208 with PID 20896 started at Wed May 10 11:45:16 UTC 2017 Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:17 UTC 2017 ssl.sh: #1079: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:17 UTC 2017 ssl.sh: #1080: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:17 UTC 2017 ssl.sh: #1081: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:17 UTC 2017 ssl.sh: #1082: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:17 UTC 2017 ssl.sh: #1083: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:18 UTC 2017 ssl.sh: #1084: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:18 UTC 2017 ssl.sh: #1085: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:18 UTC 2017 ssl.sh: #1086: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:18 UTC 2017 ssl.sh: #1087: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:19 UTC 2017 ssl.sh: #1088: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:19 UTC 2017 ssl.sh: #1089: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:19 UTC 2017 ssl.sh: #1090: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:19 UTC 2017 ssl.sh: #1091: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:20 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1092: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:20 UTC 2017 ssl.sh: #1093: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:20 UTC 2017 ssl.sh: #1094: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:20 UTC 2017 ssl.sh: #1095: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:20 UTC 2017 ssl.sh: #1096: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:21 UTC 2017 ssl.sh: #1097: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:21 UTC 2017 ssl.sh: #1098: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:21 UTC 2017 ssl.sh: #1099: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:21 UTC 2017 ssl.sh: #1100: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:22 UTC 2017 ssl.sh: #1101: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:22 UTC 2017 ssl.sh: #1102: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:22 UTC 2017 ssl.sh: #1103: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:22 UTC 2017 ssl.sh: #1104: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:23 UTC 2017 ssl.sh: #1105: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:23 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1106: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:23 UTC 2017 ssl.sh: #1107: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:23 UTC 2017 ssl.sh: #1108: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:23 UTC 2017 ssl.sh: #1109: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:24 UTC 2017 ssl.sh: #1110: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:24 UTC 2017 ssl.sh: #1111: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:24 UTC 2017 ssl.sh: #1112: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:24 UTC 2017 ssl.sh: #1113: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:25 UTC 2017 ssl.sh: #1114: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:25 UTC 2017 ssl.sh: #1115: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:25 UTC 2017 ssl.sh: #1116: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:25 UTC 2017 ssl.sh: #1117: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:25 UTC 2017 ssl.sh: #1118: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20896 >/dev/null 2>/dev/null selfserv_9208 with PID 20896 found at Wed May 10 11:45:26 UTC 2017 ssl.sh: #1119: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 20896 at Wed May 10 11:45:26 UTC 2017 kill -USR1 20896 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20896 killed at Wed May 10 11:45:26 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 11:45:26 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:26 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:26 UTC 2017 selfserv_9208 with PID 22319 started at Wed May 10 11:45:26 UTC 2017 Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:26 UTC 2017 ssl.sh: #1120: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:26 UTC 2017 ssl.sh: #1121: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:27 UTC 2017 ssl.sh: #1122: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:27 UTC 2017 ssl.sh: #1123: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:27 UTC 2017 ssl.sh: #1124: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:27 UTC 2017 ssl.sh: #1125: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:27 UTC 2017 ssl.sh: #1126: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:28 UTC 2017 ssl.sh: #1127: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:28 UTC 2017 ssl.sh: #1128: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:28 UTC 2017 ssl.sh: #1129: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:28 UTC 2017 ssl.sh: #1130: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:29 UTC 2017 ssl.sh: #1131: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:29 UTC 2017 ssl.sh: #1132: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:29 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1133: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:29 UTC 2017 ssl.sh: #1134: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:29 UTC 2017 ssl.sh: #1135: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:30 UTC 2017 ssl.sh: #1136: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:30 UTC 2017 ssl.sh: #1137: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:30 UTC 2017 ssl.sh: #1138: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:30 UTC 2017 ssl.sh: #1139: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:30 UTC 2017 ssl.sh: #1140: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:31 UTC 2017 ssl.sh: #1141: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:31 UTC 2017 ssl.sh: #1142: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:31 UTC 2017 ssl.sh: #1143: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:31 UTC 2017 ssl.sh: #1144: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:32 UTC 2017 ssl.sh: #1145: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:32 UTC 2017 ssl.sh: #1146: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:32 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1147: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:32 UTC 2017 ssl.sh: #1148: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:32 UTC 2017 ssl.sh: #1149: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:33 UTC 2017 ssl.sh: #1150: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:33 UTC 2017 ssl.sh: #1151: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:33 UTC 2017 ssl.sh: #1152: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:33 UTC 2017 ssl.sh: #1153: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:33 UTC 2017 ssl.sh: #1154: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:34 UTC 2017 ssl.sh: #1155: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:34 UTC 2017 ssl.sh: #1156: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:34 UTC 2017 ssl.sh: #1157: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:34 UTC 2017 ssl.sh: #1158: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:35 UTC 2017 ssl.sh: #1159: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22319 >/dev/null 2>/dev/null selfserv_9208 with PID 22319 found at Wed May 10 11:45:35 UTC 2017 ssl.sh: #1160: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 22319 at Wed May 10 11:45:35 UTC 2017 kill -USR1 22319 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22319 killed at Wed May 10 11:45:35 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 11:45:35 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:35 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:35 UTC 2017 selfserv_9208 with PID 23747 started at Wed May 10 11:45:35 UTC 2017 Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:35 UTC 2017 ssl.sh: #1161: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:36 UTC 2017 ssl.sh: #1162: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:36 UTC 2017 ssl.sh: #1163: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:36 UTC 2017 ssl.sh: #1164: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:36 UTC 2017 ssl.sh: #1165: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:37 UTC 2017 ssl.sh: #1166: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:37 UTC 2017 ssl.sh: #1167: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:37 UTC 2017 ssl.sh: #1168: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:37 UTC 2017 ssl.sh: #1169: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:38 UTC 2017 ssl.sh: #1170: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:38 UTC 2017 ssl.sh: #1171: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:38 UTC 2017 ssl.sh: #1172: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:38 UTC 2017 ssl.sh: #1173: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:39 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1174: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:39 UTC 2017 ssl.sh: #1175: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:39 UTC 2017 ssl.sh: #1176: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:39 UTC 2017 ssl.sh: #1177: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:40 UTC 2017 ssl.sh: #1178: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:40 UTC 2017 ssl.sh: #1179: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:40 UTC 2017 ssl.sh: #1180: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:40 UTC 2017 ssl.sh: #1181: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:41 UTC 2017 ssl.sh: #1182: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:41 UTC 2017 ssl.sh: #1183: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:41 UTC 2017 ssl.sh: #1184: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:41 UTC 2017 ssl.sh: #1185: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:42 UTC 2017 ssl.sh: #1186: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:42 UTC 2017 ssl.sh: #1187: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:42 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1188: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:42 UTC 2017 ssl.sh: #1189: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:43 UTC 2017 ssl.sh: #1190: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:43 UTC 2017 ssl.sh: #1191: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:43 UTC 2017 ssl.sh: #1192: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:43 UTC 2017 ssl.sh: #1193: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:44 UTC 2017 ssl.sh: #1194: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:44 UTC 2017 ssl.sh: #1195: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:44 UTC 2017 ssl.sh: #1196: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:44 UTC 2017 ssl.sh: #1197: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:45 UTC 2017 ssl.sh: #1198: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:45 UTC 2017 ssl.sh: #1199: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:45 UTC 2017 ssl.sh: #1200: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23747 >/dev/null 2>/dev/null selfserv_9208 with PID 23747 found at Wed May 10 11:45:45 UTC 2017 ssl.sh: #1201: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 23747 at Wed May 10 11:45:45 UTC 2017 kill -USR1 23747 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23747 killed at Wed May 10 11:45:45 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:45:45 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:45 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:45 UTC 2017 selfserv_9208 with PID 25170 started at Wed May 10 11:45:45 UTC 2017 Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:46 UTC 2017 ssl.sh: #1202: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:46 UTC 2017 ssl.sh: #1203: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:46 UTC 2017 ssl.sh: #1204: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:46 UTC 2017 ssl.sh: #1205: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:47 UTC 2017 ssl.sh: #1206: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:47 UTC 2017 ssl.sh: #1207: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:47 UTC 2017 ssl.sh: #1208: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:47 UTC 2017 ssl.sh: #1209: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:48 UTC 2017 ssl.sh: #1210: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:48 UTC 2017 ssl.sh: #1211: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:48 UTC 2017 ssl.sh: #1212: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:48 UTC 2017 ssl.sh: #1213: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:49 UTC 2017 ssl.sh: #1214: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:49 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1215: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:49 UTC 2017 ssl.sh: #1216: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:49 UTC 2017 ssl.sh: #1217: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:50 UTC 2017 ssl.sh: #1218: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:50 UTC 2017 ssl.sh: #1219: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:50 UTC 2017 ssl.sh: #1220: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:50 UTC 2017 ssl.sh: #1221: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:51 UTC 2017 ssl.sh: #1222: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:51 UTC 2017 ssl.sh: #1223: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:51 UTC 2017 ssl.sh: #1224: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:51 UTC 2017 ssl.sh: #1225: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:52 UTC 2017 ssl.sh: #1226: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:52 UTC 2017 ssl.sh: #1227: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:52 UTC 2017 ssl.sh: #1228: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:52 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1229: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:53 UTC 2017 ssl.sh: #1230: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:53 UTC 2017 ssl.sh: #1231: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:53 UTC 2017 ssl.sh: #1232: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:53 UTC 2017 ssl.sh: #1233: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:53 UTC 2017 ssl.sh: #1234: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:54 UTC 2017 ssl.sh: #1235: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:54 UTC 2017 ssl.sh: #1236: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:54 UTC 2017 ssl.sh: #1237: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:54 UTC 2017 ssl.sh: #1238: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:55 UTC 2017 ssl.sh: #1239: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:55 UTC 2017 ssl.sh: #1240: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:55 UTC 2017 ssl.sh: #1241: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25170 >/dev/null 2>/dev/null selfserv_9208 with PID 25170 found at Wed May 10 11:45:55 UTC 2017 ssl.sh: #1242: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 25170 at Wed May 10 11:45:55 UTC 2017 kill -USR1 25170 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25170 killed at Wed May 10 11:45:55 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:45:55 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26594 >/dev/null 2>/dev/null selfserv_9208 with PID 26594 found at Wed May 10 11:45:55 UTC 2017 selfserv_9208 with PID 26594 started at Wed May 10 11:45:55 UTC 2017 trying to kill selfserv_9208 with PID 26594 at Wed May 10 11:45:55 UTC 2017 kill -USR1 26594 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26594 killed at Wed May 10 11:45:55 UTC 2017 selfserv_9208 starting at Wed May 10 11:45:55 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:45:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:45:56 UTC 2017 selfserv_9208 with PID 26636 started at Wed May 10 11:45:56 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:45:56 UTC 2017 ssl.sh: #1243: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:45:56 UTC 2017 ssl.sh: #1244: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:45:56 UTC 2017 ssl.sh: #1245: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:45:57 UTC 2017 ssl.sh: #1246: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:45:57 UTC 2017 ssl.sh: #1247: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:45:57 UTC 2017 ssl.sh: #1248: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:45:58 UTC 2017 ssl.sh: #1249: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:45:58 UTC 2017 ssl.sh: #1250: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:45:58 UTC 2017 ssl.sh: #1251: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:45:59 UTC 2017 ssl.sh: #1252: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:45:59 UTC 2017 ssl.sh: #1253: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:45:59 UTC 2017 ssl.sh: #1254: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:46:00 UTC 2017 ssl.sh: #1255: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:46:00 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1256: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:46:00 UTC 2017 ssl.sh: #1257: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:46:00 UTC 2017 ssl.sh: #1258: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:46:01 UTC 2017 ssl.sh: #1259: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:46:01 UTC 2017 ssl.sh: #1260: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:46:01 UTC 2017 ssl.sh: #1261: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:46:02 UTC 2017 ssl.sh: #1262: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:46:02 UTC 2017 ssl.sh: #1263: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:46:02 UTC 2017 ssl.sh: #1264: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:46:02 UTC 2017 ssl.sh: #1265: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:46:03 UTC 2017 ssl.sh: #1266: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:46:03 UTC 2017 ssl.sh: #1267: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:46:03 UTC 2017 ssl.sh: #1268: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:46:04 UTC 2017 ssl.sh: #1269: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:46:04 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1270: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:46:04 UTC 2017 ssl.sh: #1271: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:46:05 UTC 2017 ssl.sh: #1272: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:46:05 UTC 2017 ssl.sh: #1273: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:46:05 UTC 2017 ssl.sh: #1274: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:46:05 UTC 2017 ssl.sh: #1275: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:46:06 UTC 2017 ssl.sh: #1276: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:46:06 UTC 2017 ssl.sh: #1277: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:46:06 UTC 2017 ssl.sh: #1278: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:46:07 UTC 2017 ssl.sh: #1279: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:46:07 UTC 2017 ssl.sh: #1280: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:46:07 UTC 2017 ssl.sh: #1281: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:46:08 UTC 2017 ssl.sh: #1282: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26636 >/dev/null 2>/dev/null selfserv_9208 with PID 26636 found at Wed May 10 11:46:08 UTC 2017 ssl.sh: #1283: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 26636 at Wed May 10 11:46:08 UTC 2017 kill -USR1 26636 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26636 killed at Wed May 10 11:46:08 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:46:08 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:46:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:08 UTC 2017 selfserv_9208 with PID 28058 started at Wed May 10 11:46:08 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:08 UTC 2017 ssl.sh: #1284: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:09 UTC 2017 ssl.sh: #1285: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:09 UTC 2017 ssl.sh: #1286: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:10 UTC 2017 ssl.sh: #1287: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:10 UTC 2017 ssl.sh: #1288: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:10 UTC 2017 ssl.sh: #1289: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:11 UTC 2017 ssl.sh: #1290: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:11 UTC 2017 ssl.sh: #1291: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:11 UTC 2017 ssl.sh: #1292: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:12 UTC 2017 ssl.sh: #1293: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:12 UTC 2017 ssl.sh: #1294: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:12 UTC 2017 ssl.sh: #1295: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:13 UTC 2017 ssl.sh: #1296: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:13 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1297: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:13 UTC 2017 ssl.sh: #1298: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:14 UTC 2017 ssl.sh: #1299: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:14 UTC 2017 ssl.sh: #1300: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:14 UTC 2017 ssl.sh: #1301: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:15 UTC 2017 ssl.sh: #1302: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:15 UTC 2017 ssl.sh: #1303: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:15 UTC 2017 ssl.sh: #1304: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:16 UTC 2017 ssl.sh: #1305: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:16 UTC 2017 ssl.sh: #1306: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:16 UTC 2017 ssl.sh: #1307: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:17 UTC 2017 ssl.sh: #1308: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:17 UTC 2017 ssl.sh: #1309: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:18 UTC 2017 ssl.sh: #1310: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:18 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1311: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:18 UTC 2017 ssl.sh: #1312: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:18 UTC 2017 ssl.sh: #1313: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:19 UTC 2017 ssl.sh: #1314: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:19 UTC 2017 ssl.sh: #1315: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:19 UTC 2017 ssl.sh: #1316: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:20 UTC 2017 ssl.sh: #1317: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:20 UTC 2017 ssl.sh: #1318: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:21 UTC 2017 ssl.sh: #1319: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:21 UTC 2017 ssl.sh: #1320: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:21 UTC 2017 ssl.sh: #1321: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:22 UTC 2017 ssl.sh: #1322: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:22 UTC 2017 ssl.sh: #1323: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28058 >/dev/null 2>/dev/null selfserv_9208 with PID 28058 found at Wed May 10 11:46:22 UTC 2017 ssl.sh: #1324: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 28058 at Wed May 10 11:46:22 UTC 2017 kill -USR1 28058 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28058 killed at Wed May 10 11:46:22 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:46:22 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:46:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:22 UTC 2017 selfserv_9208 with PID 29484 started at Wed May 10 11:46:22 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:23 UTC 2017 ssl.sh: #1325: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:23 UTC 2017 ssl.sh: #1326: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:23 UTC 2017 ssl.sh: #1327: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:24 UTC 2017 ssl.sh: #1328: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:24 UTC 2017 ssl.sh: #1329: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:24 UTC 2017 ssl.sh: #1330: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:24 UTC 2017 ssl.sh: #1331: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:25 UTC 2017 ssl.sh: #1332: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:25 UTC 2017 ssl.sh: #1333: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:25 UTC 2017 ssl.sh: #1334: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:26 UTC 2017 ssl.sh: #1335: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:26 UTC 2017 ssl.sh: #1336: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:26 UTC 2017 ssl.sh: #1337: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:26 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1338: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:27 UTC 2017 ssl.sh: #1339: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:27 UTC 2017 ssl.sh: #1340: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:27 UTC 2017 ssl.sh: #1341: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:27 UTC 2017 ssl.sh: #1342: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:28 UTC 2017 ssl.sh: #1343: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:28 UTC 2017 ssl.sh: #1344: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:28 UTC 2017 ssl.sh: #1345: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:29 UTC 2017 ssl.sh: #1346: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:29 UTC 2017 ssl.sh: #1347: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:29 UTC 2017 ssl.sh: #1348: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:29 UTC 2017 ssl.sh: #1349: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:30 UTC 2017 ssl.sh: #1350: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:30 UTC 2017 ssl.sh: #1351: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:30 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1352: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:31 UTC 2017 ssl.sh: #1353: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:31 UTC 2017 ssl.sh: #1354: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:31 UTC 2017 ssl.sh: #1355: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:31 UTC 2017 ssl.sh: #1356: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:32 UTC 2017 ssl.sh: #1357: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:32 UTC 2017 ssl.sh: #1358: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:32 UTC 2017 ssl.sh: #1359: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:32 UTC 2017 ssl.sh: #1360: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:33 UTC 2017 ssl.sh: #1361: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:33 UTC 2017 ssl.sh: #1362: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:33 UTC 2017 ssl.sh: #1363: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:34 UTC 2017 ssl.sh: #1364: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29484 >/dev/null 2>/dev/null selfserv_9208 with PID 29484 found at Wed May 10 11:46:34 UTC 2017 ssl.sh: #1365: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 29484 at Wed May 10 11:46:34 UTC 2017 kill -USR1 29484 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 29484 killed at Wed May 10 11:46:34 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:46:34 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:46:34 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:34 UTC 2017 selfserv_9208 with PID 30906 started at Wed May 10 11:46:34 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:34 UTC 2017 ssl.sh: #1366: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:35 UTC 2017 ssl.sh: #1367: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:35 UTC 2017 ssl.sh: #1368: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:35 UTC 2017 ssl.sh: #1369: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:36 UTC 2017 ssl.sh: #1370: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:36 UTC 2017 ssl.sh: #1371: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:36 UTC 2017 ssl.sh: #1372: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:37 UTC 2017 ssl.sh: #1373: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:37 UTC 2017 ssl.sh: #1374: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:37 UTC 2017 ssl.sh: #1375: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:38 UTC 2017 ssl.sh: #1376: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:38 UTC 2017 ssl.sh: #1377: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:38 UTC 2017 ssl.sh: #1378: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:39 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1379: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:39 UTC 2017 ssl.sh: #1380: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:39 UTC 2017 ssl.sh: #1381: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:40 UTC 2017 ssl.sh: #1382: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:40 UTC 2017 ssl.sh: #1383: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:40 UTC 2017 ssl.sh: #1384: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:41 UTC 2017 ssl.sh: #1385: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:41 UTC 2017 ssl.sh: #1386: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:41 UTC 2017 ssl.sh: #1387: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:42 UTC 2017 ssl.sh: #1388: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:42 UTC 2017 ssl.sh: #1389: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:42 UTC 2017 ssl.sh: #1390: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:43 UTC 2017 ssl.sh: #1391: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:43 UTC 2017 ssl.sh: #1392: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:43 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1393: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:43 UTC 2017 ssl.sh: #1394: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:44 UTC 2017 ssl.sh: #1395: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:44 UTC 2017 ssl.sh: #1396: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:44 UTC 2017 ssl.sh: #1397: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:45 UTC 2017 ssl.sh: #1398: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:45 UTC 2017 ssl.sh: #1399: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:45 UTC 2017 ssl.sh: #1400: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:46 UTC 2017 ssl.sh: #1401: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:46 UTC 2017 ssl.sh: #1402: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:46 UTC 2017 ssl.sh: #1403: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:47 UTC 2017 ssl.sh: #1404: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:47 UTC 2017 ssl.sh: #1405: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30906 >/dev/null 2>/dev/null selfserv_9208 with PID 30906 found at Wed May 10 11:46:47 UTC 2017 ssl.sh: #1406: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 30906 at Wed May 10 11:46:47 UTC 2017 kill -USR1 30906 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 30906 killed at Wed May 10 11:46:47 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:46:47 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:46:47 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:47 UTC 2017 selfserv_9208 with PID 32328 started at Wed May 10 11:46:47 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:48 UTC 2017 ssl.sh: #1407: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:48 UTC 2017 ssl.sh: #1408: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:49 UTC 2017 ssl.sh: #1409: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:49 UTC 2017 ssl.sh: #1410: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:49 UTC 2017 ssl.sh: #1411: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:50 UTC 2017 ssl.sh: #1412: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:50 UTC 2017 ssl.sh: #1413: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:50 UTC 2017 ssl.sh: #1414: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:51 UTC 2017 ssl.sh: #1415: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:51 UTC 2017 ssl.sh: #1416: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:52 UTC 2017 ssl.sh: #1417: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:52 UTC 2017 ssl.sh: #1418: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:52 UTC 2017 ssl.sh: #1419: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:53 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1420: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:53 UTC 2017 ssl.sh: #1421: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:53 UTC 2017 ssl.sh: #1422: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:54 UTC 2017 ssl.sh: #1423: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:54 UTC 2017 ssl.sh: #1424: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:54 UTC 2017 ssl.sh: #1425: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:55 UTC 2017 ssl.sh: #1426: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:55 UTC 2017 ssl.sh: #1427: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:56 UTC 2017 ssl.sh: #1428: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:56 UTC 2017 ssl.sh: #1429: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:56 UTC 2017 ssl.sh: #1430: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:57 UTC 2017 ssl.sh: #1431: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:57 UTC 2017 ssl.sh: #1432: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:57 UTC 2017 ssl.sh: #1433: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:58 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1434: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:58 UTC 2017 ssl.sh: #1435: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:58 UTC 2017 ssl.sh: #1436: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:59 UTC 2017 ssl.sh: #1437: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:59 UTC 2017 ssl.sh: #1438: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:46:59 UTC 2017 ssl.sh: #1439: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:47:00 UTC 2017 ssl.sh: #1440: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:47:00 UTC 2017 ssl.sh: #1441: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:47:01 UTC 2017 ssl.sh: #1442: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:47:01 UTC 2017 ssl.sh: #1443: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:47:01 UTC 2017 ssl.sh: #1444: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:47:02 UTC 2017 ssl.sh: #1445: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:47:02 UTC 2017 ssl.sh: #1446: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32328 >/dev/null 2>/dev/null selfserv_9208 with PID 32328 found at Wed May 10 11:47:02 UTC 2017 ssl.sh: #1447: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 32328 at Wed May 10 11:47:02 UTC 2017 kill -USR1 32328 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 32328 killed at Wed May 10 11:47:02 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:47:02 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:47:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:03 UTC 2017 selfserv_9208 with PID 1363 started at Wed May 10 11:47:03 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:03 UTC 2017 ssl.sh: #1448: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:03 UTC 2017 ssl.sh: #1449: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:03 UTC 2017 ssl.sh: #1450: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:04 UTC 2017 ssl.sh: #1451: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:04 UTC 2017 ssl.sh: #1452: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:04 UTC 2017 ssl.sh: #1453: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:05 UTC 2017 ssl.sh: #1454: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:05 UTC 2017 ssl.sh: #1455: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:05 UTC 2017 ssl.sh: #1456: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:06 UTC 2017 ssl.sh: #1457: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:06 UTC 2017 ssl.sh: #1458: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:06 UTC 2017 ssl.sh: #1459: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:07 UTC 2017 ssl.sh: #1460: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:07 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1461: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:07 UTC 2017 ssl.sh: #1462: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:08 UTC 2017 ssl.sh: #1463: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:08 UTC 2017 ssl.sh: #1464: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:08 UTC 2017 ssl.sh: #1465: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:08 UTC 2017 ssl.sh: #1466: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:09 UTC 2017 ssl.sh: #1467: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:09 UTC 2017 ssl.sh: #1468: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:09 UTC 2017 ssl.sh: #1469: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:10 UTC 2017 ssl.sh: #1470: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:10 UTC 2017 ssl.sh: #1471: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:10 UTC 2017 ssl.sh: #1472: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:11 UTC 2017 ssl.sh: #1473: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:11 UTC 2017 ssl.sh: #1474: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:11 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1475: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:11 UTC 2017 ssl.sh: #1476: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:12 UTC 2017 ssl.sh: #1477: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:12 UTC 2017 ssl.sh: #1478: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:12 UTC 2017 ssl.sh: #1479: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:13 UTC 2017 ssl.sh: #1480: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:13 UTC 2017 ssl.sh: #1481: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:13 UTC 2017 ssl.sh: #1482: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:13 UTC 2017 ssl.sh: #1483: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:14 UTC 2017 ssl.sh: #1484: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:14 UTC 2017 ssl.sh: #1485: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:14 UTC 2017 ssl.sh: #1486: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:15 UTC 2017 ssl.sh: #1487: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1363 >/dev/null 2>/dev/null selfserv_9208 with PID 1363 found at Wed May 10 11:47:15 UTC 2017 ssl.sh: #1488: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 1363 at Wed May 10 11:47:15 UTC 2017 kill -USR1 1363 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1363 killed at Wed May 10 11:47:15 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:47:15 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:47:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 2791 >/dev/null 2>/dev/null selfserv_9208 with PID 2791 found at Wed May 10 11:47:15 UTC 2017 selfserv_9208 with PID 2791 started at Wed May 10 11:47:15 UTC 2017 trying to kill selfserv_9208 with PID 2791 at Wed May 10 11:47:15 UTC 2017 kill -USR1 2791 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 2791 killed at Wed May 10 11:47:15 UTC 2017 selfserv_9208 starting at Wed May 10 11:47:15 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:47:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:15 UTC 2017 selfserv_9208 with PID 2833 started at Wed May 10 11:47:15 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:16 UTC 2017 ssl.sh: #1489: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:16 UTC 2017 ssl.sh: #1490: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:16 UTC 2017 ssl.sh: #1491: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:16 UTC 2017 ssl.sh: #1492: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:17 UTC 2017 ssl.sh: #1493: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:17 UTC 2017 ssl.sh: #1494: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:17 UTC 2017 ssl.sh: #1495: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:18 UTC 2017 ssl.sh: #1496: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:18 UTC 2017 ssl.sh: #1497: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:18 UTC 2017 ssl.sh: #1498: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:19 UTC 2017 ssl.sh: #1499: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:19 UTC 2017 ssl.sh: #1500: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:19 UTC 2017 ssl.sh: #1501: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:20 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1502: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:20 UTC 2017 ssl.sh: #1503: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:20 UTC 2017 ssl.sh: #1504: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:20 UTC 2017 ssl.sh: #1505: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:21 UTC 2017 ssl.sh: #1506: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:21 UTC 2017 ssl.sh: #1507: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:21 UTC 2017 ssl.sh: #1508: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:22 UTC 2017 ssl.sh: #1509: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:22 UTC 2017 ssl.sh: #1510: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:22 UTC 2017 ssl.sh: #1511: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:22 UTC 2017 ssl.sh: #1512: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:23 UTC 2017 ssl.sh: #1513: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:23 UTC 2017 ssl.sh: #1514: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:23 UTC 2017 ssl.sh: #1515: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:24 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1516: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:24 UTC 2017 ssl.sh: #1517: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:24 UTC 2017 ssl.sh: #1518: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:25 UTC 2017 ssl.sh: #1519: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:25 UTC 2017 ssl.sh: #1520: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:25 UTC 2017 ssl.sh: #1521: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:25 UTC 2017 ssl.sh: #1522: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:26 UTC 2017 ssl.sh: #1523: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:26 UTC 2017 ssl.sh: #1524: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:26 UTC 2017 ssl.sh: #1525: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:27 UTC 2017 ssl.sh: #1526: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:27 UTC 2017 ssl.sh: #1527: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:27 UTC 2017 ssl.sh: #1528: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2833 >/dev/null 2>/dev/null selfserv_9208 with PID 2833 found at Wed May 10 11:47:28 UTC 2017 ssl.sh: #1529: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 2833 at Wed May 10 11:47:28 UTC 2017 kill -USR1 2833 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 2833 killed at Wed May 10 11:47:28 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:47:28 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:47:28 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:28 UTC 2017 selfserv_9208 with PID 4255 started at Wed May 10 11:47:28 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:28 UTC 2017 ssl.sh: #1530: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:29 UTC 2017 ssl.sh: #1531: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:29 UTC 2017 ssl.sh: #1532: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:29 UTC 2017 ssl.sh: #1533: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:30 UTC 2017 ssl.sh: #1534: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:30 UTC 2017 ssl.sh: #1535: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:30 UTC 2017 ssl.sh: #1536: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:31 UTC 2017 ssl.sh: #1537: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:31 UTC 2017 ssl.sh: #1538: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:31 UTC 2017 ssl.sh: #1539: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:32 UTC 2017 ssl.sh: #1540: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:32 UTC 2017 ssl.sh: #1541: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:32 UTC 2017 ssl.sh: #1542: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:33 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1543: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:33 UTC 2017 ssl.sh: #1544: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:33 UTC 2017 ssl.sh: #1545: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:34 UTC 2017 ssl.sh: #1546: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:34 UTC 2017 ssl.sh: #1547: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:34 UTC 2017 ssl.sh: #1548: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:35 UTC 2017 ssl.sh: #1549: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:35 UTC 2017 ssl.sh: #1550: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:35 UTC 2017 ssl.sh: #1551: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:36 UTC 2017 ssl.sh: #1552: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:36 UTC 2017 ssl.sh: #1553: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:36 UTC 2017 ssl.sh: #1554: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:37 UTC 2017 ssl.sh: #1555: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:37 UTC 2017 ssl.sh: #1556: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:37 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1557: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:38 UTC 2017 ssl.sh: #1558: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:38 UTC 2017 ssl.sh: #1559: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:38 UTC 2017 ssl.sh: #1560: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:39 UTC 2017 ssl.sh: #1561: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:39 UTC 2017 ssl.sh: #1562: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:39 UTC 2017 ssl.sh: #1563: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:40 UTC 2017 ssl.sh: #1564: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:40 UTC 2017 ssl.sh: #1565: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:40 UTC 2017 ssl.sh: #1566: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:41 UTC 2017 ssl.sh: #1567: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:41 UTC 2017 ssl.sh: #1568: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:42 UTC 2017 ssl.sh: #1569: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4255 >/dev/null 2>/dev/null selfserv_9208 with PID 4255 found at Wed May 10 11:47:42 UTC 2017 ssl.sh: #1570: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 4255 at Wed May 10 11:47:42 UTC 2017 kill -USR1 4255 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 4255 killed at Wed May 10 11:47:42 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:47:42 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:47:42 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:42 UTC 2017 selfserv_9208 with PID 5679 started at Wed May 10 11:47:42 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:42 UTC 2017 ssl.sh: #1571: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:43 UTC 2017 ssl.sh: #1572: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:43 UTC 2017 ssl.sh: #1573: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:43 UTC 2017 ssl.sh: #1574: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:43 UTC 2017 ssl.sh: #1575: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:44 UTC 2017 ssl.sh: #1576: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:44 UTC 2017 ssl.sh: #1577: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:44 UTC 2017 ssl.sh: #1578: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:45 UTC 2017 ssl.sh: #1579: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:45 UTC 2017 ssl.sh: #1580: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:45 UTC 2017 ssl.sh: #1581: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:45 UTC 2017 ssl.sh: #1582: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:46 UTC 2017 ssl.sh: #1583: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:46 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1584: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:46 UTC 2017 ssl.sh: #1585: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:47 UTC 2017 ssl.sh: #1586: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:47 UTC 2017 ssl.sh: #1587: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:47 UTC 2017 ssl.sh: #1588: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:47 UTC 2017 ssl.sh: #1589: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:48 UTC 2017 ssl.sh: #1590: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:48 UTC 2017 ssl.sh: #1591: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:48 UTC 2017 ssl.sh: #1592: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:48 UTC 2017 ssl.sh: #1593: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:49 UTC 2017 ssl.sh: #1594: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:49 UTC 2017 ssl.sh: #1595: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:49 UTC 2017 ssl.sh: #1596: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:50 UTC 2017 ssl.sh: #1597: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:50 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1598: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:50 UTC 2017 ssl.sh: #1599: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:50 UTC 2017 ssl.sh: #1600: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:51 UTC 2017 ssl.sh: #1601: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:51 UTC 2017 ssl.sh: #1602: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:51 UTC 2017 ssl.sh: #1603: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:51 UTC 2017 ssl.sh: #1604: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:52 UTC 2017 ssl.sh: #1605: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:52 UTC 2017 ssl.sh: #1606: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:52 UTC 2017 ssl.sh: #1607: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:53 UTC 2017 ssl.sh: #1608: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:53 UTC 2017 ssl.sh: #1609: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:53 UTC 2017 ssl.sh: #1610: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5679 >/dev/null 2>/dev/null selfserv_9208 with PID 5679 found at Wed May 10 11:47:53 UTC 2017 ssl.sh: #1611: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 5679 at Wed May 10 11:47:53 UTC 2017 kill -USR1 5679 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5679 killed at Wed May 10 11:47:54 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:47:54 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:47:54 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:47:54 UTC 2017 selfserv_9208 with PID 7115 started at Wed May 10 11:47:54 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:47:54 UTC 2017 ssl.sh: #1612: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:47:54 UTC 2017 ssl.sh: #1613: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:47:55 UTC 2017 ssl.sh: #1614: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:47:55 UTC 2017 ssl.sh: #1615: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:47:55 UTC 2017 ssl.sh: #1616: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:47:56 UTC 2017 ssl.sh: #1617: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:47:56 UTC 2017 ssl.sh: #1618: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:47:56 UTC 2017 ssl.sh: #1619: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:47:57 UTC 2017 ssl.sh: #1620: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:47:57 UTC 2017 ssl.sh: #1621: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:47:57 UTC 2017 ssl.sh: #1622: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:47:58 UTC 2017 ssl.sh: #1623: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:47:58 UTC 2017 ssl.sh: #1624: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:47:58 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1625: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:47:59 UTC 2017 ssl.sh: #1626: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:47:59 UTC 2017 ssl.sh: #1627: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:47:59 UTC 2017 ssl.sh: #1628: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:48:00 UTC 2017 ssl.sh: #1629: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:48:00 UTC 2017 ssl.sh: #1630: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:48:00 UTC 2017 ssl.sh: #1631: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:48:00 UTC 2017 ssl.sh: #1632: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:48:01 UTC 2017 ssl.sh: #1633: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:48:01 UTC 2017 ssl.sh: #1634: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:48:01 UTC 2017 ssl.sh: #1635: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:48:02 UTC 2017 ssl.sh: #1636: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:48:02 UTC 2017 ssl.sh: #1637: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:48:02 UTC 2017 ssl.sh: #1638: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:48:03 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1639: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:48:03 UTC 2017 ssl.sh: #1640: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:48:03 UTC 2017 ssl.sh: #1641: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:48:04 UTC 2017 ssl.sh: #1642: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:48:04 UTC 2017 ssl.sh: #1643: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:48:04 UTC 2017 ssl.sh: #1644: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:48:05 UTC 2017 ssl.sh: #1645: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:48:05 UTC 2017 ssl.sh: #1646: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:48:05 UTC 2017 ssl.sh: #1647: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:48:06 UTC 2017 ssl.sh: #1648: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:48:06 UTC 2017 ssl.sh: #1649: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:48:06 UTC 2017 ssl.sh: #1650: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:48:07 UTC 2017 ssl.sh: #1651: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7115 >/dev/null 2>/dev/null selfserv_9208 with PID 7115 found at Wed May 10 11:48:07 UTC 2017 ssl.sh: #1652: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 7115 at Wed May 10 11:48:07 UTC 2017 kill -USR1 7115 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7115 killed at Wed May 10 11:48:07 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:48:07 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:48:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:07 UTC 2017 selfserv_9208 with PID 8537 started at Wed May 10 11:48:07 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:07 UTC 2017 ssl.sh: #1653: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:08 UTC 2017 ssl.sh: #1654: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:08 UTC 2017 ssl.sh: #1655: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:09 UTC 2017 ssl.sh: #1656: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:09 UTC 2017 ssl.sh: #1657: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:09 UTC 2017 ssl.sh: #1658: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:10 UTC 2017 ssl.sh: #1659: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:10 UTC 2017 ssl.sh: #1660: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:10 UTC 2017 ssl.sh: #1661: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:11 UTC 2017 ssl.sh: #1662: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:11 UTC 2017 ssl.sh: #1663: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:12 UTC 2017 ssl.sh: #1664: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:12 UTC 2017 ssl.sh: #1665: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:12 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1666: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:13 UTC 2017 ssl.sh: #1667: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:13 UTC 2017 ssl.sh: #1668: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:13 UTC 2017 ssl.sh: #1669: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:14 UTC 2017 ssl.sh: #1670: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:14 UTC 2017 ssl.sh: #1671: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:14 UTC 2017 ssl.sh: #1672: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:15 UTC 2017 ssl.sh: #1673: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:15 UTC 2017 ssl.sh: #1674: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:15 UTC 2017 ssl.sh: #1675: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:16 UTC 2017 ssl.sh: #1676: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:16 UTC 2017 ssl.sh: #1677: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:17 UTC 2017 ssl.sh: #1678: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:17 UTC 2017 ssl.sh: #1679: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:17 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1680: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:18 UTC 2017 ssl.sh: #1681: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:18 UTC 2017 ssl.sh: #1682: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:18 UTC 2017 ssl.sh: #1683: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:19 UTC 2017 ssl.sh: #1684: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:19 UTC 2017 ssl.sh: #1685: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:19 UTC 2017 ssl.sh: #1686: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:20 UTC 2017 ssl.sh: #1687: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:20 UTC 2017 ssl.sh: #1688: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:20 UTC 2017 ssl.sh: #1689: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:21 UTC 2017 ssl.sh: #1690: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:21 UTC 2017 ssl.sh: #1691: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:22 UTC 2017 ssl.sh: #1692: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8537 >/dev/null 2>/dev/null selfserv_9208 with PID 8537 found at Wed May 10 11:48:22 UTC 2017 ssl.sh: #1693: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 8537 at Wed May 10 11:48:22 UTC 2017 kill -USR1 8537 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 8537 killed at Wed May 10 11:48:22 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:48:22 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:48:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:22 UTC 2017 selfserv_9208 with PID 9959 started at Wed May 10 11:48:22 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:22 UTC 2017 ssl.sh: #1694: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:23 UTC 2017 ssl.sh: #1695: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:23 UTC 2017 ssl.sh: #1696: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:23 UTC 2017 ssl.sh: #1697: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:24 UTC 2017 ssl.sh: #1698: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:24 UTC 2017 ssl.sh: #1699: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:24 UTC 2017 ssl.sh: #1700: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:25 UTC 2017 ssl.sh: #1701: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:25 UTC 2017 ssl.sh: #1702: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:25 UTC 2017 ssl.sh: #1703: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:26 UTC 2017 ssl.sh: #1704: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:26 UTC 2017 ssl.sh: #1705: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:26 UTC 2017 ssl.sh: #1706: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:27 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1707: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:27 UTC 2017 ssl.sh: #1708: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:27 UTC 2017 ssl.sh: #1709: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:27 UTC 2017 ssl.sh: #1710: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:28 UTC 2017 ssl.sh: #1711: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:28 UTC 2017 ssl.sh: #1712: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:28 UTC 2017 ssl.sh: #1713: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:29 UTC 2017 ssl.sh: #1714: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:29 UTC 2017 ssl.sh: #1715: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:29 UTC 2017 ssl.sh: #1716: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:29 UTC 2017 ssl.sh: #1717: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:30 UTC 2017 ssl.sh: #1718: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:30 UTC 2017 ssl.sh: #1719: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:30 UTC 2017 ssl.sh: #1720: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:31 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #1721: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:31 UTC 2017 ssl.sh: #1722: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:31 UTC 2017 ssl.sh: #1723: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:32 UTC 2017 ssl.sh: #1724: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:32 UTC 2017 ssl.sh: #1725: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:32 UTC 2017 ssl.sh: #1726: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:32 UTC 2017 ssl.sh: #1727: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:33 UTC 2017 ssl.sh: #1728: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:33 UTC 2017 ssl.sh: #1729: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:33 UTC 2017 ssl.sh: #1730: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:34 UTC 2017 ssl.sh: #1731: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:34 UTC 2017 ssl.sh: #1732: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:34 UTC 2017 ssl.sh: #1733: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9959 >/dev/null 2>/dev/null selfserv_9208 with PID 9959 found at Wed May 10 11:48:34 UTC 2017 ssl.sh: #1734: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 9959 at Wed May 10 11:48:35 UTC 2017 kill -USR1 9959 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 9959 killed at Wed May 10 11:48:35 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:48:35 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:48:35 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 11381 >/dev/null 2>/dev/null selfserv_9208 with PID 11381 found at Wed May 10 11:48:35 UTC 2017 selfserv_9208 with PID 11381 started at Wed May 10 11:48:35 UTC 2017 trying to kill selfserv_9208 with PID 11381 at Wed May 10 11:48:35 UTC 2017 kill -USR1 11381 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 11381 killed at Wed May 10 11:48:35 UTC 2017 ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -fips true -force FIPS mode enabled. ssl.sh: #1735: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -list ssl.sh: #1736: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1737: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_server -fips true -force FIPS mode enabled. ssl.sh: #1738: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_server -list ssl.sh: #1739: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1740: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal - with ECC =============================== selfserv_9208 starting at Wed May 10 11:48:36 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:48:36 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 11491 >/dev/null 2>/dev/null selfserv_9208 with PID 11491 found at Wed May 10 11:48:36 UTC 2017 selfserv_9208 with PID 11491 started at Wed May 10 11:48:36 UTC 2017 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1741: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1742: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1743: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1744: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1745: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1746: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1747: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1748: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1749: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1750: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1751: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1752: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1753: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1754: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1755: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1756: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1757: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1758: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1759: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1760: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1761: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1762: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1763: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1764: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1765: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1766: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1767: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1768: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1769: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1770: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1771: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1772: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1773: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1774: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1775: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1776: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1777: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1778: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1779: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1780: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1781: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1782: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1783: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1784: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1785: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1786: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1787: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1788: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1789: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1790: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1791: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1792: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1793: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1794: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1795: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1796: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1797: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1798: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1799: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1800: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1801: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1802: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1803: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1804: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1805: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1806: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1807: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1808: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1809: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1810: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1811: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1812: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1813: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1814: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1815: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1816: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1817: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1818: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1819: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1820: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1821: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1822: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1823: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1824: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1825: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1826: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1827: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1828: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1829: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1830: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1831: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1832: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1833: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1834: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1835: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1836: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1837: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1838: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1839: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1840: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1841: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1842: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1843: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1844: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1845: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1846: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1847: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1848: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1849: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1850: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1851: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1852: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1853: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1854: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1855: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1856: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1857: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1858: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1859: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :CCA8 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1860: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :CCA9 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1861: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 11491 at Wed May 10 11:48:51 UTC 2017 kill -USR1 11491 selfserv: 0 cache hits; 121 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 11491 killed at Wed May 10 11:48:51 UTC 2017 ssl.sh: SSL Client Authentication - server fips/client normal - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:48:51 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:48:51 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 13755 >/dev/null 2>/dev/null selfserv_9208 with PID 13755 found at Wed May 10 11:48:51 UTC 2017 selfserv_9208 with PID 13755 started at Wed May 10 11:48:51 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1862: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 13755 at Wed May 10 11:48:52 UTC 2017 kill -USR1 13755 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 13755 killed at Wed May 10 11:48:52 UTC 2017 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 11:48:52 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:48:52 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 13812 >/dev/null 2>/dev/null selfserv_9208 with PID 13812 found at Wed May 10 11:48:52 UTC 2017 selfserv_9208 with PID 13812 started at Wed May 10 11:48:52 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1863: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 13812 at Wed May 10 11:48:52 UTC 2017 kill -USR1 13812 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 13812 killed at Wed May 10 11:48:52 UTC 2017 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 11:48:52 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:48:52 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 13869 >/dev/null 2>/dev/null selfserv_9208 with PID 13869 found at Wed May 10 11:48:52 UTC 2017 selfserv_9208 with PID 13869 started at Wed May 10 11:48:52 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1864: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 13869 at Wed May 10 11:48:53 UTC 2017 kill -USR1 13869 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 13869 killed at Wed May 10 11:48:53 UTC 2017 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:48:53 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:48:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 13926 >/dev/null 2>/dev/null selfserv_9208 with PID 13926 found at Wed May 10 11:48:53 UTC 2017 selfserv_9208 with PID 13926 started at Wed May 10 11:48:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1865: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 13926 at Wed May 10 11:48:53 UTC 2017 kill -USR1 13926 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 13926 killed at Wed May 10 11:48:53 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 11:48:53 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:48:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 13983 >/dev/null 2>/dev/null selfserv_9208 with PID 13983 found at Wed May 10 11:48:53 UTC 2017 selfserv_9208 with PID 13983 started at Wed May 10 11:48:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1866: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 13983 at Wed May 10 11:48:54 UTC 2017 kill -USR1 13983 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 13983 killed at Wed May 10 11:48:54 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 11:48:54 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:48:54 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14040 >/dev/null 2>/dev/null selfserv_9208 with PID 14040 found at Wed May 10 11:48:54 UTC 2017 selfserv_9208 with PID 14040 started at Wed May 10 11:48:54 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1867: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 14040 at Wed May 10 11:48:54 UTC 2017 kill -USR1 14040 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14040 killed at Wed May 10 11:48:54 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:48:54 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:48:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14097 >/dev/null 2>/dev/null selfserv_9208 with PID 14097 found at Wed May 10 11:48:55 UTC 2017 selfserv_9208 with PID 14097 started at Wed May 10 11:48:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1868: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 14097 at Wed May 10 11:48:55 UTC 2017 kill -USR1 14097 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14097 killed at Wed May 10 11:48:55 UTC 2017 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 11:48:55 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:48:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14154 >/dev/null 2>/dev/null selfserv_9208 with PID 14154 found at Wed May 10 11:48:55 UTC 2017 selfserv_9208 with PID 14154 started at Wed May 10 11:48:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1869: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 14154 at Wed May 10 11:48:55 UTC 2017 kill -USR1 14154 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14154 killed at Wed May 10 11:48:55 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 11:48:55 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:48:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14211 >/dev/null 2>/dev/null selfserv_9208 with PID 14211 found at Wed May 10 11:48:55 UTC 2017 selfserv_9208 with PID 14211 started at Wed May 10 11:48:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1870: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 14211 at Wed May 10 11:48:56 UTC 2017 kill -USR1 14211 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14211 killed at Wed May 10 11:48:56 UTC 2017 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:48:56 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:48:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14268 >/dev/null 2>/dev/null selfserv_9208 with PID 14268 found at Wed May 10 11:48:56 UTC 2017 selfserv_9208 with PID 14268 started at Wed May 10 11:48:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1871: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 14268 at Wed May 10 11:48:56 UTC 2017 kill -USR1 14268 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14268 killed at Wed May 10 11:48:56 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 11:48:56 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:48:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14325 >/dev/null 2>/dev/null selfserv_9208 with PID 14325 found at Wed May 10 11:48:56 UTC 2017 selfserv_9208 with PID 14325 started at Wed May 10 11:48:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1872: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 14325 at Wed May 10 11:48:57 UTC 2017 kill -USR1 14325 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14325 killed at Wed May 10 11:48:57 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 11:48:57 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:48:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14382 >/dev/null 2>/dev/null selfserv_9208 with PID 14382 found at Wed May 10 11:48:57 UTC 2017 selfserv_9208 with PID 14382 started at Wed May 10 11:48:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1873: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 14382 at Wed May 10 11:48:57 UTC 2017 kill -USR1 14382 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14382 killed at Wed May 10 11:48:57 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:48:57 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:48:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14439 >/dev/null 2>/dev/null selfserv_9208 with PID 14439 found at Wed May 10 11:48:57 UTC 2017 selfserv_9208 with PID 14439 started at Wed May 10 11:48:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1874: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 14439 at Wed May 10 11:48:58 UTC 2017 kill -USR1 14439 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14439 killed at Wed May 10 11:48:58 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:48:58 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:48:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14496 >/dev/null 2>/dev/null selfserv_9208 with PID 14496 found at Wed May 10 11:48:58 UTC 2017 selfserv_9208 with PID 14496 started at Wed May 10 11:48:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1875: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 14496 at Wed May 10 11:48:59 UTC 2017 kill -USR1 14496 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14496 killed at Wed May 10 11:48:59 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:48:59 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:48:59 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14553 >/dev/null 2>/dev/null selfserv_9208 with PID 14553 found at Wed May 10 11:48:59 UTC 2017 selfserv_9208 with PID 14553 started at Wed May 10 11:48:59 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1876: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 14553 at Wed May 10 11:48:59 UTC 2017 kill -USR1 14553 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14553 killed at Wed May 10 11:48:59 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:48:59 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:48:59 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14610 >/dev/null 2>/dev/null selfserv_9208 with PID 14610 found at Wed May 10 11:48:59 UTC 2017 selfserv_9208 with PID 14610 started at Wed May 10 11:48:59 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1877: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 14610 at Wed May 10 11:49:00 UTC 2017 kill -USR1 14610 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14610 killed at Wed May 10 11:49:00 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:49:00 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14667 >/dev/null 2>/dev/null selfserv_9208 with PID 14667 found at Wed May 10 11:49:00 UTC 2017 selfserv_9208 with PID 14667 started at Wed May 10 11:49:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1878: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 14667 at Wed May 10 11:49:00 UTC 2017 kill -USR1 14667 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14667 killed at Wed May 10 11:49:00 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:49:00 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14724 >/dev/null 2>/dev/null selfserv_9208 with PID 14724 found at Wed May 10 11:49:00 UTC 2017 selfserv_9208 with PID 14724 started at Wed May 10 11:49:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1879: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 14724 at Wed May 10 11:49:01 UTC 2017 kill -USR1 14724 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14724 killed at Wed May 10 11:49:01 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:49:01 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14781 >/dev/null 2>/dev/null selfserv_9208 with PID 14781 found at Wed May 10 11:49:01 UTC 2017 selfserv_9208 with PID 14781 started at Wed May 10 11:49:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1880: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 14781 at Wed May 10 11:49:02 UTC 2017 kill -USR1 14781 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14781 killed at Wed May 10 11:49:02 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:49:02 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14838 >/dev/null 2>/dev/null selfserv_9208 with PID 14838 found at Wed May 10 11:49:02 UTC 2017 selfserv_9208 with PID 14838 started at Wed May 10 11:49:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1881: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 14838 at Wed May 10 11:49:02 UTC 2017 kill -USR1 14838 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14838 killed at Wed May 10 11:49:02 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:49:02 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14895 >/dev/null 2>/dev/null selfserv_9208 with PID 14895 found at Wed May 10 11:49:02 UTC 2017 selfserv_9208 with PID 14895 started at Wed May 10 11:49:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1882: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 14895 at Wed May 10 11:49:03 UTC 2017 kill -USR1 14895 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14895 killed at Wed May 10 11:49:03 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:49:03 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14952 >/dev/null 2>/dev/null selfserv_9208 with PID 14952 found at Wed May 10 11:49:03 UTC 2017 selfserv_9208 with PID 14952 started at Wed May 10 11:49:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1883: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 14952 at Wed May 10 11:49:04 UTC 2017 kill -USR1 14952 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14952 killed at Wed May 10 11:49:04 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:49:04 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15009 >/dev/null 2>/dev/null selfserv_9208 with PID 15009 found at Wed May 10 11:49:04 UTC 2017 selfserv_9208 with PID 15009 started at Wed May 10 11:49:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1884: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 15009 at Wed May 10 11:49:04 UTC 2017 kill -USR1 15009 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15009 killed at Wed May 10 11:49:04 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:49:04 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15066 >/dev/null 2>/dev/null selfserv_9208 with PID 15066 found at Wed May 10 11:49:04 UTC 2017 selfserv_9208 with PID 15066 started at Wed May 10 11:49:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1885: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 15066 at Wed May 10 11:49:05 UTC 2017 kill -USR1 15066 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15066 killed at Wed May 10 11:49:05 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:49:05 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:05 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15123 >/dev/null 2>/dev/null selfserv_9208 with PID 15123 found at Wed May 10 11:49:05 UTC 2017 selfserv_9208 with PID 15123 started at Wed May 10 11:49:05 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1886: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 15123 at Wed May 10 11:49:05 UTC 2017 kill -USR1 15123 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15123 killed at Wed May 10 11:49:05 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:49:05 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15180 >/dev/null 2>/dev/null selfserv_9208 with PID 15180 found at Wed May 10 11:49:06 UTC 2017 selfserv_9208 with PID 15180 started at Wed May 10 11:49:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1887: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 15180 at Wed May 10 11:49:06 UTC 2017 kill -USR1 15180 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15180 killed at Wed May 10 11:49:06 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:49:06 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15237 >/dev/null 2>/dev/null selfserv_9208 with PID 15237 found at Wed May 10 11:49:06 UTC 2017 selfserv_9208 with PID 15237 started at Wed May 10 11:49:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1888: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 15237 at Wed May 10 11:49:07 UTC 2017 kill -USR1 15237 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15237 killed at Wed May 10 11:49:07 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:49:07 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15294 >/dev/null 2>/dev/null selfserv_9208 with PID 15294 found at Wed May 10 11:49:07 UTC 2017 selfserv_9208 with PID 15294 started at Wed May 10 11:49:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1889: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 15294 at Wed May 10 11:49:07 UTC 2017 kill -USR1 15294 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15294 killed at Wed May 10 11:49:07 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:49:07 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15351 >/dev/null 2>/dev/null selfserv_9208 with PID 15351 found at Wed May 10 11:49:07 UTC 2017 selfserv_9208 with PID 15351 started at Wed May 10 11:49:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1890: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 15351 at Wed May 10 11:49:08 UTC 2017 kill -USR1 15351 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15351 killed at Wed May 10 11:49:08 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:49:08 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15408 >/dev/null 2>/dev/null selfserv_9208 with PID 15408 found at Wed May 10 11:49:08 UTC 2017 selfserv_9208 with PID 15408 started at Wed May 10 11:49:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1891: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 15408 at Wed May 10 11:49:08 UTC 2017 kill -USR1 15408 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15408 killed at Wed May 10 11:49:08 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:49:08 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15480 >/dev/null 2>/dev/null selfserv_9208 with PID 15480 found at Wed May 10 11:49:08 UTC 2017 selfserv_9208 with PID 15480 started at Wed May 10 11:49:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1892: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 15480 at Wed May 10 11:49:09 UTC 2017 kill -USR1 15480 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15480 killed at Wed May 10 11:49:09 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:49:09 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15537 >/dev/null 2>/dev/null selfserv_9208 with PID 15537 found at Wed May 10 11:49:09 UTC 2017 selfserv_9208 with PID 15537 started at Wed May 10 11:49:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1893: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 15537 at Wed May 10 11:49:09 UTC 2017 kill -USR1 15537 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15537 killed at Wed May 10 11:49:09 UTC 2017 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:49:09 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15594 >/dev/null 2>/dev/null selfserv_9208 with PID 15594 found at Wed May 10 11:49:10 UTC 2017 selfserv_9208 with PID 15594 started at Wed May 10 11:49:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1894: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 15594 at Wed May 10 11:49:10 UTC 2017 kill -USR1 15594 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15594 killed at Wed May 10 11:49:10 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:49:10 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15651 >/dev/null 2>/dev/null selfserv_9208 with PID 15651 found at Wed May 10 11:49:10 UTC 2017 selfserv_9208 with PID 15651 started at Wed May 10 11:49:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1895: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 15651 at Wed May 10 11:49:11 UTC 2017 kill -USR1 15651 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15651 killed at Wed May 10 11:49:11 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:49:11 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15708 >/dev/null 2>/dev/null selfserv_9208 with PID 15708 found at Wed May 10 11:49:11 UTC 2017 selfserv_9208 with PID 15708 started at Wed May 10 11:49:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1896: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 15708 at Wed May 10 11:49:11 UTC 2017 kill -USR1 15708 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15708 killed at Wed May 10 11:49:11 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:49:11 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15765 >/dev/null 2>/dev/null selfserv_9208 with PID 15765 found at Wed May 10 11:49:11 UTC 2017 selfserv_9208 with PID 15765 started at Wed May 10 11:49:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1897: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 15765 at Wed May 10 11:49:12 UTC 2017 kill -USR1 15765 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15765 killed at Wed May 10 11:49:12 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:49:12 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15822 >/dev/null 2>/dev/null selfserv_9208 with PID 15822 found at Wed May 10 11:49:12 UTC 2017 selfserv_9208 with PID 15822 started at Wed May 10 11:49:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1898: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 15822 at Wed May 10 11:49:12 UTC 2017 kill -USR1 15822 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15822 killed at Wed May 10 11:49:12 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:49:12 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15879 >/dev/null 2>/dev/null selfserv_9208 with PID 15879 found at Wed May 10 11:49:12 UTC 2017 selfserv_9208 with PID 15879 started at Wed May 10 11:49:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1899: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 15879 at Wed May 10 11:49:13 UTC 2017 kill -USR1 15879 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15879 killed at Wed May 10 11:49:13 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:49:13 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15936 >/dev/null 2>/dev/null selfserv_9208 with PID 15936 found at Wed May 10 11:49:13 UTC 2017 selfserv_9208 with PID 15936 started at Wed May 10 11:49:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1900: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 15936 at Wed May 10 11:49:13 UTC 2017 kill -USR1 15936 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15936 killed at Wed May 10 11:49:13 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:49:13 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15993 >/dev/null 2>/dev/null selfserv_9208 with PID 15993 found at Wed May 10 11:49:13 UTC 2017 selfserv_9208 with PID 15993 started at Wed May 10 11:49:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1901: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 15993 at Wed May 10 11:49:14 UTC 2017 kill -USR1 15993 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15993 killed at Wed May 10 11:49:14 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:49:14 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16050 >/dev/null 2>/dev/null selfserv_9208 with PID 16050 found at Wed May 10 11:49:14 UTC 2017 selfserv_9208 with PID 16050 started at Wed May 10 11:49:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1902: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 16050 at Wed May 10 11:49:14 UTC 2017 kill -USR1 16050 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16050 killed at Wed May 10 11:49:14 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:49:15 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16107 >/dev/null 2>/dev/null selfserv_9208 with PID 16107 found at Wed May 10 11:49:15 UTC 2017 selfserv_9208 with PID 16107 started at Wed May 10 11:49:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1903: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 16107 at Wed May 10 11:49:15 UTC 2017 kill -USR1 16107 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16107 killed at Wed May 10 11:49:15 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:49:15 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16164 >/dev/null 2>/dev/null selfserv_9208 with PID 16164 found at Wed May 10 11:49:15 UTC 2017 selfserv_9208 with PID 16164 started at Wed May 10 11:49:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1904: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 16164 at Wed May 10 11:49:16 UTC 2017 kill -USR1 16164 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16164 killed at Wed May 10 11:49:16 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:49:16 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16221 >/dev/null 2>/dev/null selfserv_9208 with PID 16221 found at Wed May 10 11:49:16 UTC 2017 selfserv_9208 with PID 16221 started at Wed May 10 11:49:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1905: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 16221 at Wed May 10 11:49:17 UTC 2017 kill -USR1 16221 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16221 killed at Wed May 10 11:49:17 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:49:17 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:17 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16278 >/dev/null 2>/dev/null selfserv_9208 with PID 16278 found at Wed May 10 11:49:17 UTC 2017 selfserv_9208 with PID 16278 started at Wed May 10 11:49:17 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1906: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 16278 at Wed May 10 11:49:17 UTC 2017 kill -USR1 16278 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16278 killed at Wed May 10 11:49:17 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:49:17 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:17 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16335 >/dev/null 2>/dev/null selfserv_9208 with PID 16335 found at Wed May 10 11:49:17 UTC 2017 selfserv_9208 with PID 16335 started at Wed May 10 11:49:17 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1907: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 16335 at Wed May 10 11:49:18 UTC 2017 kill -USR1 16335 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16335 killed at Wed May 10 11:49:18 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:49:18 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16392 >/dev/null 2>/dev/null selfserv_9208 with PID 16392 found at Wed May 10 11:49:18 UTC 2017 selfserv_9208 with PID 16392 started at Wed May 10 11:49:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1908: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 16392 at Wed May 10 11:49:18 UTC 2017 kill -USR1 16392 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16392 killed at Wed May 10 11:49:18 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:49:19 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:19 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16449 >/dev/null 2>/dev/null selfserv_9208 with PID 16449 found at Wed May 10 11:49:19 UTC 2017 selfserv_9208 with PID 16449 started at Wed May 10 11:49:19 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1909: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 16449 at Wed May 10 11:49:19 UTC 2017 kill -USR1 16449 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16449 killed at Wed May 10 11:49:19 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:49:19 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:19 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16506 >/dev/null 2>/dev/null selfserv_9208 with PID 16506 found at Wed May 10 11:49:19 UTC 2017 selfserv_9208 with PID 16506 started at Wed May 10 11:49:19 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1910: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 16506 at Wed May 10 11:49:20 UTC 2017 kill -USR1 16506 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16506 killed at Wed May 10 11:49:20 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:49:20 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16564 >/dev/null 2>/dev/null selfserv_9208 with PID 16564 found at Wed May 10 11:49:20 UTC 2017 selfserv_9208 with PID 16564 started at Wed May 10 11:49:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1911: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 16564 at Wed May 10 11:49:20 UTC 2017 kill -USR1 16564 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16564 killed at Wed May 10 11:49:20 UTC 2017 ssl.sh: TLS Server hello response without SNI ---- selfserv_9208 starting at Wed May 10 11:49:20 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16643 >/dev/null 2>/dev/null selfserv_9208 with PID 16643 found at Wed May 10 11:49:20 UTC 2017 selfserv_9208 with PID 16643 started at Wed May 10 11:49:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1912: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 16643 at Wed May 10 11:49:21 UTC 2017 kill -USR1 16643 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16643 killed at Wed May 10 11:49:21 UTC 2017 ssl.sh: TLS Server hello response with SNI ---- selfserv_9208 starting at Wed May 10 11:49:21 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16706 >/dev/null 2>/dev/null selfserv_9208 with PID 16706 found at Wed May 10 11:49:21 UTC 2017 selfserv_9208 with PID 16706 started at Wed May 10 11:49:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1913: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 16706 at Wed May 10 11:49:21 UTC 2017 kill -USR1 16706 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16706 killed at Wed May 10 11:49:21 UTC 2017 ssl.sh: TLS Server response with alert ---- selfserv_9208 starting at Wed May 10 11:49:21 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16769 >/dev/null 2>/dev/null selfserv_9208 with PID 16769 found at Wed May 10 11:49:22 UTC 2017 selfserv_9208 with PID 16769 started at Wed May 10 11:49:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1914: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 16769 at Wed May 10 11:49:22 UTC 2017 kill -USR1 16769 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16769 killed at Wed May 10 11:49:22 UTC 2017 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9208 starting at Wed May 10 11:49:22 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16832 >/dev/null 2>/dev/null selfserv_9208 with PID 16832 found at Wed May 10 11:49:22 UTC 2017 selfserv_9208 with PID 16832 started at Wed May 10 11:49:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n TestUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1915: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 16832 at Wed May 10 11:49:22 UTC 2017 kill -USR1 16832 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16832 killed at Wed May 10 11:49:22 UTC 2017 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9208 starting at Wed May 10 11:49:22 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16895 >/dev/null 2>/dev/null selfserv_9208 with PID 16895 found at Wed May 10 11:49:22 UTC 2017 selfserv_9208 with PID 16895 started at Wed May 10 11:49:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1916: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 16895 at Wed May 10 11:49:23 UTC 2017 kill -USR1 16895 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16895 killed at Wed May 10 11:49:23 UTC 2017 ssl.sh: TLS Server hello response without SNI ---- selfserv_9208 starting at Wed May 10 11:49:23 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16958 >/dev/null 2>/dev/null selfserv_9208 with PID 16958 found at Wed May 10 11:49:23 UTC 2017 selfserv_9208 with PID 16958 started at Wed May 10 11:49:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1917: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 16958 at Wed May 10 11:49:23 UTC 2017 kill -USR1 16958 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16958 killed at Wed May 10 11:49:23 UTC 2017 ssl.sh: TLS Server hello response with SNI ---- selfserv_9208 starting at Wed May 10 11:49:23 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17021 >/dev/null 2>/dev/null selfserv_9208 with PID 17021 found at Wed May 10 11:49:23 UTC 2017 selfserv_9208 with PID 17021 started at Wed May 10 11:49:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1918: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 17021 at Wed May 10 11:49:24 UTC 2017 kill -USR1 17021 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17021 killed at Wed May 10 11:49:24 UTC 2017 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9208 starting at Wed May 10 11:49:24 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:24 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17085 >/dev/null 2>/dev/null selfserv_9208 with PID 17085 found at Wed May 10 11:49:24 UTC 2017 selfserv_9208 with PID 17085 started at Wed May 10 11:49:24 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #1919: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 17085 at Wed May 10 11:49:24 UTC 2017 kill -USR1 17085 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17085 killed at Wed May 10 11:49:24 UTC 2017 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9208 starting at Wed May 10 11:49:24 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:24 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17148 >/dev/null 2>/dev/null selfserv_9208 with PID 17148 found at Wed May 10 11:49:24 UTC 2017 selfserv_9208 with PID 17148 started at Wed May 10 11:49:24 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1920: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 17148 at Wed May 10 11:49:25 UTC 2017 kill -USR1 17148 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17148 killed at Wed May 10 11:49:25 UTC 2017 ssl.sh: TLS Server response with alert ---- selfserv_9208 starting at Wed May 10 11:49:25 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:25 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17211 >/dev/null 2>/dev/null selfserv_9208 with PID 17211 found at Wed May 10 11:49:25 UTC 2017 selfserv_9208 with PID 17211 started at Wed May 10 11:49:25 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1921: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 17211 at Wed May 10 11:49:25 UTC 2017 kill -USR1 17211 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17211 killed at Wed May 10 11:49:25 UTC 2017 ssl.sh: SSL Cert Status (OCSP Stapling) - server fips/client normal - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status (non-FIPS only) ssl.sh: skipping OCSP stapling, signed response, revoked status (non-FIPS only) ssl.sh: skipping OCSP stapling, signed response, unknown status (non-FIPS only) ssl.sh: skipping OCSP stapling, unsigned failure response (non-FIPS only) ssl.sh: skipping OCSP stapling, good status, bad signature (non-FIPS only) ssl.sh: skipping OCSP stapling, invalid cert status data (non-FIPS only) ssl.sh: skipping Valid cert, Server doesn't staple (non-FIPS only) ssl.sh: skipping Stress OCSP stapling, server uses random status (non-FIPS only) ssl.sh: SSL Stress Test - server fips/client normal - with ECC =============================== ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9208 starting at Wed May 10 11:49:25 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:25 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17318 >/dev/null 2>/dev/null selfserv_9208 with PID 17318 found at Wed May 10 11:49:25 UTC 2017 selfserv_9208 with PID 17318 started at Wed May 10 11:49:25 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -c 1000 -C c -V ssl3:ssl3 \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:49:25 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 11:49:26 UTC 2017 ssl.sh: #1922: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 17318 at Wed May 10 11:49:26 UTC 2017 kill -USR1 17318 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17318 killed at Wed May 10 11:49:26 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9208 starting at Wed May 10 11:49:26 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:26 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17389 >/dev/null 2>/dev/null selfserv_9208 with PID 17389 found at Wed May 10 11:49:26 UTC 2017 selfserv_9208 with PID 17389 started at Wed May 10 11:49:26 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -c 1000 -C c \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:49:26 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 11:49:27 UTC 2017 ssl.sh: #1923: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 17389 at Wed May 10 11:49:27 UTC 2017 kill -USR1 17389 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17389 killed at Wed May 10 11:49:27 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9208 starting at Wed May 10 11:49:27 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:27 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17460 >/dev/null 2>/dev/null selfserv_9208 with PID 17460 found at Wed May 10 11:49:27 UTC 2017 selfserv_9208 with PID 17460 started at Wed May 10 11:49:27 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -c 1000 -C c -g \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:49:27 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 11:49:28 UTC 2017 ssl.sh: #1924: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 17460 at Wed May 10 11:49:28 UTC 2017 kill -USR1 17460 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17460 killed at Wed May 10 11:49:28 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9208 starting at Wed May 10 11:49:28 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:28 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17531 >/dev/null 2>/dev/null selfserv_9208 with PID 17531 found at Wed May 10 11:49:28 UTC 2017 selfserv_9208 with PID 17531 started at Wed May 10 11:49:28 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C c -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:49:28 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Wed May 10 11:49:29 UTC 2017 ssl.sh: #1925: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 17531 at Wed May 10 11:49:29 UTC 2017 kill -USR1 17531 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17531 killed at Wed May 10 11:49:29 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9208 starting at Wed May 10 11:49:29 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:29 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17602 >/dev/null 2>/dev/null selfserv_9208 with PID 17602 found at Wed May 10 11:49:29 UTC 2017 selfserv_9208 with PID 17602 started at Wed May 10 11:49:29 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C c -z \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:49:29 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 11:49:30 UTC 2017 ssl.sh: #1926: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 17602 at Wed May 10 11:49:30 UTC 2017 kill -USR1 17602 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17602 killed at Wed May 10 11:49:30 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9208 starting at Wed May 10 11:49:30 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:30 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17673 >/dev/null 2>/dev/null selfserv_9208 with PID 17673 found at Wed May 10 11:49:30 UTC 2017 selfserv_9208 with PID 17673 started at Wed May 10 11:49:30 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:49:30 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Wed May 10 11:49:31 UTC 2017 ssl.sh: #1927: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 17673 at Wed May 10 11:49:31 UTC 2017 kill -USR1 17673 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17673 killed at Wed May 10 11:49:31 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9208 starting at Wed May 10 11:49:31 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:31 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17744 >/dev/null 2>/dev/null selfserv_9208 with PID 17744 found at Wed May 10 11:49:31 UTC 2017 selfserv_9208 with PID 17744 started at Wed May 10 11:49:31 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z -g \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:49:31 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Wed May 10 11:49:33 UTC 2017 ssl.sh: #1928: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 17744 at Wed May 10 11:49:33 UTC 2017 kill -USR1 17744 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17744 killed at Wed May 10 11:49:33 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9208 starting at Wed May 10 11:49:33 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -a localhost-sni.localdomain -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:33 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17821 >/dev/null 2>/dev/null selfserv_9208 with PID 17821 found at Wed May 10 11:49:33 UTC 2017 selfserv_9208 with PID 17821 started at Wed May 10 11:49:33 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V tls1.0:tls1.2 -c 1000 -C c -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:49:33 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Wed May 10 11:49:34 UTC 2017 ssl.sh: #1929: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 17821 at Wed May 10 11:49:34 UTC 2017 kill -USR1 17821 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17821 killed at Wed May 10 11:49:34 UTC 2017 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 11:49:34 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:34 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17907 >/dev/null 2>/dev/null selfserv_9208 with PID 17907 found at Wed May 10 11:49:34 UTC 2017 selfserv_9208 with PID 17907 started at Wed May 10 11:49:34 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -c 100 -C c -V ssl3:ssl3 -N -n TestUser \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:49:34 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 11:49:35 UTC 2017 ssl.sh: #1930: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 17907 at Wed May 10 11:49:36 UTC 2017 kill -USR1 17907 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17907 killed at Wed May 10 11:49:36 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 11:49:36 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:36 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17977 >/dev/null 2>/dev/null selfserv_9208 with PID 17977 found at Wed May 10 11:49:36 UTC 2017 selfserv_9208 with PID 17977 started at Wed May 10 11:49:36 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -c 100 -C c -N -n TestUser \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:49:36 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 11:49:37 UTC 2017 ssl.sh: #1931: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 17977 at Wed May 10 11:49:37 UTC 2017 kill -USR1 17977 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17977 killed at Wed May 10 11:49:37 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9208 starting at Wed May 10 11:49:37 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:37 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18047 >/dev/null 2>/dev/null selfserv_9208 with PID 18047 found at Wed May 10 11:49:37 UTC 2017 selfserv_9208 with PID 18047 started at Wed May 10 11:49:37 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:49:37 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Wed May 10 11:49:38 UTC 2017 ssl.sh: #1932: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 18047 at Wed May 10 11:49:38 UTC 2017 kill -USR1 18047 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18047 killed at Wed May 10 11:49:38 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9208 starting at Wed May 10 11:49:38 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:38 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18118 >/dev/null 2>/dev/null selfserv_9208 with PID 18118 found at Wed May 10 11:49:38 UTC 2017 selfserv_9208 with PID 18118 started at Wed May 10 11:49:38 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:49:38 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 11:49:38 UTC 2017 ssl.sh: #1933: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 18118 at Wed May 10 11:49:38 UTC 2017 kill -USR1 18118 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18118 killed at Wed May 10 11:49:38 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9208 starting at Wed May 10 11:49:39 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:39 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18189 >/dev/null 2>/dev/null selfserv_9208 with PID 18189 found at Wed May 10 11:49:39 UTC 2017 selfserv_9208 with PID 18189 started at Wed May 10 11:49:39 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z -g \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:49:39 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 11:49:39 UTC 2017 ssl.sh: #1934: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 18189 at Wed May 10 11:49:39 UTC 2017 kill -USR1 18189 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18189 killed at Wed May 10 11:49:39 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9208 starting at Wed May 10 11:49:39 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:39 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18260 >/dev/null 2>/dev/null selfserv_9208 with PID 18260 found at Wed May 10 11:49:39 UTC 2017 selfserv_9208 with PID 18260 started at Wed May 10 11:49:39 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:49:39 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Wed May 10 11:49:40 UTC 2017 ssl.sh: #1935: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 18260 at Wed May 10 11:49:40 UTC 2017 kill -USR1 18260 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18260 killed at Wed May 10 11:49:40 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9208 starting at Wed May 10 11:49:40 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:40 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18331 >/dev/null 2>/dev/null selfserv_9208 with PID 18331 found at Wed May 10 11:49:40 UTC 2017 selfserv_9208 with PID 18331 started at Wed May 10 11:49:40 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z -g \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:49:40 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Wed May 10 11:49:40 UTC 2017 ssl.sh: #1936: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 18331 at Wed May 10 11:49:40 UTC 2017 kill -USR1 18331 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18331 killed at Wed May 10 11:49:40 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9208 starting at Wed May 10 11:49:40 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:40 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18408 >/dev/null 2>/dev/null selfserv_9208 with PID 18408 found at Wed May 10 11:49:40 UTC 2017 selfserv_9208 with PID 18408 started at Wed May 10 11:49:40 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V tls1.0:tls1.2 -c 1000 -C c -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:49:40 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Wed May 10 11:49:41 UTC 2017 ssl.sh: #1937: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 18408 at Wed May 10 11:49:41 UTC 2017 kill -USR1 18408 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18408 killed at Wed May 10 11:49:41 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9208 starting at Wed May 10 11:49:41 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:41 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18485 >/dev/null 2>/dev/null selfserv_9208 with PID 18485 found at Wed May 10 11:49:42 UTC 2017 selfserv_9208 with PID 18485 started at Wed May 10 11:49:42 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V tls1.0:tls1.2 -c 1000 -C c -u -a localhost-sni.localdomain \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:49:42 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Wed May 10 11:49:43 UTC 2017 ssl.sh: #1938: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 18485 at Wed May 10 11:49:43 UTC 2017 kill -USR1 18485 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18485 killed at Wed May 10 11:49:43 UTC 2017 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9208 starting at Wed May 10 11:49:43 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:43 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18571 >/dev/null 2>/dev/null selfserv_9208 with PID 18571 found at Wed May 10 11:49:43 UTC 2017 selfserv_9208 with PID 18571 started at Wed May 10 11:49:43 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C009 -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:49:43 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 11:49:46 UTC 2017 ssl.sh: #1939: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 18571 at Wed May 10 11:49:46 UTC 2017 kill -USR1 18571 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18571 killed at Wed May 10 11:49:46 UTC 2017 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9208 starting at Wed May 10 11:49:46 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:46 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18641 >/dev/null 2>/dev/null selfserv_9208 with PID 18641 found at Wed May 10 11:49:46 UTC 2017 selfserv_9208 with PID 18641 started at Wed May 10 11:49:46 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C023 -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:49:46 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 11:49:49 UTC 2017 ssl.sh: #1940: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 18641 at Wed May 10 11:49:49 UTC 2017 kill -USR1 18641 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18641 killed at Wed May 10 11:49:49 UTC 2017 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9208 starting at Wed May 10 11:49:49 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:49 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18711 >/dev/null 2>/dev/null selfserv_9208 with PID 18711 found at Wed May 10 11:49:49 UTC 2017 selfserv_9208 with PID 18711 started at Wed May 10 11:49:49 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C02B -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:49:49 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 11:49:52 UTC 2017 ssl.sh: #1941: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 18711 at Wed May 10 11:49:52 UTC 2017 kill -USR1 18711 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18711 killed at Wed May 10 11:49:52 UTC 2017 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9208 starting at Wed May 10 11:49:52 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:52 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18781 >/dev/null 2>/dev/null selfserv_9208 with PID 18781 found at Wed May 10 11:49:52 UTC 2017 selfserv_9208 with PID 18781 started at Wed May 10 11:49:52 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C004 -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:49:52 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 11:49:56 UTC 2017 ssl.sh: #1942: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 18781 at Wed May 10 11:49:56 UTC 2017 kill -USR1 18781 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18781 killed at Wed May 10 11:49:56 UTC 2017 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9208 starting at Wed May 10 11:49:56 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18851 >/dev/null 2>/dev/null selfserv_9208 with PID 18851 found at Wed May 10 11:49:56 UTC 2017 selfserv_9208 with PID 18851 started at Wed May 10 11:49:56 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C00E -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:49:56 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 11:49:58 UTC 2017 ssl.sh: #1943: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 18851 at Wed May 10 11:49:58 UTC 2017 kill -USR1 18851 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18851 killed at Wed May 10 11:49:58 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9208 starting at Wed May 10 11:49:58 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18921 >/dev/null 2>/dev/null selfserv_9208 with PID 18921 found at Wed May 10 11:49:58 UTC 2017 selfserv_9208 with PID 18921 started at Wed May 10 11:49:58 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :C013 \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:49:58 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 11:49:59 UTC 2017 ssl.sh: #1944: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 18921 at Wed May 10 11:49:59 UTC 2017 kill -USR1 18921 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18921 killed at Wed May 10 11:49:59 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9208 starting at Wed May 10 11:49:59 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:49:59 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18992 >/dev/null 2>/dev/null selfserv_9208 with PID 18992 found at Wed May 10 11:49:59 UTC 2017 selfserv_9208 with PID 18992 started at Wed May 10 11:49:59 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :C027 \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:49:59 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 11:50:00 UTC 2017 ssl.sh: #1945: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 18992 at Wed May 10 11:50:00 UTC 2017 kill -USR1 18992 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18992 killed at Wed May 10 11:50:00 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9208 starting at Wed May 10 11:50:00 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:50:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19063 >/dev/null 2>/dev/null selfserv_9208 with PID 19063 found at Wed May 10 11:50:00 UTC 2017 selfserv_9208 with PID 19063 started at Wed May 10 11:50:00 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :C02F \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:50:00 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 11:50:01 UTC 2017 ssl.sh: #1946: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 19063 at Wed May 10 11:50:01 UTC 2017 kill -USR1 19063 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19063 killed at Wed May 10 11:50:01 UTC 2017 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9208 starting at Wed May 10 11:50:01 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:50:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19134 >/dev/null 2>/dev/null selfserv_9208 with PID 19134 found at Wed May 10 11:50:01 UTC 2017 selfserv_9208 with PID 19134 started at Wed May 10 11:50:01 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :C004 -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:50:01 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Wed May 10 11:50:02 UTC 2017 ssl.sh: #1947: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 19134 at Wed May 10 11:50:02 UTC 2017 kill -USR1 19134 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19134 killed at Wed May 10 11:50:02 UTC 2017 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9208 starting at Wed May 10 11:50:02 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:50:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19205 >/dev/null 2>/dev/null selfserv_9208 with PID 19205 found at Wed May 10 11:50:02 UTC 2017 selfserv_9208 with PID 19205 started at Wed May 10 11:50:02 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C009 -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:50:02 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Wed May 10 11:50:02 UTC 2017 ssl.sh: #1948: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 19205 at Wed May 10 11:50:02 UTC 2017 kill -USR1 19205 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19205 killed at Wed May 10 11:50:02 UTC 2017 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 11:50:02 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:50:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19291 >/dev/null 2>/dev/null selfserv_9208 with PID 19291 found at Wed May 10 11:50:03 UTC 2017 selfserv_9208 with PID 19291 started at Wed May 10 11:50:03 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 10 -C :C009 -N -n TestUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:50:03 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Wed May 10 11:50:03 UTC 2017 ssl.sh: #1949: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 19291 at Wed May 10 11:50:03 UTC 2017 kill -USR1 19291 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19291 killed at Wed May 10 11:50:03 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9208 starting at Wed May 10 11:50:04 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:50:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19361 >/dev/null 2>/dev/null selfserv_9208 with PID 19361 found at Wed May 10 11:50:04 UTC 2017 selfserv_9208 with PID 19361 started at Wed May 10 11:50:04 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:50:04 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 11:50:04 UTC 2017 ssl.sh: #1950: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 19361 at Wed May 10 11:50:04 UTC 2017 kill -USR1 19361 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19361 killed at Wed May 10 11:50:04 UTC 2017 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 11:50:04 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:50:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19432 >/dev/null 2>/dev/null selfserv_9208 with PID 19432 found at Wed May 10 11:50:04 UTC 2017 selfserv_9208 with PID 19432 started at Wed May 10 11:50:04 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 10 -C :C004 -N -n TestUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:50:04 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Wed May 10 11:50:05 UTC 2017 ssl.sh: #1951: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 19432 at Wed May 10 11:50:05 UTC 2017 kill -USR1 19432 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19432 killed at Wed May 10 11:50:05 UTC 2017 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 11:50:05 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:50:05 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19502 >/dev/null 2>/dev/null selfserv_9208 with PID 19502 found at Wed May 10 11:50:05 UTC 2017 selfserv_9208 with PID 19502 started at Wed May 10 11:50:05 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 10 -C :C00E -N -n TestUser-ecmixed \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:50:05 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Wed May 10 11:50:06 UTC 2017 ssl.sh: #1952: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 19502 at Wed May 10 11:50:06 UTC 2017 kill -USR1 19502 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19502 killed at Wed May 10 11:50:06 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9208 starting at Wed May 10 11:50:06 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:50:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19572 >/dev/null 2>/dev/null selfserv_9208 with PID 19572 found at Wed May 10 11:50:06 UTC 2017 selfserv_9208 with PID 19572 started at Wed May 10 11:50:06 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:50:06 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 11:50:07 UTC 2017 ssl.sh: #1953: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 19572 at Wed May 10 11:50:07 UTC 2017 kill -USR1 19572 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19572 killed at Wed May 10 11:50:07 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9208 starting at Wed May 10 11:50:07 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:50:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19643 >/dev/null 2>/dev/null selfserv_9208 with PID 19643 found at Wed May 10 11:50:07 UTC 2017 selfserv_9208 with PID 19643 started at Wed May 10 11:50:07 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:50:07 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Wed May 10 11:50:07 UTC 2017 ssl.sh: #1954: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 19643 at Wed May 10 11:50:07 UTC 2017 kill -USR1 19643 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19643 killed at Wed May 10 11:50:07 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9208 starting at Wed May 10 11:50:07 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:50:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19729 >/dev/null 2>/dev/null selfserv_9208 with PID 19729 found at Wed May 10 11:50:07 UTC 2017 selfserv_9208 with PID 19729 started at Wed May 10 11:50:07 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :0016 -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:50:07 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 11:50:09 UTC 2017 ssl.sh: #1955: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 19729 at Wed May 10 11:50:10 UTC 2017 kill -USR1 19729 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19729 killed at Wed May 10 11:50:10 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9208 starting at Wed May 10 11:50:10 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:50:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19799 >/dev/null 2>/dev/null selfserv_9208 with PID 19799 found at Wed May 10 11:50:10 UTC 2017 selfserv_9208 with PID 19799 started at Wed May 10 11:50:10 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :0033 \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:50:10 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 11:50:10 UTC 2017 ssl.sh: #1956: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 19799 at Wed May 10 11:50:10 UTC 2017 kill -USR1 19799 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19799 killed at Wed May 10 11:50:11 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9208 starting at Wed May 10 11:50:11 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:50:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19870 >/dev/null 2>/dev/null selfserv_9208 with PID 19870 found at Wed May 10 11:50:11 UTC 2017 selfserv_9208 with PID 19870 started at Wed May 10 11:50:11 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :0039 -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:50:11 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 11:50:13 UTC 2017 ssl.sh: #1957: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 19870 at Wed May 10 11:50:13 UTC 2017 kill -USR1 19870 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19870 killed at Wed May 10 11:50:13 UTC 2017 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9208 starting at Wed May 10 11:50:13 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:50:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19940 >/dev/null 2>/dev/null selfserv_9208 with PID 19940 found at Wed May 10 11:50:13 UTC 2017 selfserv_9208 with PID 19940 started at Wed May 10 11:50:13 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :0040 -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:50:13 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 11:50:16 UTC 2017 ssl.sh: #1958: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 19940 at Wed May 10 11:50:16 UTC 2017 kill -USR1 19940 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19940 killed at Wed May 10 11:50:16 UTC 2017 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9208 starting at Wed May 10 11:50:16 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:50:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20020 >/dev/null 2>/dev/null selfserv_9208 with PID 20020 found at Wed May 10 11:50:16 UTC 2017 selfserv_9208 with PID 20020 started at Wed May 10 11:50:16 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :0038 -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:50:16 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed May 10 11:50:41 UTC 2017 ssl.sh: #1959: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 20020 at Wed May 10 11:50:41 UTC 2017 kill -USR1 20020 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20020 killed at Wed May 10 11:50:41 UTC 2017 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9208 starting at Wed May 10 11:50:41 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:50:41 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20100 >/dev/null 2>/dev/null selfserv_9208 with PID 20100 found at Wed May 10 11:50:41 UTC 2017 selfserv_9208 with PID 20100 started at Wed May 10 11:50:41 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :006A -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:50:41 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed May 10 11:51:06 UTC 2017 ssl.sh: #1960: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 20100 at Wed May 10 11:51:06 UTC 2017 kill -USR1 20100 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20100 killed at Wed May 10 11:51:06 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9208 starting at Wed May 10 11:51:06 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:51:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20170 >/dev/null 2>/dev/null selfserv_9208 with PID 20170 found at Wed May 10 11:51:06 UTC 2017 selfserv_9208 with PID 20170 started at Wed May 10 11:51:06 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :006B -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:51:06 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 11:51:08 UTC 2017 ssl.sh: #1961: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 20170 at Wed May 10 11:51:08 UTC 2017 kill -USR1 20170 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20170 killed at Wed May 10 11:51:08 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9208 starting at Wed May 10 11:51:08 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:51:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20240 >/dev/null 2>/dev/null selfserv_9208 with PID 20240 found at Wed May 10 11:51:08 UTC 2017 selfserv_9208 with PID 20240 started at Wed May 10 11:51:08 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :009E -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:51:08 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 11:51:11 UTC 2017 ssl.sh: #1962: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 20240 at Wed May 10 11:51:11 UTC 2017 kill -USR1 20240 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20240 killed at Wed May 10 11:51:11 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) ---- selfserv_9208 starting at Wed May 10 11:51:11 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009F -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:51:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20310 >/dev/null 2>/dev/null selfserv_9208 with PID 20310 found at Wed May 10 11:51:11 UTC 2017 selfserv_9208 with PID 20310 started at Wed May 10 11:51:11 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :009F -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:51:11 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 11:51:13 UTC 2017 ssl.sh: #1963: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 20310 at Wed May 10 11:51:13 UTC 2017 kill -USR1 20310 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20310 killed at Wed May 10 11:51:13 UTC 2017 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 11:51:13 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:51:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20395 >/dev/null 2>/dev/null selfserv_9208 with PID 20395 found at Wed May 10 11:51:13 UTC 2017 selfserv_9208 with PID 20395 started at Wed May 10 11:51:13 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :0032 -N -n TestUser-dsa \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:51:13 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 11:51:17 UTC 2017 ssl.sh: #1964: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 20395 at Wed May 10 11:51:17 UTC 2017 kill -USR1 20395 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20395 killed at Wed May 10 11:51:17 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9208 starting at Wed May 10 11:51:17 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:51:17 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20465 >/dev/null 2>/dev/null selfserv_9208 with PID 20465 found at Wed May 10 11:51:17 UTC 2017 selfserv_9208 with PID 20465 started at Wed May 10 11:51:17 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :0067 -n TestUser-dsamixed \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:51:17 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 11:51:18 UTC 2017 ssl.sh: #1965: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 20465 at Wed May 10 11:51:18 UTC 2017 kill -USR1 20465 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20465 killed at Wed May 10 11:51:18 UTC 2017 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 11:51:18 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:51:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20551 >/dev/null 2>/dev/null selfserv_9208 with PID 20551 found at Wed May 10 11:51:18 UTC 2017 selfserv_9208 with PID 20551 started at Wed May 10 11:51:18 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :00A2 -N -n TestUser-dsa \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:51:18 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed May 10 11:51:54 UTC 2017 ssl.sh: #1966: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 20551 at Wed May 10 11:51:54 UTC 2017 kill -USR1 20551 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20551 killed at Wed May 10 11:51:54 UTC 2017 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 11:51:54 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A3 -u -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:51:54 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20621 >/dev/null 2>/dev/null selfserv_9208 with PID 20621 found at Wed May 10 11:51:54 UTC 2017 selfserv_9208 with PID 20621 started at Wed May 10 11:51:54 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :00A3 -N -n TestUser-dsa \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:51:54 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed May 10 11:52:29 UTC 2017 ssl.sh: #1967: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 20621 at Wed May 10 11:52:29 UTC 2017 kill -USR1 20621 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20621 killed at Wed May 10 11:52:29 UTC 2017 ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal - with ECC =============================== selfserv_9208 starting at Wed May 10 11:52:29 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:52:30 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20683 >/dev/null 2>/dev/null selfserv_9208 with PID 20683 found at Wed May 10 11:52:30 UTC 2017 selfserv_9208 with PID 20683 started at Wed May 10 11:52:30 UTC 2017 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1968: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1969: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1970: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1971: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1972: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1973: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1974: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1975: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1976: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1977: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1978: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1979: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1980: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1981: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1982: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1983: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1984: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1985: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1986: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1987: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1988: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1989: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1990: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1991: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1992: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1993: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1994: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1995: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1996: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1997: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1998: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1999: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2000: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2001: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2002: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2003: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2004: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2005: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2006: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2007: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2008: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2009: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2010: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2011: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2012: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2013: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2014: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2015: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2016: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2017: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2018: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2019: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2020: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2021: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2022: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2023: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2024: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2025: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2026: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2027: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2028: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2029: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2030: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2031: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2032: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2033: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2034: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2035: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2036: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2037: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2038: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2039: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2040: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2041: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2042: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2043: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2044: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2045: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2046: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2047: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2048: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2049: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2050: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2051: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2052: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2053: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2054: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2055: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2056: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2057: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2058: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2059: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2060: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2061: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2062: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2063: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2064: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2065: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2066: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2067: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2068: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2069: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2070: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2071: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2072: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2073: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2074: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2075: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2076: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2077: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2078: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2079: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2080: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2081: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2082: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2083: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2084: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2085: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2086: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :CCA8 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2087: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :CCA9 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2088: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 20683 at Wed May 10 11:52:45 UTC 2017 kill -USR1 20683 selfserv: 0 cache hits; 121 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20683 killed at Wed May 10 11:52:45 UTC 2017 ssl.sh: SSL Client Authentication Extended Test - server fips/client normal - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:52:46 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:52:46 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22950 >/dev/null 2>/dev/null selfserv_9208 with PID 22950 found at Wed May 10 11:52:46 UTC 2017 selfserv_9208 with PID 22950 started at Wed May 10 11:52:46 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2089: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 22950 at Wed May 10 11:52:46 UTC 2017 kill -USR1 22950 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22950 killed at Wed May 10 11:52:46 UTC 2017 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 11:52:46 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:52:46 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23007 >/dev/null 2>/dev/null selfserv_9208 with PID 23007 found at Wed May 10 11:52:46 UTC 2017 selfserv_9208 with PID 23007 started at Wed May 10 11:52:46 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2090: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 23007 at Wed May 10 11:52:47 UTC 2017 kill -USR1 23007 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23007 killed at Wed May 10 11:52:47 UTC 2017 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 11:52:47 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:52:47 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23064 >/dev/null 2>/dev/null selfserv_9208 with PID 23064 found at Wed May 10 11:52:47 UTC 2017 selfserv_9208 with PID 23064 started at Wed May 10 11:52:47 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2091: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 23064 at Wed May 10 11:52:47 UTC 2017 kill -USR1 23064 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23064 killed at Wed May 10 11:52:47 UTC 2017 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:52:47 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:52:47 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23121 >/dev/null 2>/dev/null selfserv_9208 with PID 23121 found at Wed May 10 11:52:47 UTC 2017 selfserv_9208 with PID 23121 started at Wed May 10 11:52:47 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2092: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 23121 at Wed May 10 11:52:48 UTC 2017 kill -USR1 23121 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23121 killed at Wed May 10 11:52:48 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 11:52:48 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:52:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23178 >/dev/null 2>/dev/null selfserv_9208 with PID 23178 found at Wed May 10 11:52:48 UTC 2017 selfserv_9208 with PID 23178 started at Wed May 10 11:52:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2093: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 23178 at Wed May 10 11:52:48 UTC 2017 kill -USR1 23178 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23178 killed at Wed May 10 11:52:48 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 11:52:48 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:52:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23236 >/dev/null 2>/dev/null selfserv_9208 with PID 23236 found at Wed May 10 11:52:48 UTC 2017 selfserv_9208 with PID 23236 started at Wed May 10 11:52:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2094: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 23236 at Wed May 10 11:52:49 UTC 2017 kill -USR1 23236 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23236 killed at Wed May 10 11:52:49 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:52:49 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:52:49 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23293 >/dev/null 2>/dev/null selfserv_9208 with PID 23293 found at Wed May 10 11:52:49 UTC 2017 selfserv_9208 with PID 23293 started at Wed May 10 11:52:49 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2095: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 23293 at Wed May 10 11:52:49 UTC 2017 kill -USR1 23293 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23293 killed at Wed May 10 11:52:49 UTC 2017 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 11:52:49 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:52:49 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23350 >/dev/null 2>/dev/null selfserv_9208 with PID 23350 found at Wed May 10 11:52:49 UTC 2017 selfserv_9208 with PID 23350 started at Wed May 10 11:52:49 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2096: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 23350 at Wed May 10 11:52:50 UTC 2017 kill -USR1 23350 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23350 killed at Wed May 10 11:52:50 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 11:52:50 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:52:50 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23407 >/dev/null 2>/dev/null selfserv_9208 with PID 23407 found at Wed May 10 11:52:50 UTC 2017 selfserv_9208 with PID 23407 started at Wed May 10 11:52:50 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2097: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 23407 at Wed May 10 11:52:50 UTC 2017 kill -USR1 23407 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23407 killed at Wed May 10 11:52:50 UTC 2017 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:52:50 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:52:50 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23464 >/dev/null 2>/dev/null selfserv_9208 with PID 23464 found at Wed May 10 11:52:50 UTC 2017 selfserv_9208 with PID 23464 started at Wed May 10 11:52:50 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2098: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 23464 at Wed May 10 11:52:51 UTC 2017 kill -USR1 23464 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23464 killed at Wed May 10 11:52:51 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 11:52:51 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:52:51 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23522 >/dev/null 2>/dev/null selfserv_9208 with PID 23522 found at Wed May 10 11:52:51 UTC 2017 selfserv_9208 with PID 23522 started at Wed May 10 11:52:51 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2099: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 23522 at Wed May 10 11:52:51 UTC 2017 kill -USR1 23522 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23522 killed at Wed May 10 11:52:51 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 11:52:51 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:52:51 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23579 >/dev/null 2>/dev/null selfserv_9208 with PID 23579 found at Wed May 10 11:52:51 UTC 2017 selfserv_9208 with PID 23579 started at Wed May 10 11:52:51 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2100: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 23579 at Wed May 10 11:52:52 UTC 2017 kill -USR1 23579 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23579 killed at Wed May 10 11:52:52 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:52:52 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:52:52 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23636 >/dev/null 2>/dev/null selfserv_9208 with PID 23636 found at Wed May 10 11:52:52 UTC 2017 selfserv_9208 with PID 23636 started at Wed May 10 11:52:52 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2101: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 23636 at Wed May 10 11:52:52 UTC 2017 kill -USR1 23636 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23636 killed at Wed May 10 11:52:52 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:52:53 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:52:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23693 >/dev/null 2>/dev/null selfserv_9208 with PID 23693 found at Wed May 10 11:52:53 UTC 2017 selfserv_9208 with PID 23693 started at Wed May 10 11:52:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2102: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 23693 at Wed May 10 11:52:53 UTC 2017 kill -USR1 23693 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23693 killed at Wed May 10 11:52:53 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:52:53 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:52:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23750 >/dev/null 2>/dev/null selfserv_9208 with PID 23750 found at Wed May 10 11:52:53 UTC 2017 selfserv_9208 with PID 23750 started at Wed May 10 11:52:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2103: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 23750 at Wed May 10 11:52:54 UTC 2017 kill -USR1 23750 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23750 killed at Wed May 10 11:52:54 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:52:54 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:52:54 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23807 >/dev/null 2>/dev/null selfserv_9208 with PID 23807 found at Wed May 10 11:52:54 UTC 2017 selfserv_9208 with PID 23807 started at Wed May 10 11:52:54 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2104: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 23807 at Wed May 10 11:52:54 UTC 2017 kill -USR1 23807 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23807 killed at Wed May 10 11:52:54 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:52:54 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:52:54 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23864 >/dev/null 2>/dev/null selfserv_9208 with PID 23864 found at Wed May 10 11:52:54 UTC 2017 selfserv_9208 with PID 23864 started at Wed May 10 11:52:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2105: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 23864 at Wed May 10 11:52:55 UTC 2017 kill -USR1 23864 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23864 killed at Wed May 10 11:52:55 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:52:55 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:52:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23921 >/dev/null 2>/dev/null selfserv_9208 with PID 23921 found at Wed May 10 11:52:55 UTC 2017 selfserv_9208 with PID 23921 started at Wed May 10 11:52:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2106: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 23921 at Wed May 10 11:52:56 UTC 2017 kill -USR1 23921 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23921 killed at Wed May 10 11:52:56 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:52:56 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:52:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23978 >/dev/null 2>/dev/null selfserv_9208 with PID 23978 found at Wed May 10 11:52:56 UTC 2017 selfserv_9208 with PID 23978 started at Wed May 10 11:52:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2107: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 23978 at Wed May 10 11:52:56 UTC 2017 kill -USR1 23978 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23978 killed at Wed May 10 11:52:56 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:52:56 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:52:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24035 >/dev/null 2>/dev/null selfserv_9208 with PID 24035 found at Wed May 10 11:52:56 UTC 2017 selfserv_9208 with PID 24035 started at Wed May 10 11:52:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2108: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 24035 at Wed May 10 11:52:57 UTC 2017 kill -USR1 24035 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24035 killed at Wed May 10 11:52:57 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:52:57 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:52:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24092 >/dev/null 2>/dev/null selfserv_9208 with PID 24092 found at Wed May 10 11:52:57 UTC 2017 selfserv_9208 with PID 24092 started at Wed May 10 11:52:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2109: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 24092 at Wed May 10 11:52:58 UTC 2017 kill -USR1 24092 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24092 killed at Wed May 10 11:52:58 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:52:58 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:52:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24149 >/dev/null 2>/dev/null selfserv_9208 with PID 24149 found at Wed May 10 11:52:58 UTC 2017 selfserv_9208 with PID 24149 started at Wed May 10 11:52:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2110: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 24149 at Wed May 10 11:52:58 UTC 2017 kill -USR1 24149 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24149 killed at Wed May 10 11:52:58 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:52:58 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:52:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24206 >/dev/null 2>/dev/null selfserv_9208 with PID 24206 found at Wed May 10 11:52:58 UTC 2017 selfserv_9208 with PID 24206 started at Wed May 10 11:52:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2111: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 24206 at Wed May 10 11:52:59 UTC 2017 kill -USR1 24206 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24206 killed at Wed May 10 11:52:59 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:52:59 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:52:59 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24263 >/dev/null 2>/dev/null selfserv_9208 with PID 24263 found at Wed May 10 11:52:59 UTC 2017 selfserv_9208 with PID 24263 started at Wed May 10 11:52:59 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2112: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 24263 at Wed May 10 11:53:00 UTC 2017 kill -USR1 24263 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24263 killed at Wed May 10 11:53:00 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:53:00 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24320 >/dev/null 2>/dev/null selfserv_9208 with PID 24320 found at Wed May 10 11:53:00 UTC 2017 selfserv_9208 with PID 24320 started at Wed May 10 11:53:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2113: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 24320 at Wed May 10 11:53:00 UTC 2017 kill -USR1 24320 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24320 killed at Wed May 10 11:53:00 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:53:00 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24377 >/dev/null 2>/dev/null selfserv_9208 with PID 24377 found at Wed May 10 11:53:00 UTC 2017 selfserv_9208 with PID 24377 started at Wed May 10 11:53:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2114: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 24377 at Wed May 10 11:53:01 UTC 2017 kill -USR1 24377 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24377 killed at Wed May 10 11:53:01 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:53:01 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24434 >/dev/null 2>/dev/null selfserv_9208 with PID 24434 found at Wed May 10 11:53:01 UTC 2017 selfserv_9208 with PID 24434 started at Wed May 10 11:53:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2115: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 24434 at Wed May 10 11:53:01 UTC 2017 kill -USR1 24434 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24434 killed at Wed May 10 11:53:01 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:53:01 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24491 >/dev/null 2>/dev/null selfserv_9208 with PID 24491 found at Wed May 10 11:53:01 UTC 2017 selfserv_9208 with PID 24491 started at Wed May 10 11:53:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2116: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 24491 at Wed May 10 11:53:02 UTC 2017 kill -USR1 24491 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24491 killed at Wed May 10 11:53:02 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:53:02 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24548 >/dev/null 2>/dev/null selfserv_9208 with PID 24548 found at Wed May 10 11:53:02 UTC 2017 selfserv_9208 with PID 24548 started at Wed May 10 11:53:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2117: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 24548 at Wed May 10 11:53:02 UTC 2017 kill -USR1 24548 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24548 killed at Wed May 10 11:53:02 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:53:02 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24605 >/dev/null 2>/dev/null selfserv_9208 with PID 24605 found at Wed May 10 11:53:02 UTC 2017 selfserv_9208 with PID 24605 started at Wed May 10 11:53:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2118: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 24605 at Wed May 10 11:53:03 UTC 2017 kill -USR1 24605 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24605 killed at Wed May 10 11:53:03 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:53:03 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24677 >/dev/null 2>/dev/null selfserv_9208 with PID 24677 found at Wed May 10 11:53:03 UTC 2017 selfserv_9208 with PID 24677 started at Wed May 10 11:53:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2119: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 24677 at Wed May 10 11:53:04 UTC 2017 kill -USR1 24677 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24677 killed at Wed May 10 11:53:04 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:53:04 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24734 >/dev/null 2>/dev/null selfserv_9208 with PID 24734 found at Wed May 10 11:53:04 UTC 2017 selfserv_9208 with PID 24734 started at Wed May 10 11:53:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2120: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 24734 at Wed May 10 11:53:04 UTC 2017 kill -USR1 24734 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24734 killed at Wed May 10 11:53:04 UTC 2017 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:53:04 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24791 >/dev/null 2>/dev/null selfserv_9208 with PID 24791 found at Wed May 10 11:53:04 UTC 2017 selfserv_9208 with PID 24791 started at Wed May 10 11:53:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2121: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 24791 at Wed May 10 11:53:05 UTC 2017 kill -USR1 24791 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24791 killed at Wed May 10 11:53:05 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:53:05 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:05 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24848 >/dev/null 2>/dev/null selfserv_9208 with PID 24848 found at Wed May 10 11:53:05 UTC 2017 selfserv_9208 with PID 24848 started at Wed May 10 11:53:05 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2122: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 24848 at Wed May 10 11:53:05 UTC 2017 kill -USR1 24848 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24848 killed at Wed May 10 11:53:05 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:53:05 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:05 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24905 >/dev/null 2>/dev/null selfserv_9208 with PID 24905 found at Wed May 10 11:53:05 UTC 2017 selfserv_9208 with PID 24905 started at Wed May 10 11:53:05 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2123: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 24905 at Wed May 10 11:53:06 UTC 2017 kill -USR1 24905 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24905 killed at Wed May 10 11:53:06 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:53:06 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24962 >/dev/null 2>/dev/null selfserv_9208 with PID 24962 found at Wed May 10 11:53:06 UTC 2017 selfserv_9208 with PID 24962 started at Wed May 10 11:53:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2124: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 24962 at Wed May 10 11:53:06 UTC 2017 kill -USR1 24962 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24962 killed at Wed May 10 11:53:06 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:53:06 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25019 >/dev/null 2>/dev/null selfserv_9208 with PID 25019 found at Wed May 10 11:53:06 UTC 2017 selfserv_9208 with PID 25019 started at Wed May 10 11:53:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2125: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 25019 at Wed May 10 11:53:07 UTC 2017 kill -USR1 25019 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25019 killed at Wed May 10 11:53:07 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:53:07 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25076 >/dev/null 2>/dev/null selfserv_9208 with PID 25076 found at Wed May 10 11:53:07 UTC 2017 selfserv_9208 with PID 25076 started at Wed May 10 11:53:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2126: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 25076 at Wed May 10 11:53:07 UTC 2017 kill -USR1 25076 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25076 killed at Wed May 10 11:53:07 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:53:07 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25134 >/dev/null 2>/dev/null selfserv_9208 with PID 25134 found at Wed May 10 11:53:08 UTC 2017 selfserv_9208 with PID 25134 started at Wed May 10 11:53:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2127: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 25134 at Wed May 10 11:53:08 UTC 2017 kill -USR1 25134 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25134 killed at Wed May 10 11:53:08 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:53:08 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25191 >/dev/null 2>/dev/null selfserv_9208 with PID 25191 found at Wed May 10 11:53:08 UTC 2017 selfserv_9208 with PID 25191 started at Wed May 10 11:53:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2128: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 25191 at Wed May 10 11:53:09 UTC 2017 kill -USR1 25191 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25191 killed at Wed May 10 11:53:09 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:53:09 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25248 >/dev/null 2>/dev/null selfserv_9208 with PID 25248 found at Wed May 10 11:53:09 UTC 2017 selfserv_9208 with PID 25248 started at Wed May 10 11:53:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2129: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 25248 at Wed May 10 11:53:09 UTC 2017 kill -USR1 25248 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25248 killed at Wed May 10 11:53:09 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:53:09 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25305 >/dev/null 2>/dev/null selfserv_9208 with PID 25305 found at Wed May 10 11:53:10 UTC 2017 selfserv_9208 with PID 25305 started at Wed May 10 11:53:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2130: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 25305 at Wed May 10 11:53:10 UTC 2017 kill -USR1 25305 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25305 killed at Wed May 10 11:53:10 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:53:10 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25362 >/dev/null 2>/dev/null selfserv_9208 with PID 25362 found at Wed May 10 11:53:10 UTC 2017 selfserv_9208 with PID 25362 started at Wed May 10 11:53:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2131: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 25362 at Wed May 10 11:53:11 UTC 2017 kill -USR1 25362 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25362 killed at Wed May 10 11:53:11 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:53:11 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25419 >/dev/null 2>/dev/null selfserv_9208 with PID 25419 found at Wed May 10 11:53:11 UTC 2017 selfserv_9208 with PID 25419 started at Wed May 10 11:53:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2132: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 25419 at Wed May 10 11:53:11 UTC 2017 kill -USR1 25419 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25419 killed at Wed May 10 11:53:12 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:53:12 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25477 >/dev/null 2>/dev/null selfserv_9208 with PID 25477 found at Wed May 10 11:53:12 UTC 2017 selfserv_9208 with PID 25477 started at Wed May 10 11:53:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2133: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 25477 at Wed May 10 11:53:12 UTC 2017 kill -USR1 25477 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25477 killed at Wed May 10 11:53:12 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:53:12 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25534 >/dev/null 2>/dev/null selfserv_9208 with PID 25534 found at Wed May 10 11:53:12 UTC 2017 selfserv_9208 with PID 25534 started at Wed May 10 11:53:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2134: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 25534 at Wed May 10 11:53:13 UTC 2017 kill -USR1 25534 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25534 killed at Wed May 10 11:53:13 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:53:13 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25591 >/dev/null 2>/dev/null selfserv_9208 with PID 25591 found at Wed May 10 11:53:13 UTC 2017 selfserv_9208 with PID 25591 started at Wed May 10 11:53:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2135: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 25591 at Wed May 10 11:53:13 UTC 2017 kill -USR1 25591 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25591 killed at Wed May 10 11:53:13 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:53:13 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25648 >/dev/null 2>/dev/null selfserv_9208 with PID 25648 found at Wed May 10 11:53:14 UTC 2017 selfserv_9208 with PID 25648 started at Wed May 10 11:53:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2136: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 25648 at Wed May 10 11:53:14 UTC 2017 kill -USR1 25648 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25648 killed at Wed May 10 11:53:14 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 11:53:14 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25706 >/dev/null 2>/dev/null selfserv_9208 with PID 25706 found at Wed May 10 11:53:14 UTC 2017 selfserv_9208 with PID 25706 started at Wed May 10 11:53:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2137: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 25706 at Wed May 10 11:53:15 UTC 2017 kill -USR1 25706 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25706 killed at Wed May 10 11:53:15 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 11:53:15 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25763 >/dev/null 2>/dev/null selfserv_9208 with PID 25763 found at Wed May 10 11:53:15 UTC 2017 selfserv_9208 with PID 25763 started at Wed May 10 11:53:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2138: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 25763 at Wed May 10 11:53:15 UTC 2017 kill -USR1 25763 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25763 killed at Wed May 10 11:53:15 UTC 2017 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server fips/client normal - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Stress Test Extended Test - server fips/client normal - with ECC =============================== ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9208 starting at Wed May 10 11:53:16 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25905 >/dev/null 2>/dev/null selfserv_9208 with PID 25905 found at Wed May 10 11:53:16 UTC 2017 selfserv_9208 with PID 25905 started at Wed May 10 11:53:16 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -c 1000 -C c -V ssl3:ssl3 \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:16 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 11:53:16 UTC 2017 ssl.sh: #2139: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 25905 at Wed May 10 11:53:16 UTC 2017 kill -USR1 25905 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25905 killed at Wed May 10 11:53:16 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9208 starting at Wed May 10 11:53:16 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25976 >/dev/null 2>/dev/null selfserv_9208 with PID 25976 found at Wed May 10 11:53:16 UTC 2017 selfserv_9208 with PID 25976 started at Wed May 10 11:53:16 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -c 1000 -C c \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:17 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 11:53:17 UTC 2017 ssl.sh: #2140: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 25976 at Wed May 10 11:53:17 UTC 2017 kill -USR1 25976 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25976 killed at Wed May 10 11:53:17 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9208 starting at Wed May 10 11:53:17 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:17 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26047 >/dev/null 2>/dev/null selfserv_9208 with PID 26047 found at Wed May 10 11:53:17 UTC 2017 selfserv_9208 with PID 26047 started at Wed May 10 11:53:17 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -c 1000 -C c -g \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:17 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 11:53:18 UTC 2017 ssl.sh: #2141: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 26047 at Wed May 10 11:53:18 UTC 2017 kill -USR1 26047 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26047 killed at Wed May 10 11:53:18 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9208 starting at Wed May 10 11:53:18 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26118 >/dev/null 2>/dev/null selfserv_9208 with PID 26118 found at Wed May 10 11:53:18 UTC 2017 selfserv_9208 with PID 26118 started at Wed May 10 11:53:18 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C c -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:18 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Wed May 10 11:53:19 UTC 2017 ssl.sh: #2142: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 26118 at Wed May 10 11:53:19 UTC 2017 kill -USR1 26118 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26118 killed at Wed May 10 11:53:19 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9208 starting at Wed May 10 11:53:19 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:19 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26189 >/dev/null 2>/dev/null selfserv_9208 with PID 26189 found at Wed May 10 11:53:19 UTC 2017 selfserv_9208 with PID 26189 started at Wed May 10 11:53:19 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C c -z \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:19 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 11:53:21 UTC 2017 ssl.sh: #2143: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 26189 at Wed May 10 11:53:21 UTC 2017 kill -USR1 26189 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26189 killed at Wed May 10 11:53:21 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9208 starting at Wed May 10 11:53:21 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26260 >/dev/null 2>/dev/null selfserv_9208 with PID 26260 found at Wed May 10 11:53:21 UTC 2017 selfserv_9208 with PID 26260 started at Wed May 10 11:53:21 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:21 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Wed May 10 11:53:22 UTC 2017 ssl.sh: #2144: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 26260 at Wed May 10 11:53:22 UTC 2017 kill -USR1 26260 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26260 killed at Wed May 10 11:53:22 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9208 starting at Wed May 10 11:53:22 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26331 >/dev/null 2>/dev/null selfserv_9208 with PID 26331 found at Wed May 10 11:53:22 UTC 2017 selfserv_9208 with PID 26331 started at Wed May 10 11:53:22 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z -g \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:22 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Wed May 10 11:53:23 UTC 2017 ssl.sh: #2145: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 26331 at Wed May 10 11:53:24 UTC 2017 kill -USR1 26331 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26331 killed at Wed May 10 11:53:24 UTC 2017 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 11:53:24 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:24 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26419 >/dev/null 2>/dev/null selfserv_9208 with PID 26419 found at Wed May 10 11:53:24 UTC 2017 selfserv_9208 with PID 26419 started at Wed May 10 11:53:24 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -c 100 -C c -V ssl3:ssl3 -N -n ExtendedSSLUser \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:24 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 11:53:26 UTC 2017 ssl.sh: #2146: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 26419 at Wed May 10 11:53:26 UTC 2017 kill -USR1 26419 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26419 killed at Wed May 10 11:53:26 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 11:53:26 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:26 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26489 >/dev/null 2>/dev/null selfserv_9208 with PID 26489 found at Wed May 10 11:53:26 UTC 2017 selfserv_9208 with PID 26489 started at Wed May 10 11:53:26 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -c 100 -C c -N -n ExtendedSSLUser \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:26 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 11:53:28 UTC 2017 ssl.sh: #2147: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 26489 at Wed May 10 11:53:28 UTC 2017 kill -USR1 26489 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26489 killed at Wed May 10 11:53:28 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9208 starting at Wed May 10 11:53:28 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:28 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26559 >/dev/null 2>/dev/null selfserv_9208 with PID 26559 found at Wed May 10 11:53:28 UTC 2017 selfserv_9208 with PID 26559 started at Wed May 10 11:53:28 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:28 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Wed May 10 11:53:28 UTC 2017 ssl.sh: #2148: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 26559 at Wed May 10 11:53:28 UTC 2017 kill -USR1 26559 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26559 killed at Wed May 10 11:53:28 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9208 starting at Wed May 10 11:53:28 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:28 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26630 >/dev/null 2>/dev/null selfserv_9208 with PID 26630 found at Wed May 10 11:53:28 UTC 2017 selfserv_9208 with PID 26630 started at Wed May 10 11:53:28 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -z \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:28 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 11:53:29 UTC 2017 ssl.sh: #2149: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 26630 at Wed May 10 11:53:29 UTC 2017 kill -USR1 26630 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26630 killed at Wed May 10 11:53:29 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9208 starting at Wed May 10 11:53:29 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:29 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26701 >/dev/null 2>/dev/null selfserv_9208 with PID 26701 found at Wed May 10 11:53:29 UTC 2017 selfserv_9208 with PID 26701 started at Wed May 10 11:53:29 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -z -g \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:29 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 11:53:29 UTC 2017 ssl.sh: #2150: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 26701 at Wed May 10 11:53:29 UTC 2017 kill -USR1 26701 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26701 killed at Wed May 10 11:53:29 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9208 starting at Wed May 10 11:53:29 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:29 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26772 >/dev/null 2>/dev/null selfserv_9208 with PID 26772 found at Wed May 10 11:53:29 UTC 2017 selfserv_9208 with PID 26772 started at Wed May 10 11:53:29 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u -z \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:30 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Wed May 10 11:53:30 UTC 2017 ssl.sh: #2151: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 26772 at Wed May 10 11:53:30 UTC 2017 kill -USR1 26772 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26772 killed at Wed May 10 11:53:30 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9208 starting at Wed May 10 11:53:30 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:30 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26843 >/dev/null 2>/dev/null selfserv_9208 with PID 26843 found at Wed May 10 11:53:30 UTC 2017 selfserv_9208 with PID 26843 started at Wed May 10 11:53:30 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u -z -g \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:30 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Wed May 10 11:53:31 UTC 2017 ssl.sh: #2152: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 26843 at Wed May 10 11:53:31 UTC 2017 kill -USR1 26843 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26843 killed at Wed May 10 11:53:31 UTC 2017 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9208 starting at Wed May 10 11:53:31 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:31 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26933 >/dev/null 2>/dev/null selfserv_9208 with PID 26933 found at Wed May 10 11:53:31 UTC 2017 selfserv_9208 with PID 26933 started at Wed May 10 11:53:31 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C009 -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:31 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 11:53:35 UTC 2017 ssl.sh: #2153: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 26933 at Wed May 10 11:53:35 UTC 2017 kill -USR1 26933 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26933 killed at Wed May 10 11:53:35 UTC 2017 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9208 starting at Wed May 10 11:53:35 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:35 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27003 >/dev/null 2>/dev/null selfserv_9208 with PID 27003 found at Wed May 10 11:53:35 UTC 2017 selfserv_9208 with PID 27003 started at Wed May 10 11:53:35 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C023 -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:35 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 11:53:40 UTC 2017 ssl.sh: #2154: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 27003 at Wed May 10 11:53:40 UTC 2017 kill -USR1 27003 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27003 killed at Wed May 10 11:53:40 UTC 2017 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9208 starting at Wed May 10 11:53:40 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:40 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27073 >/dev/null 2>/dev/null selfserv_9208 with PID 27073 found at Wed May 10 11:53:40 UTC 2017 selfserv_9208 with PID 27073 started at Wed May 10 11:53:40 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C02B -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:40 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 11:53:44 UTC 2017 ssl.sh: #2155: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 27073 at Wed May 10 11:53:44 UTC 2017 kill -USR1 27073 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27073 killed at Wed May 10 11:53:44 UTC 2017 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9208 starting at Wed May 10 11:53:44 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:44 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27143 >/dev/null 2>/dev/null selfserv_9208 with PID 27143 found at Wed May 10 11:53:44 UTC 2017 selfserv_9208 with PID 27143 started at Wed May 10 11:53:44 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C004 -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:44 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 11:53:48 UTC 2017 ssl.sh: #2156: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 27143 at Wed May 10 11:53:48 UTC 2017 kill -USR1 27143 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27143 killed at Wed May 10 11:53:48 UTC 2017 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9208 starting at Wed May 10 11:53:48 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27213 >/dev/null 2>/dev/null selfserv_9208 with PID 27213 found at Wed May 10 11:53:48 UTC 2017 selfserv_9208 with PID 27213 started at Wed May 10 11:53:48 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C00E -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:48 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 11:53:49 UTC 2017 ssl.sh: #2157: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 27213 at Wed May 10 11:53:49 UTC 2017 kill -USR1 27213 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27213 killed at Wed May 10 11:53:49 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9208 starting at Wed May 10 11:53:49 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:49 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27283 >/dev/null 2>/dev/null selfserv_9208 with PID 27283 found at Wed May 10 11:53:49 UTC 2017 selfserv_9208 with PID 27283 started at Wed May 10 11:53:49 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :C013 \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:49 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 11:53:50 UTC 2017 ssl.sh: #2158: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 27283 at Wed May 10 11:53:50 UTC 2017 kill -USR1 27283 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27283 killed at Wed May 10 11:53:50 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9208 starting at Wed May 10 11:53:50 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:50 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27354 >/dev/null 2>/dev/null selfserv_9208 with PID 27354 found at Wed May 10 11:53:50 UTC 2017 selfserv_9208 with PID 27354 started at Wed May 10 11:53:50 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :C027 \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:50 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 11:53:51 UTC 2017 ssl.sh: #2159: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 27354 at Wed May 10 11:53:51 UTC 2017 kill -USR1 27354 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27354 killed at Wed May 10 11:53:51 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9208 starting at Wed May 10 11:53:51 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:51 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27425 >/dev/null 2>/dev/null selfserv_9208 with PID 27425 found at Wed May 10 11:53:51 UTC 2017 selfserv_9208 with PID 27425 started at Wed May 10 11:53:51 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :C02F \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:51 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 11:53:52 UTC 2017 ssl.sh: #2160: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 27425 at Wed May 10 11:53:52 UTC 2017 kill -USR1 27425 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27425 killed at Wed May 10 11:53:52 UTC 2017 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9208 starting at Wed May 10 11:53:52 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:52 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27496 >/dev/null 2>/dev/null selfserv_9208 with PID 27496 found at Wed May 10 11:53:52 UTC 2017 selfserv_9208 with PID 27496 started at Wed May 10 11:53:52 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :C004 -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:52 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Wed May 10 11:53:53 UTC 2017 ssl.sh: #2161: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 27496 at Wed May 10 11:53:53 UTC 2017 kill -USR1 27496 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27496 killed at Wed May 10 11:53:53 UTC 2017 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9208 starting at Wed May 10 11:53:53 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27567 >/dev/null 2>/dev/null selfserv_9208 with PID 27567 found at Wed May 10 11:53:53 UTC 2017 selfserv_9208 with PID 27567 started at Wed May 10 11:53:53 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C009 -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:53 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Wed May 10 11:53:53 UTC 2017 ssl.sh: #2162: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 27567 at Wed May 10 11:53:53 UTC 2017 kill -USR1 27567 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27567 killed at Wed May 10 11:53:53 UTC 2017 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 11:53:53 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27653 >/dev/null 2>/dev/null selfserv_9208 with PID 27653 found at Wed May 10 11:53:53 UTC 2017 selfserv_9208 with PID 27653 started at Wed May 10 11:53:53 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 10 -C :C009 -N -n ExtendedSSLUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:53 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Wed May 10 11:53:55 UTC 2017 ssl.sh: #2163: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 27653 at Wed May 10 11:53:55 UTC 2017 kill -USR1 27653 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27653 killed at Wed May 10 11:53:55 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9208 starting at Wed May 10 11:53:55 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27723 >/dev/null 2>/dev/null selfserv_9208 with PID 27723 found at Wed May 10 11:53:55 UTC 2017 selfserv_9208 with PID 27723 started at Wed May 10 11:53:55 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:55 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 11:53:55 UTC 2017 ssl.sh: #2164: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 27723 at Wed May 10 11:53:55 UTC 2017 kill -USR1 27723 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27723 killed at Wed May 10 11:53:55 UTC 2017 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 11:53:55 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27794 >/dev/null 2>/dev/null selfserv_9208 with PID 27794 found at Wed May 10 11:53:55 UTC 2017 selfserv_9208 with PID 27794 started at Wed May 10 11:53:55 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 10 -C :C004 -N -n ExtendedSSLUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:55 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Wed May 10 11:53:56 UTC 2017 ssl.sh: #2165: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 27794 at Wed May 10 11:53:56 UTC 2017 kill -USR1 27794 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27794 killed at Wed May 10 11:53:56 UTC 2017 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 11:53:56 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27864 >/dev/null 2>/dev/null selfserv_9208 with PID 27864 found at Wed May 10 11:53:56 UTC 2017 selfserv_9208 with PID 27864 started at Wed May 10 11:53:56 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:56 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Wed May 10 11:53:57 UTC 2017 ssl.sh: #2166: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 27864 at Wed May 10 11:53:57 UTC 2017 kill -USR1 27864 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27864 killed at Wed May 10 11:53:57 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9208 starting at Wed May 10 11:53:57 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27934 >/dev/null 2>/dev/null selfserv_9208 with PID 27934 found at Wed May 10 11:53:57 UTC 2017 selfserv_9208 with PID 27934 started at Wed May 10 11:53:57 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:57 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 11:53:58 UTC 2017 ssl.sh: #2167: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 27934 at Wed May 10 11:53:58 UTC 2017 kill -USR1 27934 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27934 killed at Wed May 10 11:53:58 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9208 starting at Wed May 10 11:53:58 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28005 >/dev/null 2>/dev/null selfserv_9208 with PID 28005 found at Wed May 10 11:53:58 UTC 2017 selfserv_9208 with PID 28005 started at Wed May 10 11:53:58 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:58 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Wed May 10 11:53:58 UTC 2017 ssl.sh: #2168: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 28005 at Wed May 10 11:53:58 UTC 2017 kill -USR1 28005 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28005 killed at Wed May 10 11:53:58 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9208 starting at Wed May 10 11:53:58 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:53:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28091 >/dev/null 2>/dev/null selfserv_9208 with PID 28091 found at Wed May 10 11:53:58 UTC 2017 selfserv_9208 with PID 28091 started at Wed May 10 11:53:58 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :0016 -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:53:58 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 11:54:01 UTC 2017 ssl.sh: #2169: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 28091 at Wed May 10 11:54:01 UTC 2017 kill -USR1 28091 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28091 killed at Wed May 10 11:54:01 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9208 starting at Wed May 10 11:54:01 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:54:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28161 >/dev/null 2>/dev/null selfserv_9208 with PID 28161 found at Wed May 10 11:54:01 UTC 2017 selfserv_9208 with PID 28161 started at Wed May 10 11:54:01 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :0033 \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:54:01 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 11:54:02 UTC 2017 ssl.sh: #2170: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 28161 at Wed May 10 11:54:02 UTC 2017 kill -USR1 28161 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28161 killed at Wed May 10 11:54:02 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9208 starting at Wed May 10 11:54:02 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:54:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28232 >/dev/null 2>/dev/null selfserv_9208 with PID 28232 found at Wed May 10 11:54:02 UTC 2017 selfserv_9208 with PID 28232 started at Wed May 10 11:54:02 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :0039 -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:54:02 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 11:54:04 UTC 2017 ssl.sh: #2171: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 28232 at Wed May 10 11:54:04 UTC 2017 kill -USR1 28232 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28232 killed at Wed May 10 11:54:04 UTC 2017 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9208 starting at Wed May 10 11:54:04 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:54:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28302 >/dev/null 2>/dev/null selfserv_9208 with PID 28302 found at Wed May 10 11:54:04 UTC 2017 selfserv_9208 with PID 28302 started at Wed May 10 11:54:04 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :0040 -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:54:04 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 11:54:08 UTC 2017 ssl.sh: #2172: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 28302 at Wed May 10 11:54:08 UTC 2017 kill -USR1 28302 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28302 killed at Wed May 10 11:54:08 UTC 2017 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9208 starting at Wed May 10 11:54:08 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:54:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28383 >/dev/null 2>/dev/null selfserv_9208 with PID 28383 found at Wed May 10 11:54:08 UTC 2017 selfserv_9208 with PID 28383 started at Wed May 10 11:54:08 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :0038 -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:54:08 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed May 10 11:54:42 UTC 2017 ssl.sh: #2173: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 28383 at Wed May 10 11:54:42 UTC 2017 kill -USR1 28383 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28383 killed at Wed May 10 11:54:42 UTC 2017 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9208 starting at Wed May 10 11:54:42 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:54:42 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28463 >/dev/null 2>/dev/null selfserv_9208 with PID 28463 found at Wed May 10 11:54:42 UTC 2017 selfserv_9208 with PID 28463 started at Wed May 10 11:54:42 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :006A -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:54:42 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed May 10 11:55:16 UTC 2017 ssl.sh: #2174: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 28463 at Wed May 10 11:55:16 UTC 2017 kill -USR1 28463 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28463 killed at Wed May 10 11:55:16 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9208 starting at Wed May 10 11:55:16 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:55:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28533 >/dev/null 2>/dev/null selfserv_9208 with PID 28533 found at Wed May 10 11:55:16 UTC 2017 selfserv_9208 with PID 28533 started at Wed May 10 11:55:16 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :006B -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:55:16 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 11:55:18 UTC 2017 ssl.sh: #2175: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 28533 at Wed May 10 11:55:18 UTC 2017 kill -USR1 28533 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28533 killed at Wed May 10 11:55:18 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9208 starting at Wed May 10 11:55:18 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:55:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28603 >/dev/null 2>/dev/null selfserv_9208 with PID 28603 found at Wed May 10 11:55:18 UTC 2017 selfserv_9208 with PID 28603 started at Wed May 10 11:55:18 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :009E -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:55:18 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 11:55:20 UTC 2017 ssl.sh: #2176: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 28603 at Wed May 10 11:55:20 UTC 2017 kill -USR1 28603 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28603 killed at Wed May 10 11:55:20 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) ---- selfserv_9208 starting at Wed May 10 11:55:21 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009F -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:55:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28673 >/dev/null 2>/dev/null selfserv_9208 with PID 28673 found at Wed May 10 11:55:21 UTC 2017 selfserv_9208 with PID 28673 started at Wed May 10 11:55:21 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :009F -N \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:55:21 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 11:55:23 UTC 2017 ssl.sh: #2177: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 28673 at Wed May 10 11:55:23 UTC 2017 kill -USR1 28673 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28673 killed at Wed May 10 11:55:23 UTC 2017 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 11:55:23 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:55:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28758 >/dev/null 2>/dev/null selfserv_9208 with PID 28758 found at Wed May 10 11:55:23 UTC 2017 selfserv_9208 with PID 28758 started at Wed May 10 11:55:23 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:55:23 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 11:55:29 UTC 2017 ssl.sh: #2178: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 28758 at Wed May 10 11:55:29 UTC 2017 kill -USR1 28758 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28758 killed at Wed May 10 11:55:29 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9208 starting at Wed May 10 11:55:29 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:55:29 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28828 >/dev/null 2>/dev/null selfserv_9208 with PID 28828 found at Wed May 10 11:55:29 UTC 2017 selfserv_9208 with PID 28828 started at Wed May 10 11:55:29 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:55:29 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 11:55:30 UTC 2017 ssl.sh: #2179: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 28828 at Wed May 10 11:55:30 UTC 2017 kill -USR1 28828 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28828 killed at Wed May 10 11:55:30 UTC 2017 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 11:55:30 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:55:30 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28914 >/dev/null 2>/dev/null selfserv_9208 with PID 28914 found at Wed May 10 11:55:30 UTC 2017 selfserv_9208 with PID 28914 started at Wed May 10 11:55:30 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:55:30 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed May 10 11:56:24 UTC 2017 ssl.sh: #2180: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 28914 at Wed May 10 11:56:24 UTC 2017 kill -USR1 28914 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28914 killed at Wed May 10 11:56:24 UTC 2017 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 11:56:24 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A3 -u -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:56:24 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28984 >/dev/null 2>/dev/null selfserv_9208 with PID 28984 found at Wed May 10 11:56:24 UTC 2017 selfserv_9208 with PID 28984 started at Wed May 10 11:56:24 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :00A3 -N -n ExtendedSSLUser-dsa \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 11:56:24 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed May 10 11:57:18 UTC 2017 ssl.sh: #2181: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 28984 at Wed May 10 11:57:18 UTC 2017 kill -USR1 28984 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28984 killed at Wed May 10 11:57:18 UTC 2017 ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -fips false -force FIPS mode disabled. ssl.sh: #2182: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/server -list ssl.sh: #2183: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #2184: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_server -fips false -force FIPS mode disabled. ssl.sh: #2185: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_server -list ssl.sh: #2186: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #2187: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the client modutil -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -fips true -force FIPS mode enabled. ssl.sh: #2188: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -list ssl.sh: #2189: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #2190: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_client -fips true -force FIPS mode enabled. ssl.sh: #2191: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_client -list ssl.sh: #2192: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #2193: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips - with ECC =============================== selfserv_9208 starting at Wed May 10 11:57:20 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:57:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 29176 >/dev/null 2>/dev/null selfserv_9208 with PID 29176 found at Wed May 10 11:57:20 UTC 2017 selfserv_9208 with PID 29176 started at Wed May 10 11:57:20 UTC 2017 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2194: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2195: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2196: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2197: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2198: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2199: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2200: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2201: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2202: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2203: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2204: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2205: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2206: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2207: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2208: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2209: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2210: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2211: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2212: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2213: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2214: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2215: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2216: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2217: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2218: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2219: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2220: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2221: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2222: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2223: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2224: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2225: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2226: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2227: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2228: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2229: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2230: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2231: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2232: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2233: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2234: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2235: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2236: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2237: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2238: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2239: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2240: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2241: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2242: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2243: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2244: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2245: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2246: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2247: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2248: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2249: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2250: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2251: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2252: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2253: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2254: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2255: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2256: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2257: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2258: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2259: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2260: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2261: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2262: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2263: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2264: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2265: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2266: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2267: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2268: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2269: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2270: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2271: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2272: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2273: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2274: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2275: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2276: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2277: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2278: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2279: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2280: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2281: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2282: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2283: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2284: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2285: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2286: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2287: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2288: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2289: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2290: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2291: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2292: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2293: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2294: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2295: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2296: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2297: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2298: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2299: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2300: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2301: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2302: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2303: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2304: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2305: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2306: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2307: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2308: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2309: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2310: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2311: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2312: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :CCA8 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2313: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :CCA9 -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2314: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 29176 at Wed May 10 11:57:56 UTC 2017 kill -USR1 29176 selfserv: 0 cache hits; 121 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 29176 killed at Wed May 10 11:57:56 UTC 2017 ssl.sh: SSL Client Authentication - server normal/client fips - with ECC =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:57:56 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:57:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 31444 >/dev/null 2>/dev/null selfserv_9208 with PID 31444 found at Wed May 10 11:57:56 UTC 2017 selfserv_9208 with PID 31444 started at Wed May 10 11:57:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2315: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 31444 at Wed May 10 11:57:57 UTC 2017 kill -USR1 31444 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 31444 killed at Wed May 10 11:57:57 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 11:57:57 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:57:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 31501 >/dev/null 2>/dev/null selfserv_9208 with PID 31501 found at Wed May 10 11:57:57 UTC 2017 selfserv_9208 with PID 31501 started at Wed May 10 11:57:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2316: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 31501 at Wed May 10 11:58:23 UTC 2017 kill -USR1 31501 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 31501 killed at Wed May 10 11:58:23 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 11:58:23 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:58:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 31559 >/dev/null 2>/dev/null selfserv_9208 with PID 31559 found at Wed May 10 11:58:23 UTC 2017 selfserv_9208 with PID 31559 started at Wed May 10 11:58:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2317: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 31559 at Wed May 10 11:58:24 UTC 2017 kill -USR1 31559 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 31559 killed at Wed May 10 11:58:24 UTC 2017 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:58:24 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:58:24 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 31622 >/dev/null 2>/dev/null selfserv_9208 with PID 31622 found at Wed May 10 11:58:24 UTC 2017 selfserv_9208 with PID 31622 started at Wed May 10 11:58:24 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2318: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 31622 at Wed May 10 11:58:24 UTC 2017 kill -USR1 31622 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 31622 killed at Wed May 10 11:58:24 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 11:58:24 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:58:24 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 31679 >/dev/null 2>/dev/null selfserv_9208 with PID 31679 found at Wed May 10 11:58:24 UTC 2017 selfserv_9208 with PID 31679 started at Wed May 10 11:58:24 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2319: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 31679 at Wed May 10 11:58:48 UTC 2017 kill -USR1 31679 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 31679 killed at Wed May 10 11:58:48 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 11:58:48 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:58:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 31736 >/dev/null 2>/dev/null selfserv_9208 with PID 31736 found at Wed May 10 11:58:48 UTC 2017 selfserv_9208 with PID 31736 started at Wed May 10 11:58:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2320: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 31736 at Wed May 10 11:58:48 UTC 2017 kill -USR1 31736 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 31736 killed at Wed May 10 11:58:48 UTC 2017 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:58:48 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:58:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 31799 >/dev/null 2>/dev/null selfserv_9208 with PID 31799 found at Wed May 10 11:58:48 UTC 2017 selfserv_9208 with PID 31799 started at Wed May 10 11:58:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2321: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 31799 at Wed May 10 11:58:49 UTC 2017 kill -USR1 31799 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 31799 killed at Wed May 10 11:58:49 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:58:49 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:58:49 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 31856 >/dev/null 2>/dev/null selfserv_9208 with PID 31856 found at Wed May 10 11:58:49 UTC 2017 selfserv_9208 with PID 31856 started at Wed May 10 11:58:49 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2322: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 31856 at Wed May 10 11:59:15 UTC 2017 kill -USR1 31856 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 31856 killed at Wed May 10 11:59:15 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:59:15 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:59:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 31913 >/dev/null 2>/dev/null selfserv_9208 with PID 31913 found at Wed May 10 11:59:15 UTC 2017 selfserv_9208 with PID 31913 started at Wed May 10 11:59:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2323: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 31913 at Wed May 10 11:59:16 UTC 2017 kill -USR1 31913 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 31913 killed at Wed May 10 11:59:16 UTC 2017 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:59:16 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:59:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 31976 >/dev/null 2>/dev/null selfserv_9208 with PID 31976 found at Wed May 10 11:59:16 UTC 2017 selfserv_9208 with PID 31976 started at Wed May 10 11:59:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2324: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 31976 at Wed May 10 11:59:17 UTC 2017 kill -USR1 31976 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 31976 killed at Wed May 10 11:59:17 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:59:17 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:59:17 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 32033 >/dev/null 2>/dev/null selfserv_9208 with PID 32033 found at Wed May 10 11:59:17 UTC 2017 selfserv_9208 with PID 32033 started at Wed May 10 11:59:17 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2325: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 32033 at Wed May 10 11:59:43 UTC 2017 kill -USR1 32033 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 32033 killed at Wed May 10 11:59:43 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 11:59:43 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:59:43 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 32090 >/dev/null 2>/dev/null selfserv_9208 with PID 32090 found at Wed May 10 11:59:43 UTC 2017 selfserv_9208 with PID 32090 started at Wed May 10 11:59:43 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2326: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 32090 at Wed May 10 11:59:44 UTC 2017 kill -USR1 32090 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 32090 killed at Wed May 10 11:59:44 UTC 2017 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 11:59:44 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:59:44 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 32153 >/dev/null 2>/dev/null selfserv_9208 with PID 32153 found at Wed May 10 11:59:44 UTC 2017 selfserv_9208 with PID 32153 started at Wed May 10 11:59:44 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2327: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 32153 at Wed May 10 11:59:44 UTC 2017 kill -USR1 32153 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 32153 killed at Wed May 10 11:59:44 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 11:59:45 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 11:59:45 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 32210 >/dev/null 2>/dev/null selfserv_9208 with PID 32210 found at Wed May 10 11:59:45 UTC 2017 selfserv_9208 with PID 32210 started at Wed May 10 11:59:45 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2328: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 32210 at Wed May 10 12:00:08 UTC 2017 kill -USR1 32210 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 32210 killed at Wed May 10 12:00:08 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:00:08 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:00:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 32267 >/dev/null 2>/dev/null selfserv_9208 with PID 32267 found at Wed May 10 12:00:08 UTC 2017 selfserv_9208 with PID 32267 started at Wed May 10 12:00:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2329: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 32267 at Wed May 10 12:00:09 UTC 2017 kill -USR1 32267 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 32267 killed at Wed May 10 12:00:09 UTC 2017 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:00:09 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:00:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 32343 >/dev/null 2>/dev/null selfserv_9208 with PID 32343 found at Wed May 10 12:00:09 UTC 2017 selfserv_9208 with PID 32343 started at Wed May 10 12:00:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2330: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 32343 at Wed May 10 12:00:35 UTC 2017 kill -USR1 32343 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 32343 killed at Wed May 10 12:00:35 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:00:35 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:00:35 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 32400 >/dev/null 2>/dev/null selfserv_9208 with PID 32400 found at Wed May 10 12:00:35 UTC 2017 selfserv_9208 with PID 32400 started at Wed May 10 12:00:35 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2331: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 32400 at Wed May 10 12:00:36 UTC 2017 kill -USR1 32400 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 32400 killed at Wed May 10 12:00:36 UTC 2017 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:00:36 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:00:36 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 32461 >/dev/null 2>/dev/null selfserv_9208 with PID 32461 found at Wed May 10 12:00:36 UTC 2017 selfserv_9208 with PID 32461 started at Wed May 10 12:00:36 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2332: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 32461 at Wed May 10 12:00:59 UTC 2017 kill -USR1 32461 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 32461 killed at Wed May 10 12:00:59 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:00:59 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:00:59 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 32518 >/dev/null 2>/dev/null selfserv_9208 with PID 32518 found at Wed May 10 12:00:59 UTC 2017 selfserv_9208 with PID 32518 started at Wed May 10 12:00:59 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2333: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 32518 at Wed May 10 12:01:00 UTC 2017 kill -USR1 32518 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 32518 killed at Wed May 10 12:01:00 UTC 2017 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:01:00 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:01:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 32579 >/dev/null 2>/dev/null selfserv_9208 with PID 32579 found at Wed May 10 12:01:00 UTC 2017 selfserv_9208 with PID 32579 started at Wed May 10 12:01:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2334: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 32579 at Wed May 10 12:01:26 UTC 2017 kill -USR1 32579 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 32579 killed at Wed May 10 12:01:26 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:01:26 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:01:26 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 32639 >/dev/null 2>/dev/null selfserv_9208 with PID 32639 found at Wed May 10 12:01:26 UTC 2017 selfserv_9208 with PID 32639 started at Wed May 10 12:01:26 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2335: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 32639 at Wed May 10 12:01:27 UTC 2017 kill -USR1 32639 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 32639 killed at Wed May 10 12:01:27 UTC 2017 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:01:27 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:01:27 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 32700 >/dev/null 2>/dev/null selfserv_9208 with PID 32700 found at Wed May 10 12:01:27 UTC 2017 selfserv_9208 with PID 32700 started at Wed May 10 12:01:27 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2336: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 32700 at Wed May 10 12:01:53 UTC 2017 kill -USR1 32700 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 32700 killed at Wed May 10 12:01:53 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:01:53 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:01:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 32757 >/dev/null 2>/dev/null selfserv_9208 with PID 32757 found at Wed May 10 12:01:53 UTC 2017 selfserv_9208 with PID 32757 started at Wed May 10 12:01:54 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2337: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 32757 at Wed May 10 12:01:54 UTC 2017 kill -USR1 32757 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 32757 killed at Wed May 10 12:01:54 UTC 2017 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:01:54 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:01:54 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 356 >/dev/null 2>/dev/null selfserv_9208 with PID 356 found at Wed May 10 12:01:54 UTC 2017 selfserv_9208 with PID 356 started at Wed May 10 12:01:54 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2338: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 356 at Wed May 10 12:02:18 UTC 2017 kill -USR1 356 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 356 killed at Wed May 10 12:02:18 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:02:18 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:02:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 416 >/dev/null 2>/dev/null selfserv_9208 with PID 416 found at Wed May 10 12:02:18 UTC 2017 selfserv_9208 with PID 416 started at Wed May 10 12:02:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2339: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 416 at Wed May 10 12:02:18 UTC 2017 kill -USR1 416 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 416 killed at Wed May 10 12:02:18 UTC 2017 ssl.sh: TLS Server hello response without SNI ---- selfserv_9208 starting at Wed May 10 12:02:19 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:02:19 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 497 >/dev/null 2>/dev/null selfserv_9208 with PID 497 found at Wed May 10 12:02:19 UTC 2017 selfserv_9208 with PID 497 started at Wed May 10 12:02:19 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2340: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 497 at Wed May 10 12:02:19 UTC 2017 kill -USR1 497 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 497 killed at Wed May 10 12:02:19 UTC 2017 ssl.sh: TLS Server hello response with SNI ---- selfserv_9208 starting at Wed May 10 12:02:19 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:02:19 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 571 >/dev/null 2>/dev/null selfserv_9208 with PID 571 found at Wed May 10 12:02:19 UTC 2017 selfserv_9208 with PID 571 started at Wed May 10 12:02:19 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2341: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 571 at Wed May 10 12:02:20 UTC 2017 kill -USR1 571 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 571 killed at Wed May 10 12:02:20 UTC 2017 ssl.sh: TLS Server response with alert ---- selfserv_9208 starting at Wed May 10 12:02:20 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:02:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 634 >/dev/null 2>/dev/null selfserv_9208 with PID 634 found at Wed May 10 12:02:20 UTC 2017 selfserv_9208 with PID 634 started at Wed May 10 12:02:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #2342: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 634 at Wed May 10 12:02:20 UTC 2017 kill -USR1 634 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 634 killed at Wed May 10 12:02:20 UTC 2017 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9208 starting at Wed May 10 12:02:20 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:02:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 704 >/dev/null 2>/dev/null selfserv_9208 with PID 704 found at Wed May 10 12:02:20 UTC 2017 selfserv_9208 with PID 704 started at Wed May 10 12:02:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n TestUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2343: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 704 at Wed May 10 12:02:21 UTC 2017 kill -USR1 704 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 704 killed at Wed May 10 12:02:21 UTC 2017 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9208 starting at Wed May 10 12:02:21 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:02:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 815 >/dev/null 2>/dev/null selfserv_9208 with PID 815 found at Wed May 10 12:02:21 UTC 2017 selfserv_9208 with PID 815 started at Wed May 10 12:02:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #2344: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 815 at Wed May 10 12:02:21 UTC 2017 kill -USR1 815 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 815 killed at Wed May 10 12:02:21 UTC 2017 ssl.sh: TLS Server hello response without SNI ---- selfserv_9208 starting at Wed May 10 12:02:21 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:02:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 881 >/dev/null 2>/dev/null selfserv_9208 with PID 881 found at Wed May 10 12:02:21 UTC 2017 selfserv_9208 with PID 881 started at Wed May 10 12:02:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2345: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 881 at Wed May 10 12:02:22 UTC 2017 kill -USR1 881 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 881 killed at Wed May 10 12:02:22 UTC 2017 ssl.sh: TLS Server hello response with SNI ---- selfserv_9208 starting at Wed May 10 12:02:22 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:02:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 944 >/dev/null 2>/dev/null selfserv_9208 with PID 944 found at Wed May 10 12:02:22 UTC 2017 selfserv_9208 with PID 944 started at Wed May 10 12:02:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2346: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 944 at Wed May 10 12:02:22 UTC 2017 kill -USR1 944 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 944 killed at Wed May 10 12:02:22 UTC 2017 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9208 starting at Wed May 10 12:02:23 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:02:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1007 >/dev/null 2>/dev/null selfserv_9208 with PID 1007 found at Wed May 10 12:02:23 UTC 2017 selfserv_9208 with PID 1007 started at Wed May 10 12:02:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #2347: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 1007 at Wed May 10 12:02:23 UTC 2017 kill -USR1 1007 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1007 killed at Wed May 10 12:02:23 UTC 2017 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9208 starting at Wed May 10 12:02:23 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:02:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1070 >/dev/null 2>/dev/null selfserv_9208 with PID 1070 found at Wed May 10 12:02:23 UTC 2017 selfserv_9208 with PID 1070 started at Wed May 10 12:02:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #2348: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 1070 at Wed May 10 12:02:23 UTC 2017 kill -USR1 1070 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1070 killed at Wed May 10 12:02:23 UTC 2017 ssl.sh: TLS Server response with alert ---- selfserv_9208 starting at Wed May 10 12:02:23 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:02:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1133 >/dev/null 2>/dev/null selfserv_9208 with PID 1133 found at Wed May 10 12:02:23 UTC 2017 selfserv_9208 with PID 1133 started at Wed May 10 12:02:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #2349: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 1133 at Wed May 10 12:02:24 UTC 2017 kill -USR1 1133 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1133 killed at Wed May 10 12:02:24 UTC 2017 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client fips - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status (non-FIPS only) ssl.sh: skipping OCSP stapling, signed response, revoked status (non-FIPS only) ssl.sh: skipping OCSP stapling, signed response, unknown status (non-FIPS only) ssl.sh: skipping OCSP stapling, unsigned failure response (non-FIPS only) ssl.sh: skipping OCSP stapling, good status, bad signature (non-FIPS only) ssl.sh: skipping OCSP stapling, invalid cert status data (non-FIPS only) ssl.sh: skipping Valid cert, Server doesn't staple (non-FIPS only) ssl.sh: skipping Stress OCSP stapling, server uses random status (non-FIPS only) ssl.sh: SSL Stress Test - server normal/client fips - with ECC =============================== ssl.sh: skipping Form is subject to the terms of the Mozilla Public (non-FIPS only) ssl.sh: skipping If a copy of the MPL was not distributed with this (non-FIPS only) ssl.sh: skipping obtain one at http://mozilla.org/MPL/2.0/. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping the stress tests for SSL/TLS. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping client Test Case name (non-FIPS only) ssl.sh: skipping params (non-FIPS only) ssl.sh: skipping ------ --------------- (non-FIPS only) ssl.sh: skipping Stress SSL3 RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 12:02:24 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:02:24 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1232 >/dev/null 2>/dev/null selfserv_9208 with PID 1232 found at Wed May 10 12:02:24 UTC 2017 selfserv_9208 with PID 1232 started at Wed May 10 12:02:24 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -c 100 -C c -V ssl3:ssl3 -N -n TestUser \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:02:24 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 12:02:26 UTC 2017 ssl.sh: #2350: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 1232 at Wed May 10 12:02:26 UTC 2017 kill -USR1 1232 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1232 killed at Wed May 10 12:02:26 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 12:02:26 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:02:26 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1302 >/dev/null 2>/dev/null selfserv_9208 with PID 1302 found at Wed May 10 12:02:26 UTC 2017 selfserv_9208 with PID 1302 started at Wed May 10 12:02:26 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -c 100 -C c -N -n TestUser \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:02:26 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 12:02:28 UTC 2017 ssl.sh: #2351: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 1302 at Wed May 10 12:02:28 UTC 2017 kill -USR1 1302 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1302 killed at Wed May 10 12:02:28 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9208 starting at Wed May 10 12:02:28 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:02:28 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1374 >/dev/null 2>/dev/null selfserv_9208 with PID 1374 found at Wed May 10 12:02:28 UTC 2017 selfserv_9208 with PID 1374 started at Wed May 10 12:02:28 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:02:28 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Wed May 10 12:02:28 UTC 2017 ssl.sh: #2352: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 1374 at Wed May 10 12:02:28 UTC 2017 kill -USR1 1374 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1374 killed at Wed May 10 12:02:28 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9208 starting at Wed May 10 12:02:28 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:02:28 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1445 >/dev/null 2>/dev/null selfserv_9208 with PID 1445 found at Wed May 10 12:02:28 UTC 2017 selfserv_9208 with PID 1445 started at Wed May 10 12:02:28 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:02:28 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 12:02:29 UTC 2017 ssl.sh: #2353: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 1445 at Wed May 10 12:02:29 UTC 2017 kill -USR1 1445 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1445 killed at Wed May 10 12:02:29 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9208 starting at Wed May 10 12:02:29 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:02:29 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1516 >/dev/null 2>/dev/null selfserv_9208 with PID 1516 found at Wed May 10 12:02:29 UTC 2017 selfserv_9208 with PID 1516 started at Wed May 10 12:02:29 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z -g \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:02:29 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 12:02:30 UTC 2017 ssl.sh: #2354: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 1516 at Wed May 10 12:02:30 UTC 2017 kill -USR1 1516 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1516 killed at Wed May 10 12:02:30 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9208 starting at Wed May 10 12:02:30 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:02:30 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1589 >/dev/null 2>/dev/null selfserv_9208 with PID 1589 found at Wed May 10 12:02:30 UTC 2017 selfserv_9208 with PID 1589 started at Wed May 10 12:02:30 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:02:30 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Wed May 10 12:02:30 UTC 2017 ssl.sh: #2355: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 1589 at Wed May 10 12:02:30 UTC 2017 kill -USR1 1589 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1589 killed at Wed May 10 12:02:30 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9208 starting at Wed May 10 12:02:30 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:02:30 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1660 >/dev/null 2>/dev/null selfserv_9208 with PID 1660 found at Wed May 10 12:02:30 UTC 2017 selfserv_9208 with PID 1660 started at Wed May 10 12:02:30 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z -g \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:02:30 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Wed May 10 12:02:31 UTC 2017 ssl.sh: #2356: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 1660 at Wed May 10 12:02:31 UTC 2017 kill -USR1 1660 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1660 killed at Wed May 10 12:02:31 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9208 starting at Wed May 10 12:02:31 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:02:31 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1739 >/dev/null 2>/dev/null selfserv_9208 with PID 1739 found at Wed May 10 12:02:31 UTC 2017 selfserv_9208 with PID 1739 started at Wed May 10 12:02:31 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V tls1.0:tls1.2 -c 1000 -C c -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:02:31 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Wed May 10 12:02:32 UTC 2017 ssl.sh: #2357: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 1739 at Wed May 10 12:02:32 UTC 2017 kill -USR1 1739 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1739 killed at Wed May 10 12:02:32 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9208 starting at Wed May 10 12:02:32 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:02:32 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1816 >/dev/null 2>/dev/null selfserv_9208 with PID 1816 found at Wed May 10 12:02:32 UTC 2017 selfserv_9208 with PID 1816 started at Wed May 10 12:02:32 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V tls1.0:tls1.2 -c 1000 -C c -u -a localhost-sni.localdomain \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:02:32 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Wed May 10 12:02:34 UTC 2017 ssl.sh: #2358: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 1816 at Wed May 10 12:02:34 UTC 2017 kill -USR1 1816 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1816 killed at Wed May 10 12:02:34 UTC 2017 ssl.sh: skipping (non-FIPS only) ssl.sh: skipping ############################ (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA256 (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 GCM (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 12:02:34 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:02:34 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1919 >/dev/null 2>/dev/null selfserv_9208 with PID 1919 found at Wed May 10 12:02:34 UTC 2017 selfserv_9208 with PID 1919 started at Wed May 10 12:02:34 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 10 -C :C009 -N -n TestUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:02:34 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Wed May 10 12:02:35 UTC 2017 ssl.sh: #2359: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 1919 at Wed May 10 12:02:35 UTC 2017 kill -USR1 1919 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1919 killed at Wed May 10 12:02:35 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9208 starting at Wed May 10 12:02:35 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:02:35 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1989 >/dev/null 2>/dev/null selfserv_9208 with PID 1989 found at Wed May 10 12:02:35 UTC 2017 selfserv_9208 with PID 1989 started at Wed May 10 12:02:35 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:02:35 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 12:02:36 UTC 2017 ssl.sh: #2360: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 1989 at Wed May 10 12:02:36 UTC 2017 kill -USR1 1989 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1989 killed at Wed May 10 12:02:36 UTC 2017 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 12:02:36 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:02:36 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 2060 >/dev/null 2>/dev/null selfserv_9208 with PID 2060 found at Wed May 10 12:02:36 UTC 2017 selfserv_9208 with PID 2060 started at Wed May 10 12:02:36 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 10 -C :C004 -N -n TestUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:02:36 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Wed May 10 12:02:37 UTC 2017 ssl.sh: #2361: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 2060 at Wed May 10 12:02:37 UTC 2017 kill -USR1 2060 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 2060 killed at Wed May 10 12:02:37 UTC 2017 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 12:02:37 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:02:37 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 2130 >/dev/null 2>/dev/null selfserv_9208 with PID 2130 found at Wed May 10 12:02:37 UTC 2017 selfserv_9208 with PID 2130 started at Wed May 10 12:02:37 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 10 -C :C00E -N -n TestUser-ecmixed \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:02:37 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Wed May 10 12:02:38 UTC 2017 ssl.sh: #2362: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 2130 at Wed May 10 12:02:38 UTC 2017 kill -USR1 2130 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 2130 killed at Wed May 10 12:02:38 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9208 starting at Wed May 10 12:02:38 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:02:38 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 2200 >/dev/null 2>/dev/null selfserv_9208 with PID 2200 found at Wed May 10 12:02:38 UTC 2017 selfserv_9208 with PID 2200 started at Wed May 10 12:02:38 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:02:38 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 12:02:38 UTC 2017 ssl.sh: #2363: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 2200 at Wed May 10 12:02:38 UTC 2017 kill -USR1 2200 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 2200 killed at Wed May 10 12:02:38 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9208 starting at Wed May 10 12:02:38 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:02:38 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 2271 >/dev/null 2>/dev/null selfserv_9208 with PID 2271 found at Wed May 10 12:02:38 UTC 2017 selfserv_9208 with PID 2271 started at Wed May 10 12:02:38 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:02:39 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Wed May 10 12:02:39 UTC 2017 ssl.sh: #2364: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 2271 at Wed May 10 12:02:39 UTC 2017 kill -USR1 2271 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 2271 killed at Wed May 10 12:02:39 UTC 2017 ssl.sh: skipping (non-FIPS only) ssl.sh: skipping ############################ (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping -V_ssl3:tls1.2_-c_1000_-C_:0038_-u Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (session ticket) (non-FIPS only) ssl.sh: skipping session ticket test, once session tickets with DHE_DSS are working (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping -V_ssl3:tls1.2_-c_1000_-C_:006A Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (non-FIPS only) ssl.sh: skipping reuse test, once the session cache with DHE_DSS is working (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 12:02:39 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:02:39 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 2380 >/dev/null 2>/dev/null selfserv_9208 with PID 2380 found at Wed May 10 12:02:39 UTC 2017 selfserv_9208 with PID 2380 started at Wed May 10 12:02:39 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :0032 -N -n TestUser-dsa \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:02:39 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 12:02:43 UTC 2017 ssl.sh: #2365: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 2380 at Wed May 10 12:02:43 UTC 2017 kill -USR1 2380 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 2380 killed at Wed May 10 12:02:43 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9208 starting at Wed May 10 12:02:43 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:02:44 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 2450 >/dev/null 2>/dev/null selfserv_9208 with PID 2450 found at Wed May 10 12:02:44 UTC 2017 selfserv_9208 with PID 2450 started at Wed May 10 12:02:44 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :0067 -n TestUser-dsamixed \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:02:44 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 12:02:45 UTC 2017 ssl.sh: #2366: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 2450 at Wed May 10 12:02:45 UTC 2017 kill -USR1 2450 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 2450 killed at Wed May 10 12:02:45 UTC 2017 ssl.sh: skipping session ticket test, once session tickets with DHE_DSS are working (non-FIPS only) ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 12:02:45 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:02:45 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 2533 >/dev/null 2>/dev/null selfserv_9208 with PID 2533 found at Wed May 10 12:02:45 UTC 2017 selfserv_9208 with PID 2533 started at Wed May 10 12:02:45 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :00A2 -N -n TestUser-dsa \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:02:45 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed May 10 12:03:21 UTC 2017 ssl.sh: #2367: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 2533 at Wed May 10 12:03:21 UTC 2017 kill -USR1 2533 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 2533 killed at Wed May 10 12:03:21 UTC 2017 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 12:03:21 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A3 -u -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:03:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 2604 >/dev/null 2>/dev/null selfserv_9208 with PID 2604 found at Wed May 10 12:03:21 UTC 2017 selfserv_9208 with PID 2604 started at Wed May 10 12:03:21 UTC 2017 strsclnt -q -p 9208 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :00A3 -N -n TestUser-dsa \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:03:21 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed May 10 12:03:58 UTC 2017 ssl.sh: #2368: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 2604 at Wed May 10 12:03:58 UTC 2017 kill -USR1 2604 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 2604 killed at Wed May 10 12:03:58 UTC 2017 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips - with ECC =============================== selfserv_9208 starting at Wed May 10 12:03:58 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:03:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 2666 >/dev/null 2>/dev/null selfserv_9208 with PID 2666 found at Wed May 10 12:03:58 UTC 2017 selfserv_9208 with PID 2666 started at Wed May 10 12:03:58 UTC 2017 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2369: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2370: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2371: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2372: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2373: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2374: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2375: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2376: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2377: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2378: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2379: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2380: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2381: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2382: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2383: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2384: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2385: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2386: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2387: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2388: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2389: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2390: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2391: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2392: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2393: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2394: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2395: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2396: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2397: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2398: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2399: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2400: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2401: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2402: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2403: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2404: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2405: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2406: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2407: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2408: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2409: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2410: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2411: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2412: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2413: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2414: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2415: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2416: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2417: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2418: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2419: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2420: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2421: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2422: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2423: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2424: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2425: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2426: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2427: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2428: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2429: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2430: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2431: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2432: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2433: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2434: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2435: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2436: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2437: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2438: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2439: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2440: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2441: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2442: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2443: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2444: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2445: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2446: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2447: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2448: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2449: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2450: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2451: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2452: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2453: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2454: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2455: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2456: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2457: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2458: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2459: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2460: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2461: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2462: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2463: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2464: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2465: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2466: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2467: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2468: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2469: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2470: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2471: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2472: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2473: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2474: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2475: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2476: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2477: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2478: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2479: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2480: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2481: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2482: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2483: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2484: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2485: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2486: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2487: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :CCA8 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2488: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9208 -h localhost.localdomain -c :CCA9 -V ssl3:tls1.2 \ -f -d ../ext_client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2489: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 2666 at Wed May 10 12:04:34 UTC 2017 kill -USR1 2666 selfserv: 0 cache hits; 121 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 2666 killed at Wed May 10 12:04:34 UTC 2017 ssl.sh: SSL Client Authentication Extended Test - server normal/client fips - with ECC =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:04:35 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:04:35 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 4935 >/dev/null 2>/dev/null selfserv_9208 with PID 4935 found at Wed May 10 12:04:35 UTC 2017 selfserv_9208 with PID 4935 started at Wed May 10 12:04:35 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2490: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 4935 at Wed May 10 12:04:35 UTC 2017 kill -USR1 4935 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 4935 killed at Wed May 10 12:04:35 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:04:35 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:04:35 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 4992 >/dev/null 2>/dev/null selfserv_9208 with PID 4992 found at Wed May 10 12:04:35 UTC 2017 selfserv_9208 with PID 4992 started at Wed May 10 12:04:35 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2491: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 4992 at Wed May 10 12:05:03 UTC 2017 kill -USR1 4992 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 4992 killed at Wed May 10 12:05:03 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:05:03 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:05:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5049 >/dev/null 2>/dev/null selfserv_9208 with PID 5049 found at Wed May 10 12:05:03 UTC 2017 selfserv_9208 with PID 5049 started at Wed May 10 12:05:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2492: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 5049 at Wed May 10 12:05:03 UTC 2017 kill -USR1 5049 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5049 killed at Wed May 10 12:05:03 UTC 2017 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:05:03 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:05:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5112 >/dev/null 2>/dev/null selfserv_9208 with PID 5112 found at Wed May 10 12:05:03 UTC 2017 selfserv_9208 with PID 5112 started at Wed May 10 12:05:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2493: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 5112 at Wed May 10 12:05:04 UTC 2017 kill -USR1 5112 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5112 killed at Wed May 10 12:05:04 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:05:04 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:05:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5169 >/dev/null 2>/dev/null selfserv_9208 with PID 5169 found at Wed May 10 12:05:04 UTC 2017 selfserv_9208 with PID 5169 started at Wed May 10 12:05:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2494: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 5169 at Wed May 10 12:05:27 UTC 2017 kill -USR1 5169 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5169 killed at Wed May 10 12:05:27 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:05:27 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:05:27 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5226 >/dev/null 2>/dev/null selfserv_9208 with PID 5226 found at Wed May 10 12:05:27 UTC 2017 selfserv_9208 with PID 5226 started at Wed May 10 12:05:27 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2495: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 5226 at Wed May 10 12:05:28 UTC 2017 kill -USR1 5226 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5226 killed at Wed May 10 12:05:28 UTC 2017 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:05:28 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:05:28 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5289 >/dev/null 2>/dev/null selfserv_9208 with PID 5289 found at Wed May 10 12:05:28 UTC 2017 selfserv_9208 with PID 5289 started at Wed May 10 12:05:28 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2496: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 5289 at Wed May 10 12:05:29 UTC 2017 kill -USR1 5289 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5289 killed at Wed May 10 12:05:29 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:05:29 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:05:29 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5346 >/dev/null 2>/dev/null selfserv_9208 with PID 5346 found at Wed May 10 12:05:29 UTC 2017 selfserv_9208 with PID 5346 started at Wed May 10 12:05:29 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2497: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 5346 at Wed May 10 12:05:56 UTC 2017 kill -USR1 5346 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5346 killed at Wed May 10 12:05:56 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:05:56 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:05:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5403 >/dev/null 2>/dev/null selfserv_9208 with PID 5403 found at Wed May 10 12:05:56 UTC 2017 selfserv_9208 with PID 5403 started at Wed May 10 12:05:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2498: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 5403 at Wed May 10 12:05:57 UTC 2017 kill -USR1 5403 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5403 killed at Wed May 10 12:05:57 UTC 2017 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:05:57 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:05:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5466 >/dev/null 2>/dev/null selfserv_9208 with PID 5466 found at Wed May 10 12:05:57 UTC 2017 selfserv_9208 with PID 5466 started at Wed May 10 12:05:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2499: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 5466 at Wed May 10 12:05:57 UTC 2017 kill -USR1 5466 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5466 killed at Wed May 10 12:05:57 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:05:58 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:05:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5523 >/dev/null 2>/dev/null selfserv_9208 with PID 5523 found at Wed May 10 12:05:58 UTC 2017 selfserv_9208 with PID 5523 started at Wed May 10 12:05:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2500: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 5523 at Wed May 10 12:06:25 UTC 2017 kill -USR1 5523 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5523 killed at Wed May 10 12:06:25 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:06:25 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:06:25 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5580 >/dev/null 2>/dev/null selfserv_9208 with PID 5580 found at Wed May 10 12:06:25 UTC 2017 selfserv_9208 with PID 5580 started at Wed May 10 12:06:25 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2501: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 5580 at Wed May 10 12:06:26 UTC 2017 kill -USR1 5580 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5580 killed at Wed May 10 12:06:26 UTC 2017 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:06:26 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:06:26 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5643 >/dev/null 2>/dev/null selfserv_9208 with PID 5643 found at Wed May 10 12:06:26 UTC 2017 selfserv_9208 with PID 5643 started at Wed May 10 12:06:26 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2502: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 5643 at Wed May 10 12:06:26 UTC 2017 kill -USR1 5643 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5643 killed at Wed May 10 12:06:26 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:06:26 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:06:26 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5700 >/dev/null 2>/dev/null selfserv_9208 with PID 5700 found at Wed May 10 12:06:26 UTC 2017 selfserv_9208 with PID 5700 started at Wed May 10 12:06:26 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2503: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 5700 at Wed May 10 12:06:50 UTC 2017 kill -USR1 5700 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5700 killed at Wed May 10 12:06:50 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:06:50 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:06:50 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5757 >/dev/null 2>/dev/null selfserv_9208 with PID 5757 found at Wed May 10 12:06:50 UTC 2017 selfserv_9208 with PID 5757 started at Wed May 10 12:06:50 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2504: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 5757 at Wed May 10 12:06:50 UTC 2017 kill -USR1 5757 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5757 killed at Wed May 10 12:06:50 UTC 2017 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:06:50 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:06:50 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5834 >/dev/null 2>/dev/null selfserv_9208 with PID 5834 found at Wed May 10 12:06:50 UTC 2017 selfserv_9208 with PID 5834 started at Wed May 10 12:06:50 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2505: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 5834 at Wed May 10 12:07:18 UTC 2017 kill -USR1 5834 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5834 killed at Wed May 10 12:07:18 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:07:18 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:07:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5892 >/dev/null 2>/dev/null selfserv_9208 with PID 5892 found at Wed May 10 12:07:18 UTC 2017 selfserv_9208 with PID 5892 started at Wed May 10 12:07:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2506: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 5892 at Wed May 10 12:07:18 UTC 2017 kill -USR1 5892 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5892 killed at Wed May 10 12:07:18 UTC 2017 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:07:19 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:07:19 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5953 >/dev/null 2>/dev/null selfserv_9208 with PID 5953 found at Wed May 10 12:07:19 UTC 2017 selfserv_9208 with PID 5953 started at Wed May 10 12:07:19 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. ssl.sh: #2507: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 5953 at Wed May 10 12:07:42 UTC 2017 kill -USR1 5953 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5953 killed at Wed May 10 12:07:42 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:07:42 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:07:42 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6010 >/dev/null 2>/dev/null selfserv_9208 with PID 6010 found at Wed May 10 12:07:42 UTC 2017 selfserv_9208 with PID 6010 started at Wed May 10 12:07:42 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2508: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 6010 at Wed May 10 12:07:43 UTC 2017 kill -USR1 6010 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6010 killed at Wed May 10 12:07:43 UTC 2017 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:07:43 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:07:43 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6071 >/dev/null 2>/dev/null selfserv_9208 with PID 6071 found at Wed May 10 12:07:43 UTC 2017 selfserv_9208 with PID 6071 started at Wed May 10 12:07:43 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2509: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 6071 at Wed May 10 12:08:10 UTC 2017 kill -USR1 6071 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6071 killed at Wed May 10 12:08:10 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:08:10 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:08:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6129 >/dev/null 2>/dev/null selfserv_9208 with PID 6129 found at Wed May 10 12:08:10 UTC 2017 selfserv_9208 with PID 6129 started at Wed May 10 12:08:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2510: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 6129 at Wed May 10 12:08:11 UTC 2017 kill -USR1 6129 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6129 killed at Wed May 10 12:08:11 UTC 2017 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:08:11 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:08:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6190 >/dev/null 2>/dev/null selfserv_9208 with PID 6190 found at Wed May 10 12:08:11 UTC 2017 selfserv_9208 with PID 6190 started at Wed May 10 12:08:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2511: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 6190 at Wed May 10 12:08:38 UTC 2017 kill -USR1 6190 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6190 killed at Wed May 10 12:08:38 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:08:38 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:08:38 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6247 >/dev/null 2>/dev/null selfserv_9208 with PID 6247 found at Wed May 10 12:08:38 UTC 2017 selfserv_9208 with PID 6247 started at Wed May 10 12:08:38 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2512: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 6247 at Wed May 10 12:08:39 UTC 2017 kill -USR1 6247 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6247 killed at Wed May 10 12:08:39 UTC 2017 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:08:39 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:08:39 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6308 >/dev/null 2>/dev/null selfserv_9208 with PID 6308 found at Wed May 10 12:08:39 UTC 2017 selfserv_9208 with PID 6308 started at Wed May 10 12:08:39 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2513: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 6308 at Wed May 10 12:09:02 UTC 2017 kill -USR1 6308 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6308 killed at Wed May 10 12:09:02 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:09:02 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:09:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6365 >/dev/null 2>/dev/null selfserv_9208 with PID 6365 found at Wed May 10 12:09:03 UTC 2017 selfserv_9208 with PID 6365 started at Wed May 10 12:09:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2514: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 6365 at Wed May 10 12:09:03 UTC 2017 kill -USR1 6365 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6365 killed at Wed May 10 12:09:03 UTC 2017 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client fips - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Stress Test Extended Test - server normal/client fips - with ECC =============================== ssl.sh: skipping Form is subject to the terms of the Mozilla Public (non-FIPS only) ssl.sh: skipping If a copy of the MPL was not distributed with this (non-FIPS only) ssl.sh: skipping obtain one at http://mozilla.org/MPL/2.0/. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping the stress tests for SSL/TLS. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping client Test Case name (non-FIPS only) ssl.sh: skipping params (non-FIPS only) ssl.sh: skipping ------ --------------- (non-FIPS only) ssl.sh: skipping Stress SSL3 RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 12:09:03 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:09:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6499 >/dev/null 2>/dev/null selfserv_9208 with PID 6499 found at Wed May 10 12:09:03 UTC 2017 selfserv_9208 with PID 6499 started at Wed May 10 12:09:03 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -c 100 -C c -V ssl3:ssl3 -N -n ExtendedSSLUser \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:09:03 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 12:09:05 UTC 2017 ssl.sh: #2515: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 6499 at Wed May 10 12:09:05 UTC 2017 kill -USR1 6499 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6499 killed at Wed May 10 12:09:05 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 12:09:05 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:09:05 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6569 >/dev/null 2>/dev/null selfserv_9208 with PID 6569 found at Wed May 10 12:09:05 UTC 2017 selfserv_9208 with PID 6569 started at Wed May 10 12:09:05 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -c 100 -C c -N -n ExtendedSSLUser \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:09:05 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 12:09:07 UTC 2017 ssl.sh: #2516: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 6569 at Wed May 10 12:09:07 UTC 2017 kill -USR1 6569 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6569 killed at Wed May 10 12:09:07 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9208 starting at Wed May 10 12:09:07 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:09:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6639 >/dev/null 2>/dev/null selfserv_9208 with PID 6639 found at Wed May 10 12:09:07 UTC 2017 selfserv_9208 with PID 6639 started at Wed May 10 12:09:08 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:09:08 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Wed May 10 12:09:08 UTC 2017 ssl.sh: #2517: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 6639 at Wed May 10 12:09:08 UTC 2017 kill -USR1 6639 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6639 killed at Wed May 10 12:09:08 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9208 starting at Wed May 10 12:09:08 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:09:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6710 >/dev/null 2>/dev/null selfserv_9208 with PID 6710 found at Wed May 10 12:09:08 UTC 2017 selfserv_9208 with PID 6710 started at Wed May 10 12:09:08 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -z \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:09:08 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 12:09:09 UTC 2017 ssl.sh: #2518: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 6710 at Wed May 10 12:09:09 UTC 2017 kill -USR1 6710 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6710 killed at Wed May 10 12:09:09 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9208 starting at Wed May 10 12:09:09 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:09:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6781 >/dev/null 2>/dev/null selfserv_9208 with PID 6781 found at Wed May 10 12:09:09 UTC 2017 selfserv_9208 with PID 6781 started at Wed May 10 12:09:09 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -z -g \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:09:09 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 12:09:09 UTC 2017 ssl.sh: #2519: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 6781 at Wed May 10 12:09:09 UTC 2017 kill -USR1 6781 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6781 killed at Wed May 10 12:09:09 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9208 starting at Wed May 10 12:09:09 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:09:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6858 >/dev/null 2>/dev/null selfserv_9208 with PID 6858 found at Wed May 10 12:09:09 UTC 2017 selfserv_9208 with PID 6858 started at Wed May 10 12:09:09 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u -z \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:09:09 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Wed May 10 12:09:10 UTC 2017 ssl.sh: #2520: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 6858 at Wed May 10 12:09:10 UTC 2017 kill -USR1 6858 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6858 killed at Wed May 10 12:09:10 UTC 2017 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9208 starting at Wed May 10 12:09:10 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:09:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6931 >/dev/null 2>/dev/null selfserv_9208 with PID 6931 found at Wed May 10 12:09:10 UTC 2017 selfserv_9208 with PID 6931 started at Wed May 10 12:09:10 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u -z -g \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:09:10 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Wed May 10 12:09:11 UTC 2017 ssl.sh: #2521: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 6931 at Wed May 10 12:09:11 UTC 2017 kill -USR1 6931 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6931 killed at Wed May 10 12:09:11 UTC 2017 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: skipping (non-FIPS only) ssl.sh: skipping ############################ (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA256 (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 GCM (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 12:09:11 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:09:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7042 >/dev/null 2>/dev/null selfserv_9208 with PID 7042 found at Wed May 10 12:09:11 UTC 2017 selfserv_9208 with PID 7042 started at Wed May 10 12:09:11 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 10 -C :C009 -N -n ExtendedSSLUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:09:11 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Wed May 10 12:09:12 UTC 2017 ssl.sh: #2522: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 7042 at Wed May 10 12:09:12 UTC 2017 kill -USR1 7042 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7042 killed at Wed May 10 12:09:12 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9208 starting at Wed May 10 12:09:12 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:09:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7112 >/dev/null 2>/dev/null selfserv_9208 with PID 7112 found at Wed May 10 12:09:12 UTC 2017 selfserv_9208 with PID 7112 started at Wed May 10 12:09:12 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:09:12 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 12:09:13 UTC 2017 ssl.sh: #2523: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 7112 at Wed May 10 12:09:13 UTC 2017 kill -USR1 7112 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7112 killed at Wed May 10 12:09:13 UTC 2017 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 12:09:13 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:09:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7183 >/dev/null 2>/dev/null selfserv_9208 with PID 7183 found at Wed May 10 12:09:13 UTC 2017 selfserv_9208 with PID 7183 started at Wed May 10 12:09:13 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 10 -C :C004 -N -n ExtendedSSLUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:09:13 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Wed May 10 12:09:14 UTC 2017 ssl.sh: #2524: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 7183 at Wed May 10 12:09:14 UTC 2017 kill -USR1 7183 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7183 killed at Wed May 10 12:09:14 UTC 2017 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 12:09:14 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:09:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7253 >/dev/null 2>/dev/null selfserv_9208 with PID 7253 found at Wed May 10 12:09:14 UTC 2017 selfserv_9208 with PID 7253 started at Wed May 10 12:09:14 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:09:14 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Wed May 10 12:09:15 UTC 2017 ssl.sh: #2525: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 7253 at Wed May 10 12:09:15 UTC 2017 kill -USR1 7253 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7253 killed at Wed May 10 12:09:15 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9208 starting at Wed May 10 12:09:15 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:09:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7323 >/dev/null 2>/dev/null selfserv_9208 with PID 7323 found at Wed May 10 12:09:15 UTC 2017 selfserv_9208 with PID 7323 started at Wed May 10 12:09:15 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:09:15 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 12:09:15 UTC 2017 ssl.sh: #2526: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 7323 at Wed May 10 12:09:15 UTC 2017 kill -USR1 7323 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7323 killed at Wed May 10 12:09:15 UTC 2017 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9208 starting at Wed May 10 12:09:15 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:09:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7394 >/dev/null 2>/dev/null selfserv_9208 with PID 7394 found at Wed May 10 12:09:15 UTC 2017 selfserv_9208 with PID 7394 started at Wed May 10 12:09:15 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec -u \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:09:15 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Wed May 10 12:09:16 UTC 2017 ssl.sh: #2527: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 7394 at Wed May 10 12:09:16 UTC 2017 kill -USR1 7394 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7394 killed at Wed May 10 12:09:16 UTC 2017 ssl.sh: skipping (non-FIPS only) ssl.sh: skipping ############################ (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping -V_ssl3:tls1.2_-c_1000_-C_:0038_-u Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (session ticket) (non-FIPS only) ssl.sh: skipping session ticket test, once session tickets with DHE_DSS are working (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping -V_ssl3:tls1.2_-c_1000_-C_:006A Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (non-FIPS only) ssl.sh: skipping reuse test, once the session cache with DHE_DSS is working (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 12:09:16 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:09:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7503 >/dev/null 2>/dev/null selfserv_9208 with PID 7503 found at Wed May 10 12:09:16 UTC 2017 selfserv_9208 with PID 7503 started at Wed May 10 12:09:16 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:09:16 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Wed May 10 12:09:22 UTC 2017 ssl.sh: #2528: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 7503 at Wed May 10 12:09:22 UTC 2017 kill -USR1 7503 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7503 killed at Wed May 10 12:09:22 UTC 2017 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9208 starting at Wed May 10 12:09:22 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:09:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7573 >/dev/null 2>/dev/null selfserv_9208 with PID 7573 found at Wed May 10 12:09:22 UTC 2017 selfserv_9208 with PID 7573 started at Wed May 10 12:09:22 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:09:22 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Wed May 10 12:09:23 UTC 2017 ssl.sh: #2529: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 7573 at Wed May 10 12:09:23 UTC 2017 kill -USR1 7573 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7573 killed at Wed May 10 12:09:23 UTC 2017 ssl.sh: skipping session ticket test, once session tickets with DHE_DSS are working (non-FIPS only) ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 12:09:23 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:09:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7656 >/dev/null 2>/dev/null selfserv_9208 with PID 7656 found at Wed May 10 12:09:24 UTC 2017 selfserv_9208 with PID 7656 started at Wed May 10 12:09:24 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:09:24 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed May 10 12:10:18 UTC 2017 ssl.sh: #2530: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 7656 at Wed May 10 12:10:18 UTC 2017 kill -USR1 7656 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7656 killed at Wed May 10 12:10:18 UTC 2017 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) ---- selfserv_9208 starting at Wed May 10 12:10:18 UTC 2017 selfserv_9208 -D -p 9208 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A3 -u -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:10:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7726 >/dev/null 2>/dev/null selfserv_9208 with PID 7726 found at Wed May 10 12:10:18 UTC 2017 selfserv_9208 with PID 7726 started at Wed May 10 12:10:18 UTC 2017 strsclnt -q -p 9208 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :00A3 -N -n ExtendedSSLUser-dsa \ -V ssl3:tls1.2 localhost.localdomain strsclnt started at Wed May 10 12:10:18 UTC 2017 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed May 10 12:11:12 UTC 2017 ssl.sh: #2531: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9208 with PID 7726 at Wed May 10 12:11:12 UTC 2017 kill -USR1 7726 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7726 killed at Wed May 10 12:11:12 UTC 2017 ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the client modutil -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -fips false -force FIPS mode disabled. ssl.sh: #2532: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/client -list ssl.sh: #2533: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #2534: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_client -fips false -force FIPS mode disabled. ssl.sh: #2535: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/ext_client -list ssl.sh: #2536: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #2537: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Wed May 10 12:11:13 UTC 2017 Running tests for ocsp TIMESTAMP ocsp BEGIN: Wed May 10 12:11:13 UTC 2017 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Wed May 10 12:11:13 UTC 2017 Running tests for merge TIMESTAMP merge BEGIN: Wed May 10 12:11:13 UTC 2017 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests.v3.1556 -t Test2 -f ../tests.pw merge.sh: #2538: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw merge.sh: #2539: Merging Dave - PASSED merge.sh: Merging in new user certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw merge.sh: #2540: Merging server - PASSED merge.sh: Merging in new chain certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw merge.sh: #2541: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #2542: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #2543: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:42:52 2017 Not After : Tue May 10 11:42:52 2022 Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:e3:a8:c5:7b:02:a6:97:3c:8c:d2:be:ae:0f:38:ca: d3:e9:d3:dd:bb:63:d1:3e:40:78:a4:8b:0e:77:c8:fb: 64:32:d3:73:f7:4e:9f:d2:0f:8a:cf:54:c6:43:8b:c4: 7b:41:d9:6d:a1:e1:4c:c3:4f:33:92:b8:c7:81:9a:c6: 22:09:7b:09:6e:26:e8:d9:3b:8c:b0:87:01:ff:b6:69: 7a:d8:3b:d3:cc:f3:f9:ff:28:f8:4f:dd:28:2f:df:a2: b4:69:0b:0a:9a:bf:6e:38:9f:c7:a0:32:29:70:46:71: 6c:73:b0:a6:b3:20:ad:68:28:58:1f:01:b9:d3:09:f7: 46:22:d3:8d:4c:fe:95:8d:57:61:97:38:cd:6c:a7:26: 04:6e:1f:75:c3:b6:50:a1:d1:32:dd:82:3e:84:b3:24: 4c:2b:85:20:b0:d3:8f:3c:d4:f0:fa:8c:03:65:32:2c: a6:0d:4d:a4:61:d4:17:7d:9e:a9:1b:5b:2b:3d:f9:0b: d5:be:57:b1:44:f9:3e:bc:7d:a2:10:fe:2b:7e:de:e8: d6:25:65:87:8b:6b:95:fc:90:2e:6f:7f:9e:fa:b9:08: fb:8e:6b:94:f0:6a:69:4d:2d:42:bc:fe:57:b5:18:ef: 51:01:41:c3:d6:a4:fb:91:3e:f4:48:8f:a5:18:40:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:82:c3:a9:f3:c1:59:65:c1:b0:69:c8:ec:95:39:34: 91:df:d2:ac:d9:10:2b:5a:a2:b1:9e:fa:e0:6a:dd:fd: 16:31:f3:66:87:d9:dc:ab:71:fe:0b:4f:73:27:37:3a: 5f:7e:3c:66:0b:2e:0b:19:d9:fc:65:10:48:ff:42:61: e8:f9:64:65:6c:fc:81:0d:9f:6c:3b:86:71:e7:17:dd: fb:b0:06:38:ef:85:90:27:30:d3:b3:e0:93:ed:85:9a: 5a:bd:19:ea:f9:12:fd:bb:bd:3f:f3:ea:d8:e7:18:62: 5f:d1:37:4f:86:cc:2a:74:72:a6:85:3d:cd:0e:fa:6e: ef:81:c2:e1:f9:a9:84:7c:8c:03:26:ea:23:34:c9:8b: c8:85:e8:0e:4e:77:d9:19:21:ec:b7:55:a2:cb:d4:d5: 11:dc:16:1c:54:a2:9f:b5:5d:8a:ad:11:ae:1a:80:c3: 91:33:b2:ca:ef:35:50:f3:24:b9:96:38:4a:82:5a:96: ac:80:fb:48:2a:ff:45:d8:ac:ac:8e:11:f0:13:98:c0: 91:55:bb:49:aa:0d:b3:56:b2:5b:84:e9:29:ab:3f:f9: 98:ae:af:ed:a8:aa:f6:41:6e:0e:d8:d7:d3:95:11:fe: 66:c2:d9:9c:4b:9c:2a:0b:42:7b:63:78:39:52:ed:92 Fingerprint (SHA-256): F1:D1:FF:D1:2F:49:D9:F4:0B:34:45:09:65:56:59:E8:05:A9:3A:7C:71:0B:13:D2:08:92:93:3E:00:C4:A6:0D Fingerprint (SHA1): C0:9C:6D:39:06:BD:0C:5C:77:79:94:8D:D7:4D:EC:74:EB:14:44:CC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #2544: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:42:55 2017 Not After : Tue May 10 11:42:55 2022 Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:13:5f:25:a4:5f:eb:1f:90:e5:a9:ae:af:a3:14:02: fb:fb:4f:04:5b:0e:d4:fa:ef:f8:ac:7f:e6:91:3c:cf: 23:5e:74:23:88:dc:ef:0f:57:ec:8e:4d:cc:56:44:d5: fe:1c:db:40:ea:92:33:96:d2:2a:ac:d5:f7:a3:bb:c0: 18:53:64:6c:2d:0a:e5:9b:54:91:de:fa:4a:86:4d:43: d1:ac:53:2d:f7:d1:22:8d:4f:e1:59:98:5d:f0:01:d9: 3b:6d:9d:10:ee:ff:ca:11:2c:c6:c4:e3:1e:04:6a:72: 21:7d:f8:d0:b5:45:64:4d:f6:cf:79:0b:2d:69:cc:e4: e9:eb:17:72:d9:29:5e:60:8d:15:7c:d6:ff:05:a3:f9: 49:0b:0b:06:40:9c:dd:be:be:21:75:0a:ea:52:42:62: 69:45:ef:22:e6:c4:14:b3:ad:89:85:3d:0a:b1:9f:1f: 6f:d2:8d:b6:92:cb:3f:c8:46:b0:26:b1:f0:fe:ba:99: 53:fe:21:3e:24:ad:dc:7e:27:ff:5b:d8:32:e7:75:b2: 43:a0:b9:9a:8b:08:8d:88:1b:51:ae:e2:e1:c0:3d:05: f0:b6:64:43:54:06:f5:eb:93:f7:21:dd:23:90:eb:4b: 0c:d8:7e:ce:da:83:3e:b5:f0:67:9b:d5:70:58:4b:e3 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:15:41:67:ac:8a:90:0b:a0:b3:d3:9e:e8:a0:2b:b3: 59:67:d9:66:3f:f5:49:75:82:bf:4f:b8:cb:8d:78:eb: 81:9c:20:b6:e3:9f:96:c2:76:53:26:51:0f:e9:71:1f: 99:33:2e:18:6e:a1:0d:a6:3d:39:7a:61:84:5b:79:da: c6:f9:c7:f5:3b:36:ce:60:fd:89:d6:74:5b:7e:17:32: c6:54:7d:a8:eb:eb:65:e8:ae:90:6c:4a:d7:da:7a:31: ee:c7:e8:42:ac:6c:65:15:6a:a0:21:16:d5:cc:a0:7b: 39:a0:6b:b3:30:05:65:5d:bc:24:67:f7:65:c2:7f:10: 8f:e8:02:b7:6e:78:ff:c8:d2:da:db:e3:eb:74:af:6b: e4:8f:ec:85:46:28:cc:cd:47:17:bf:02:82:ca:17:71: 05:d1:1d:32:92:85:fe:24:3d:24:2b:9e:66:3a:96:0b: c2:8d:ea:5f:16:e1:c7:18:17:7a:0e:fe:15:d7:a6:a8: 06:b4:87:3c:9e:30:5d:b9:0e:1f:e2:d5:0c:7e:b7:26: 37:ac:aa:fc:9a:3c:4a:90:61:7e:ab:7d:a7:29:63:0f: d5:f8:71:26:7b:57:4e:83:d6:d4:5e:98:46:6b:2f:7b: e1:98:70:01:b6:14:be:1d:c2:d8:41:ec:44:9a:f2:1e Fingerprint (SHA-256): A7:90:95:22:8B:5A:91:49:7A:E8:27:C1:3C:B8:40:C0:3C:B7:DE:65:68:07:F9:9A:0E:DE:47:D2:44:05:1A:63 Fingerprint (SHA1): 39:86:41:C6:50:58:FB:AB:74:BC:B7:A3:74:03:AF:96:DA:2E:40:64 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #2545: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw merge.sh: #2546: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA-dsa CT,C,C Alice-ec u,u,u Dave u,u,u localhost.localdomain-dsamixed ,, serverCA-dsa C,C,C chain-2-clientCA-ec ,, Alice #1 ,, Dave-dsa ,, localhost.localdomain-ecmixed ,, localhost-sni.localdomain-dsamixed ,, Alice #99 ,, Alice-dsamixed u,u,u eve@bogus.com ,, bob-ec@bogus.com ,, localhost.localdomain u,u,u localhost-sni.localdomain-ecmixed ,, clientCA T,C,C Alice #3 ,, TestCA CT,C,C TestCA-ec CT,C,C Alice-ecmixed u,u,u Dave-ecmixed ,, localhost.localdomain-dsa ,, localhost-sni.localdomain u,u,u localhost-sni.localdomain-ec ,, ExtendedSSLUser u,u,u serverCA C,C,C ExtendedSSLUser-ec ,, serverCA-ec C,C,C chain-1-clientCA-ec ,, chain-1-clientCA ,, clientCA-dsa T,C,C Alice #2 ,, Alice #4 ,, Alice u,u,u Dave-ec ,, localhost-sni.localdomain-dsa ,, ExtendedSSLUser-dsa ,, ExtendedSSLUser-ecmixed ,, chain-2-clientCA ,, chain-1-clientCA-dsa ,, Alice #100 ,, Alice-dsa u,u,u ExtendedSSLUser-dsamixed ,, chain-2-clientCA-dsa ,, bob@bogus.com ,, Dave-dsamixed ,, localhost.localdomain-ec ,, clientCA-ec T,C,C CRL names CRL Type TestCA CRL TestCA-ec CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests.v3.1556 -t Test2 -f ../tests.pw merge.sh: #2547: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests.v1.1556 -t Test1 -f ../tests.pw merge.sh: #2548: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #2549: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. merge.sh: #2550: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #2551: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Wed May 10 11:43:15 2017 Entry 1 (0x1): Serial Number: 40 (0x28) Revocation Date: Wed May 10 11:41:20 2017 Entry Extensions: Name: CRL reason code Entry 2 (0x2): Serial Number: 42 (0x2a) Revocation Date: Wed May 10 11:43:11 2017 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #2552: Verifying TestCA CRL - PASSED TEST_MODE=STANDARD NSS_DEFAULT_DB_TYPE=dbm TIMESTAMP merge END: Wed May 10 12:11:14 UTC 2017 Running tests for pkits TIMESTAMP pkits BEGIN: Wed May 10 12:11:14 UTC 2017 pkits.sh: PKITS data directory not defined, skipping. TIMESTAMP pkits END: Wed May 10 12:11:14 UTC 2017 Running tests for chains TIMESTAMP chains BEGIN: Wed May 10 12:11:14 UTC 2017 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #2553: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121115 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2554: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #2555: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #2556: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #2557: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2558: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2559: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2560: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #2561: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #2562: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2563: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2564: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2565: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #2566: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #2567: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2568: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9219 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2569: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2570: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #2571: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #2572: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2573: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2574: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2575: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #2576: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2577: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2578: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2579: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #2580: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2581: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2582: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2583: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #2584: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2585: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2586: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2587: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #2588: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2589: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9219 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2590: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2591: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #2592: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2593: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2594: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2595: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #2596: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2597: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2598: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2599: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #2600: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2601: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9219 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2602: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2603: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #2604: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2605: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2606: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2607: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #2608: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2609: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2610: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2611: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #2612: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2613: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9219 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2614: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2615: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20170510121135Z nextupdate=20180510121135Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Wed May 10 12:11:35 2017 Next Update: Thu May 10 12:11:35 2018 CRL Extensions: chains.sh: #2616: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20170510121136Z addcert 2 20170510121136Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Wed May 10 12:11:36 2017 Next Update: Thu May 10 12:11:35 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed May 10 12:11:36 2017 CRL Extensions: chains.sh: #2617: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20170510121136Z nextupdate=20180510121136Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed May 10 12:11:36 2017 Next Update: Thu May 10 12:11:36 2018 CRL Extensions: chains.sh: #2618: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20170510121137Z addcert 2 20170510121137Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed May 10 12:11:37 2017 Next Update: Thu May 10 12:11:36 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed May 10 12:11:37 2017 CRL Extensions: chains.sh: #2619: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20170510121138Z addcert 4 20170510121138Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed May 10 12:11:38 2017 Next Update: Thu May 10 12:11:36 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed May 10 12:11:37 2017 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Wed May 10 12:11:38 2017 CRL Extensions: chains.sh: #2620: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20170510121138Z nextupdate=20180510121138Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed May 10 12:11:38 2017 Next Update: Thu May 10 12:11:38 2018 CRL Extensions: chains.sh: #2621: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20170510121139Z addcert 2 20170510121139Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed May 10 12:11:39 2017 Next Update: Thu May 10 12:11:38 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed May 10 12:11:39 2017 CRL Extensions: chains.sh: #2622: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20170510121140Z addcert 3 20170510121140Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed May 10 12:11:40 2017 Next Update: Thu May 10 12:11:38 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed May 10 12:11:39 2017 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Wed May 10 12:11:40 2017 CRL Extensions: chains.sh: #2623: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20170510121140Z nextupdate=20180510121140Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed May 10 12:11:40 2017 Next Update: Thu May 10 12:11:40 2018 CRL Extensions: chains.sh: #2624: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20170510121141Z addcert 2 20170510121141Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed May 10 12:11:41 2017 Next Update: Thu May 10 12:11:40 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed May 10 12:11:41 2017 CRL Extensions: chains.sh: #2625: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20170510121142Z addcert 3 20170510121142Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed May 10 12:11:42 2017 Next Update: Thu May 10 12:11:40 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed May 10 12:11:41 2017 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Wed May 10 12:11:42 2017 CRL Extensions: chains.sh: #2626: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #2627: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #2628: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #2629: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #2630: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #2631: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #2632: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #2633: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #2634: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #2635: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #2636: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #2637: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #2638: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #2639: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #2640: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #2641: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #2642: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #2643: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #2644: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #2645: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #2646: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #2647: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #2648: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #2649: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #2650: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED httpserv starting at Wed May 10 12:11:44 UTC 2017 httpserv -D -p 9218 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/aiahttp/http_pid.1556 & trying to connect to httpserv at Wed May 10 12:11:44 UTC 2017 tstclnt -p 9218 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9218 (address=::1) tstclnt: exiting with return code 0 kill -0 9417 >/dev/null 2>/dev/null httpserv with PID 9417 found at Wed May 10 12:11:44 UTC 2017 httpserv with PID 9417 started at Wed May 10 12:11:44 UTC 2017 tstclnt -h localhost.localdomain -p 9218 -q -t 20 chains.sh: #2651: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121115 (0x1e67d49b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Wed May 10 12:11:15 2017 Not After : Tue May 10 12:11:15 2067 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 95:8e:d3:af:f3:18:54:b2:81:cc:3f:27:e8:89:5a:86: fa:e9:cd:59:d7:31:e2:6a:41:c4:48:78:7b:9e:51:6f: 5c:d5:33:32:cf:fc:77:f9:82:70:cd:8a:b0:e1:4f:52: 92:09:81:a5:3d:de:46:64:1b:e7:e8:71:cb:d8:44:93: 06:e6:7c:a6:c9:47:15:2d:08:e7:0b:95:d8:37:ee:e2: df:86:95:1f:1d:43:6c:e6:54:80:5c:70:48:aa:9a:78: fa:65:c2:05:63:fc:84:4a:a3:39:d2:92:d5:58:67:e6: 98:b0:8c:25:d7:4d:67:67:21:cb:79:be:2e:f5:f1:9a: 05:0e:4e:9c:5e:0a:cc:6e:8e:2e:93:b1:08:1d:01:b0: 3a:31:48:80:e2:65:ea:e3:20:a8:25:01:8e:38:95:cf: 87:7e:93:fc:42:16:ea:1c:de:4b:f4:7c:b7:00:ae:21: dd:91:1c:8e:c1:48:89:2f:28:9e:18:90:50:8c:ab:30: 93:82:af:94:8e:4c:78:75:bc:f3:79:21:0a:7e:11:e4: 2d:7c:13:37:b4:81:54:84:13:8c:66:74:e8:53:65:b8: e3:2c:b6:9c:b2:9a:af:21:a5:1e:21:ce:13:37:1a:e2: cb:87:0c:d4:b9:ed:ef:88:29:fc:ae:00:80:23:e7:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:a5:e1:14:ce:04:70:d6:b0:84:49:18:83:7c:46:60: f9:33:16:d6:71:b9:1e:63:33:fa:b9:6a:4d:65:fc:37: fd:0b:5e:35:15:c0:59:6c:13:de:d0:a5:d0:63:a9:fd: d9:a8:b5:66:3f:4e:3f:08:46:61:ce:05:4d:8f:94:33: 46:9e:ee:d1:7c:a1:fa:cb:c3:4e:b7:e3:a2:01:ba:23: 35:31:a2:c1:5f:72:6a:67:a4:f9:90:7e:c3:33:12:78: d6:9f:fc:0f:64:09:ed:fa:bb:70:6b:46:1d:38:a2:cd: 76:77:e0:54:c4:66:ef:34:63:61:3d:4c:fc:42:1d:8c: 9b:81:96:ae:d6:48:4b:22:34:10:a8:bf:e1:74:55:25: 36:e9:81:43:85:88:e0:0b:f6:d1:a8:3c:9a:8b:ea:95: e3:54:67:dc:df:19:d6:5e:16:90:4a:1c:b3:6c:e3:6e: 5d:af:7a:6f:3e:1f:d3:38:8b:59:ec:af:63:77:10:fc: 4e:87:0c:a4:85:b5:2c:23:01:c0:50:8c:91:c0:e4:33: dd:7a:34:a8:7e:97:58:f8:13:51:7b:4f:da:42:fd:48: 23:1a:00:6c:f5:93:fc:18:b4:7b:61:e4:4f:75:a7:41: 09:73:a7:db:36:5d:17:db:28:b4:6b:30:43:c7:da:55 Fingerprint (SHA-256): A5:2C:58:18:BD:32:CF:D5:D3:AA:B9:2A:B6:B0:91:E1:9C:37:99:12:97:F2:37:58:B4:52:F4:1F:11:98:A2:01 Fingerprint (SHA1): 4F:CA:D5:B9:8F:70:F9:29:71:B1:A6:7D:4B:C4:9A:38:38:3A:0A:18 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #2652: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #2653: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #2654: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 9417 at Wed May 10 12:11:45 UTC 2017 kill -USR1 9417 httpserv: normal termination httpserv -b -p 9218 2>/dev/null; httpserv with PID 9417 killed at Wed May 10 12:11:45 UTC 2017 httpserv starting at Wed May 10 12:11:45 UTC 2017 httpserv -D -p 9218 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/aiahttp/http_pid.1556 & trying to connect to httpserv at Wed May 10 12:11:45 UTC 2017 tstclnt -p 9218 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9218 (address=::1) tstclnt: exiting with return code 0 kill -0 9586 >/dev/null 2>/dev/null httpserv with PID 9586 found at Wed May 10 12:11:45 UTC 2017 httpserv with PID 9586 started at Wed May 10 12:11:45 UTC 2017 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2655: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. OCSPEE12OCSPCA1 : ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2656: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2657: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED tstclnt -h localhost.localdomain -p 9218 -q -t 20 chains.sh: #2658: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121115 (0x1e67d49b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Wed May 10 12:11:15 2017 Not After : Tue May 10 12:11:15 2067 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 95:8e:d3:af:f3:18:54:b2:81:cc:3f:27:e8:89:5a:86: fa:e9:cd:59:d7:31:e2:6a:41:c4:48:78:7b:9e:51:6f: 5c:d5:33:32:cf:fc:77:f9:82:70:cd:8a:b0:e1:4f:52: 92:09:81:a5:3d:de:46:64:1b:e7:e8:71:cb:d8:44:93: 06:e6:7c:a6:c9:47:15:2d:08:e7:0b:95:d8:37:ee:e2: df:86:95:1f:1d:43:6c:e6:54:80:5c:70:48:aa:9a:78: fa:65:c2:05:63:fc:84:4a:a3:39:d2:92:d5:58:67:e6: 98:b0:8c:25:d7:4d:67:67:21:cb:79:be:2e:f5:f1:9a: 05:0e:4e:9c:5e:0a:cc:6e:8e:2e:93:b1:08:1d:01:b0: 3a:31:48:80:e2:65:ea:e3:20:a8:25:01:8e:38:95:cf: 87:7e:93:fc:42:16:ea:1c:de:4b:f4:7c:b7:00:ae:21: dd:91:1c:8e:c1:48:89:2f:28:9e:18:90:50:8c:ab:30: 93:82:af:94:8e:4c:78:75:bc:f3:79:21:0a:7e:11:e4: 2d:7c:13:37:b4:81:54:84:13:8c:66:74:e8:53:65:b8: e3:2c:b6:9c:b2:9a:af:21:a5:1e:21:ce:13:37:1a:e2: cb:87:0c:d4:b9:ed:ef:88:29:fc:ae:00:80:23:e7:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:a5:e1:14:ce:04:70:d6:b0:84:49:18:83:7c:46:60: f9:33:16:d6:71:b9:1e:63:33:fa:b9:6a:4d:65:fc:37: fd:0b:5e:35:15:c0:59:6c:13:de:d0:a5:d0:63:a9:fd: d9:a8:b5:66:3f:4e:3f:08:46:61:ce:05:4d:8f:94:33: 46:9e:ee:d1:7c:a1:fa:cb:c3:4e:b7:e3:a2:01:ba:23: 35:31:a2:c1:5f:72:6a:67:a4:f9:90:7e:c3:33:12:78: d6:9f:fc:0f:64:09:ed:fa:bb:70:6b:46:1d:38:a2:cd: 76:77:e0:54:c4:66:ef:34:63:61:3d:4c:fc:42:1d:8c: 9b:81:96:ae:d6:48:4b:22:34:10:a8:bf:e1:74:55:25: 36:e9:81:43:85:88:e0:0b:f6:d1:a8:3c:9a:8b:ea:95: e3:54:67:dc:df:19:d6:5e:16:90:4a:1c:b3:6c:e3:6e: 5d:af:7a:6f:3e:1f:d3:38:8b:59:ec:af:63:77:10:fc: 4e:87:0c:a4:85:b5:2c:23:01:c0:50:8c:91:c0:e4:33: dd:7a:34:a8:7e:97:58:f8:13:51:7b:4f:da:42:fd:48: 23:1a:00:6c:f5:93:fc:18:b4:7b:61:e4:4f:75:a7:41: 09:73:a7:db:36:5d:17:db:28:b4:6b:30:43:c7:da:55 Fingerprint (SHA-256): A5:2C:58:18:BD:32:CF:D5:D3:AA:B9:2A:B6:B0:91:E1:9C:37:99:12:97:F2:37:58:B4:52:F4:1F:11:98:A2:01 Fingerprint (SHA1): 4F:CA:D5:B9:8F:70:F9:29:71:B1:A6:7D:4B:C4:9A:38:38:3A:0A:18 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #2659: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #2660: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #2661: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 9586 at Wed May 10 12:11:46 UTC 2017 kill -USR1 9586 httpserv: normal termination httpserv -b -p 9218 2>/dev/null; httpserv with PID 9586 killed at Wed May 10 12:11:46 UTC 2017 httpserv starting at Wed May 10 12:11:46 UTC 2017 httpserv -D -p 9218 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/aiahttp/http_pid.1556 & trying to connect to httpserv at Wed May 10 12:11:46 UTC 2017 tstclnt -p 9218 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9218 (address=::1) tstclnt: exiting with return code 0 kill -0 9833 >/dev/null 2>/dev/null httpserv with PID 9833 found at Wed May 10 12:11:46 UTC 2017 httpserv with PID 9833 started at Wed May 10 12:11:46 UTC 2017 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2662: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #2663: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121116 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2664: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #2665: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #2666: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121117 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2667: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #2668: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #2669: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2670: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 510121118 -7 Bridge@Army < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2671: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2672: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 510121119 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2673: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2674: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #2675: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #2676: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2677: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 510121120 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2678: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2679: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2680: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #2681: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #2682: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121117 (0x1e67d49d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:11:49 2017 Not After : Tue May 10 12:11:49 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:7d:05:a2:70:5e:75:18:04:3f:ef:c1:53:6a:a4:f1: c4:26:68:ae:8c:1c:30:98:fb:25:62:6b:20:c7:b0:21: e4:c8:2a:8a:23:63:2c:00:b4:bb:c7:78:ef:9a:dd:c6: 2e:60:58:ac:e9:1b:a3:3e:24:02:04:cf:df:2c:cd:83: cf:08:9b:28:17:3e:0b:54:a4:35:7b:ce:42:0e:e6:31: dd:1e:db:31:fb:d8:ae:07:17:eb:96:9a:e5:6c:e2:f9: 56:a9:e9:d0:2f:7a:89:28:6b:3a:af:7c:f0:cc:07:21: 99:e0:fb:6f:38:80:80:3b:e5:eb:03:06:51:ed:a3:4e: 23:c6:09:51:3c:6d:25:18:4e:33:7a:54:1c:34:21:8b: 10:bb:a4:b3:6c:ae:b4:ee:1b:d3:5f:dd:71:0d:18:31: c2:de:58:f2:9a:c4:98:4c:6a:96:ae:6b:03:84:68:5d: b2:fc:eb:02:35:3e:a7:f0:76:92:13:83:62:12:df:32: 47:50:8f:11:32:dc:a2:b1:cd:8d:50:88:d8:d0:1e:09: 96:41:21:dd:c9:26:56:80:d8:98:b1:59:4b:fd:da:7a: 2d:cf:5e:6b:29:2d:a3:3a:c2:6d:99:d7:21:aa:b1:f2: a6:97:00:a2:94:1d:e1:5d:8e:59:bc:2c:9f:c9:0f:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:a0:ef:dc:e3:fd:8e:3f:2d:09:25:e4:80:e2:18:c6: 4b:9f:6b:cf:c0:60:a6:07:11:46:63:ce:40:b0:4a:46: ee:8d:d5:17:fb:27:8d:f9:e8:04:8e:26:06:b2:30:61: de:92:ed:7b:1a:fa:d5:27:a4:0b:44:bf:c7:bc:89:f3: 0a:46:17:7c:ea:c4:01:99:19:20:6f:e6:ec:0d:99:08: 4d:95:54:a0:42:32:af:6a:50:2b:5c:86:92:68:3b:7f: 46:d1:89:e5:53:de:6a:ff:5e:7a:2d:21:78:ce:d5:a1: c3:ab:a9:41:30:62:17:a6:56:b9:5a:a7:d6:64:77:89: 8e:a1:2c:08:6d:b4:c5:30:5f:11:3b:9b:e9:9c:e1:7a: dc:b0:01:28:ad:07:6f:05:15:42:88:3d:83:4c:1d:f6: 07:18:06:e0:09:c1:33:17:9e:a8:14:8b:50:c7:12:75: 4e:62:71:3b:fa:f2:33:08:a5:d7:7d:47:39:3d:eb:ca: f8:66:8d:b5:e9:8c:04:6b:03:b0:36:6f:aa:ba:9a:bd: 8b:3d:98:71:c9:56:15:68:ce:41:b9:16:04:a7:6b:a0: 70:2c:bd:c6:9f:82:13:2c:87:96:02:90:27:ce:07:6b: 53:e6:73:88:40:fb:69:cc:4b:72:59:80:5f:e0:99:0b Fingerprint (SHA-256): 6B:11:F3:4E:BD:81:5E:14:46:7F:4C:9F:33:00:0B:F8:7E:4F:67:07:DB:EE:0A:D6:69:55:89:53:15:78:B2:97 Fingerprint (SHA1): ED:C0:D7:7A:00:C0:A5:B6:18:39:6A:40:29:08:FB:E8:51:95:57:CC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2683: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121116 (0x1e67d49c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 12:11:48 2017 Not After : Tue May 10 12:11:48 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:48:b4:01:83:bc:14:a3:01:27:9a:75:ac:69:6f:20: 8e:08:a5:db:73:11:d1:be:31:a7:4a:23:70:95:4b:49: 38:54:05:2a:e8:02:56:fc:7b:12:45:14:b0:e7:b7:bc: 19:a7:75:78:85:8a:c1:34:93:fd:5e:84:99:87:81:54: 6a:ef:14:14:0c:b1:0d:f3:4c:7f:33:f0:11:c4:d3:0d: df:49:a4:b8:2d:7d:d9:89:95:0b:1e:b1:67:91:2f:ef: b1:0b:52:cc:bf:fb:80:4c:b2:35:3b:c0:b8:1f:db:f2: e2:c4:41:53:73:e0:01:fb:bd:26:1e:83:d9:24:47:81: e0:1a:78:96:40:6a:0b:8d:75:18:c8:a5:87:e0:8a:8e: 31:4d:0c:42:2f:7f:54:ac:fc:dc:53:f3:cb:9c:20:25: 7c:21:47:98:0b:76:d0:12:0d:91:db:a5:17:4c:1a:c6: 6b:fc:90:18:4b:83:a4:63:a4:cd:7f:f0:6b:d8:02:e0: 52:ee:8c:27:6a:2c:48:fb:66:a0:fb:1b:7f:18:82:ec: b9:fc:b2:f9:ef:70:78:67:5f:fb:d9:17:5e:9c:36:ad: 68:2d:c2:0f:47:89:b3:0c:26:75:b8:dd:74:10:20:49: 1e:87:84:ae:76:3c:fe:79:84:93:6b:c7:30:0a:c8:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 86:21:76:1a:f8:cc:5e:61:fc:2b:78:3b:d6:e5:d2:2a: b6:7f:f7:71:b8:65:d6:4f:1e:ae:1d:21:c0:c1:4d:43: 53:0f:c5:a9:06:0e:64:52:fe:d3:49:28:55:7f:4a:91: 4e:b5:6d:21:08:8d:07:6a:d9:82:06:20:14:bc:27:1e: 27:57:71:fd:11:56:b3:fa:6c:e9:15:76:ba:77:b9:c1: 57:39:6a:4e:e6:69:f6:07:2c:25:c6:dd:f2:2a:6b:c2: 73:df:87:69:b4:98:37:91:d0:48:a1:7d:0f:84:08:c0: 0e:27:0f:6b:13:14:61:5b:bd:f1:fd:9e:af:7a:05:3e: 3b:61:93:e8:45:c3:21:cc:c4:e2:29:11:bb:44:9c:84: e3:cf:17:d5:1c:f0:4f:55:21:46:a0:88:18:a8:68:44: d8:f9:53:32:62:9d:ad:fd:7b:58:69:d2:2b:bc:f2:db: 9a:b7:bb:74:d7:c5:d5:1e:47:6a:2d:e1:6f:9f:11:2c: 0f:7f:c5:d3:a4:f9:1e:fa:2e:14:84:3e:17:74:a5:58: 2a:99:6e:b3:e7:48:f1:a0:49:ad:f6:5f:ff:8d:37:d0: 2c:2f:63:1c:7a:db:cd:8f:2d:03:15:5b:a0:c7:eb:d6: 65:48:71:f0:8a:99:f6:ec:57:08:3b:84:78:76:bc:1f Fingerprint (SHA-256): 72:AD:70:D3:52:FC:37:6A:68:FC:E8:17:88:7F:77:F7:48:51:56:D9:F7:B4:FE:50:BA:43:FC:01:7D:6E:CF:AD Fingerprint (SHA1): 05:BF:9E:B7:78:C3:0D:EA:7A:D3:E3:F2:45:4A:B3:12:60:35:B3:B1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2684: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #2685: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #2686: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #2687: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121116 (0x1e67d49c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 12:11:48 2017 Not After : Tue May 10 12:11:48 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:48:b4:01:83:bc:14:a3:01:27:9a:75:ac:69:6f:20: 8e:08:a5:db:73:11:d1:be:31:a7:4a:23:70:95:4b:49: 38:54:05:2a:e8:02:56:fc:7b:12:45:14:b0:e7:b7:bc: 19:a7:75:78:85:8a:c1:34:93:fd:5e:84:99:87:81:54: 6a:ef:14:14:0c:b1:0d:f3:4c:7f:33:f0:11:c4:d3:0d: df:49:a4:b8:2d:7d:d9:89:95:0b:1e:b1:67:91:2f:ef: b1:0b:52:cc:bf:fb:80:4c:b2:35:3b:c0:b8:1f:db:f2: e2:c4:41:53:73:e0:01:fb:bd:26:1e:83:d9:24:47:81: e0:1a:78:96:40:6a:0b:8d:75:18:c8:a5:87:e0:8a:8e: 31:4d:0c:42:2f:7f:54:ac:fc:dc:53:f3:cb:9c:20:25: 7c:21:47:98:0b:76:d0:12:0d:91:db:a5:17:4c:1a:c6: 6b:fc:90:18:4b:83:a4:63:a4:cd:7f:f0:6b:d8:02:e0: 52:ee:8c:27:6a:2c:48:fb:66:a0:fb:1b:7f:18:82:ec: b9:fc:b2:f9:ef:70:78:67:5f:fb:d9:17:5e:9c:36:ad: 68:2d:c2:0f:47:89:b3:0c:26:75:b8:dd:74:10:20:49: 1e:87:84:ae:76:3c:fe:79:84:93:6b:c7:30:0a:c8:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 86:21:76:1a:f8:cc:5e:61:fc:2b:78:3b:d6:e5:d2:2a: b6:7f:f7:71:b8:65:d6:4f:1e:ae:1d:21:c0:c1:4d:43: 53:0f:c5:a9:06:0e:64:52:fe:d3:49:28:55:7f:4a:91: 4e:b5:6d:21:08:8d:07:6a:d9:82:06:20:14:bc:27:1e: 27:57:71:fd:11:56:b3:fa:6c:e9:15:76:ba:77:b9:c1: 57:39:6a:4e:e6:69:f6:07:2c:25:c6:dd:f2:2a:6b:c2: 73:df:87:69:b4:98:37:91:d0:48:a1:7d:0f:84:08:c0: 0e:27:0f:6b:13:14:61:5b:bd:f1:fd:9e:af:7a:05:3e: 3b:61:93:e8:45:c3:21:cc:c4:e2:29:11:bb:44:9c:84: e3:cf:17:d5:1c:f0:4f:55:21:46:a0:88:18:a8:68:44: d8:f9:53:32:62:9d:ad:fd:7b:58:69:d2:2b:bc:f2:db: 9a:b7:bb:74:d7:c5:d5:1e:47:6a:2d:e1:6f:9f:11:2c: 0f:7f:c5:d3:a4:f9:1e:fa:2e:14:84:3e:17:74:a5:58: 2a:99:6e:b3:e7:48:f1:a0:49:ad:f6:5f:ff:8d:37:d0: 2c:2f:63:1c:7a:db:cd:8f:2d:03:15:5b:a0:c7:eb:d6: 65:48:71:f0:8a:99:f6:ec:57:08:3b:84:78:76:bc:1f Fingerprint (SHA-256): 72:AD:70:D3:52:FC:37:6A:68:FC:E8:17:88:7F:77:F7:48:51:56:D9:F7:B4:FE:50:BA:43:FC:01:7D:6E:CF:AD Fingerprint (SHA1): 05:BF:9E:B7:78:C3:0D:EA:7A:D3:E3:F2:45:4A:B3:12:60:35:B3:B1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2688: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121117 (0x1e67d49d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:11:49 2017 Not After : Tue May 10 12:11:49 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:7d:05:a2:70:5e:75:18:04:3f:ef:c1:53:6a:a4:f1: c4:26:68:ae:8c:1c:30:98:fb:25:62:6b:20:c7:b0:21: e4:c8:2a:8a:23:63:2c:00:b4:bb:c7:78:ef:9a:dd:c6: 2e:60:58:ac:e9:1b:a3:3e:24:02:04:cf:df:2c:cd:83: cf:08:9b:28:17:3e:0b:54:a4:35:7b:ce:42:0e:e6:31: dd:1e:db:31:fb:d8:ae:07:17:eb:96:9a:e5:6c:e2:f9: 56:a9:e9:d0:2f:7a:89:28:6b:3a:af:7c:f0:cc:07:21: 99:e0:fb:6f:38:80:80:3b:e5:eb:03:06:51:ed:a3:4e: 23:c6:09:51:3c:6d:25:18:4e:33:7a:54:1c:34:21:8b: 10:bb:a4:b3:6c:ae:b4:ee:1b:d3:5f:dd:71:0d:18:31: c2:de:58:f2:9a:c4:98:4c:6a:96:ae:6b:03:84:68:5d: b2:fc:eb:02:35:3e:a7:f0:76:92:13:83:62:12:df:32: 47:50:8f:11:32:dc:a2:b1:cd:8d:50:88:d8:d0:1e:09: 96:41:21:dd:c9:26:56:80:d8:98:b1:59:4b:fd:da:7a: 2d:cf:5e:6b:29:2d:a3:3a:c2:6d:99:d7:21:aa:b1:f2: a6:97:00:a2:94:1d:e1:5d:8e:59:bc:2c:9f:c9:0f:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:a0:ef:dc:e3:fd:8e:3f:2d:09:25:e4:80:e2:18:c6: 4b:9f:6b:cf:c0:60:a6:07:11:46:63:ce:40:b0:4a:46: ee:8d:d5:17:fb:27:8d:f9:e8:04:8e:26:06:b2:30:61: de:92:ed:7b:1a:fa:d5:27:a4:0b:44:bf:c7:bc:89:f3: 0a:46:17:7c:ea:c4:01:99:19:20:6f:e6:ec:0d:99:08: 4d:95:54:a0:42:32:af:6a:50:2b:5c:86:92:68:3b:7f: 46:d1:89:e5:53:de:6a:ff:5e:7a:2d:21:78:ce:d5:a1: c3:ab:a9:41:30:62:17:a6:56:b9:5a:a7:d6:64:77:89: 8e:a1:2c:08:6d:b4:c5:30:5f:11:3b:9b:e9:9c:e1:7a: dc:b0:01:28:ad:07:6f:05:15:42:88:3d:83:4c:1d:f6: 07:18:06:e0:09:c1:33:17:9e:a8:14:8b:50:c7:12:75: 4e:62:71:3b:fa:f2:33:08:a5:d7:7d:47:39:3d:eb:ca: f8:66:8d:b5:e9:8c:04:6b:03:b0:36:6f:aa:ba:9a:bd: 8b:3d:98:71:c9:56:15:68:ce:41:b9:16:04:a7:6b:a0: 70:2c:bd:c6:9f:82:13:2c:87:96:02:90:27:ce:07:6b: 53:e6:73:88:40:fb:69:cc:4b:72:59:80:5f:e0:99:0b Fingerprint (SHA-256): 6B:11:F3:4E:BD:81:5E:14:46:7F:4C:9F:33:00:0B:F8:7E:4F:67:07:DB:EE:0A:D6:69:55:89:53:15:78:B2:97 Fingerprint (SHA1): ED:C0:D7:7A:00:C0:A5:B6:18:39:6A:40:29:08:FB:E8:51:95:57:CC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2689: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #2690: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #2691: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #2692: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #2693: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #2694: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121117 (0x1e67d49d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:11:49 2017 Not After : Tue May 10 12:11:49 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:7d:05:a2:70:5e:75:18:04:3f:ef:c1:53:6a:a4:f1: c4:26:68:ae:8c:1c:30:98:fb:25:62:6b:20:c7:b0:21: e4:c8:2a:8a:23:63:2c:00:b4:bb:c7:78:ef:9a:dd:c6: 2e:60:58:ac:e9:1b:a3:3e:24:02:04:cf:df:2c:cd:83: cf:08:9b:28:17:3e:0b:54:a4:35:7b:ce:42:0e:e6:31: dd:1e:db:31:fb:d8:ae:07:17:eb:96:9a:e5:6c:e2:f9: 56:a9:e9:d0:2f:7a:89:28:6b:3a:af:7c:f0:cc:07:21: 99:e0:fb:6f:38:80:80:3b:e5:eb:03:06:51:ed:a3:4e: 23:c6:09:51:3c:6d:25:18:4e:33:7a:54:1c:34:21:8b: 10:bb:a4:b3:6c:ae:b4:ee:1b:d3:5f:dd:71:0d:18:31: c2:de:58:f2:9a:c4:98:4c:6a:96:ae:6b:03:84:68:5d: b2:fc:eb:02:35:3e:a7:f0:76:92:13:83:62:12:df:32: 47:50:8f:11:32:dc:a2:b1:cd:8d:50:88:d8:d0:1e:09: 96:41:21:dd:c9:26:56:80:d8:98:b1:59:4b:fd:da:7a: 2d:cf:5e:6b:29:2d:a3:3a:c2:6d:99:d7:21:aa:b1:f2: a6:97:00:a2:94:1d:e1:5d:8e:59:bc:2c:9f:c9:0f:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:a0:ef:dc:e3:fd:8e:3f:2d:09:25:e4:80:e2:18:c6: 4b:9f:6b:cf:c0:60:a6:07:11:46:63:ce:40:b0:4a:46: ee:8d:d5:17:fb:27:8d:f9:e8:04:8e:26:06:b2:30:61: de:92:ed:7b:1a:fa:d5:27:a4:0b:44:bf:c7:bc:89:f3: 0a:46:17:7c:ea:c4:01:99:19:20:6f:e6:ec:0d:99:08: 4d:95:54:a0:42:32:af:6a:50:2b:5c:86:92:68:3b:7f: 46:d1:89:e5:53:de:6a:ff:5e:7a:2d:21:78:ce:d5:a1: c3:ab:a9:41:30:62:17:a6:56:b9:5a:a7:d6:64:77:89: 8e:a1:2c:08:6d:b4:c5:30:5f:11:3b:9b:e9:9c:e1:7a: dc:b0:01:28:ad:07:6f:05:15:42:88:3d:83:4c:1d:f6: 07:18:06:e0:09:c1:33:17:9e:a8:14:8b:50:c7:12:75: 4e:62:71:3b:fa:f2:33:08:a5:d7:7d:47:39:3d:eb:ca: f8:66:8d:b5:e9:8c:04:6b:03:b0:36:6f:aa:ba:9a:bd: 8b:3d:98:71:c9:56:15:68:ce:41:b9:16:04:a7:6b:a0: 70:2c:bd:c6:9f:82:13:2c:87:96:02:90:27:ce:07:6b: 53:e6:73:88:40:fb:69:cc:4b:72:59:80:5f:e0:99:0b Fingerprint (SHA-256): 6B:11:F3:4E:BD:81:5E:14:46:7F:4C:9F:33:00:0B:F8:7E:4F:67:07:DB:EE:0A:D6:69:55:89:53:15:78:B2:97 Fingerprint (SHA1): ED:C0:D7:7A:00:C0:A5:B6:18:39:6A:40:29:08:FB:E8:51:95:57:CC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2695: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121117 (0x1e67d49d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:11:49 2017 Not After : Tue May 10 12:11:49 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:7d:05:a2:70:5e:75:18:04:3f:ef:c1:53:6a:a4:f1: c4:26:68:ae:8c:1c:30:98:fb:25:62:6b:20:c7:b0:21: e4:c8:2a:8a:23:63:2c:00:b4:bb:c7:78:ef:9a:dd:c6: 2e:60:58:ac:e9:1b:a3:3e:24:02:04:cf:df:2c:cd:83: cf:08:9b:28:17:3e:0b:54:a4:35:7b:ce:42:0e:e6:31: dd:1e:db:31:fb:d8:ae:07:17:eb:96:9a:e5:6c:e2:f9: 56:a9:e9:d0:2f:7a:89:28:6b:3a:af:7c:f0:cc:07:21: 99:e0:fb:6f:38:80:80:3b:e5:eb:03:06:51:ed:a3:4e: 23:c6:09:51:3c:6d:25:18:4e:33:7a:54:1c:34:21:8b: 10:bb:a4:b3:6c:ae:b4:ee:1b:d3:5f:dd:71:0d:18:31: c2:de:58:f2:9a:c4:98:4c:6a:96:ae:6b:03:84:68:5d: b2:fc:eb:02:35:3e:a7:f0:76:92:13:83:62:12:df:32: 47:50:8f:11:32:dc:a2:b1:cd:8d:50:88:d8:d0:1e:09: 96:41:21:dd:c9:26:56:80:d8:98:b1:59:4b:fd:da:7a: 2d:cf:5e:6b:29:2d:a3:3a:c2:6d:99:d7:21:aa:b1:f2: a6:97:00:a2:94:1d:e1:5d:8e:59:bc:2c:9f:c9:0f:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:a0:ef:dc:e3:fd:8e:3f:2d:09:25:e4:80:e2:18:c6: 4b:9f:6b:cf:c0:60:a6:07:11:46:63:ce:40:b0:4a:46: ee:8d:d5:17:fb:27:8d:f9:e8:04:8e:26:06:b2:30:61: de:92:ed:7b:1a:fa:d5:27:a4:0b:44:bf:c7:bc:89:f3: 0a:46:17:7c:ea:c4:01:99:19:20:6f:e6:ec:0d:99:08: 4d:95:54:a0:42:32:af:6a:50:2b:5c:86:92:68:3b:7f: 46:d1:89:e5:53:de:6a:ff:5e:7a:2d:21:78:ce:d5:a1: c3:ab:a9:41:30:62:17:a6:56:b9:5a:a7:d6:64:77:89: 8e:a1:2c:08:6d:b4:c5:30:5f:11:3b:9b:e9:9c:e1:7a: dc:b0:01:28:ad:07:6f:05:15:42:88:3d:83:4c:1d:f6: 07:18:06:e0:09:c1:33:17:9e:a8:14:8b:50:c7:12:75: 4e:62:71:3b:fa:f2:33:08:a5:d7:7d:47:39:3d:eb:ca: f8:66:8d:b5:e9:8c:04:6b:03:b0:36:6f:aa:ba:9a:bd: 8b:3d:98:71:c9:56:15:68:ce:41:b9:16:04:a7:6b:a0: 70:2c:bd:c6:9f:82:13:2c:87:96:02:90:27:ce:07:6b: 53:e6:73:88:40:fb:69:cc:4b:72:59:80:5f:e0:99:0b Fingerprint (SHA-256): 6B:11:F3:4E:BD:81:5E:14:46:7F:4C:9F:33:00:0B:F8:7E:4F:67:07:DB:EE:0A:D6:69:55:89:53:15:78:B2:97 Fingerprint (SHA1): ED:C0:D7:7A:00:C0:A5:B6:18:39:6A:40:29:08:FB:E8:51:95:57:CC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2696: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #2697: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #2698: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #2699: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #2700: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #2701: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121116 (0x1e67d49c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 12:11:48 2017 Not After : Tue May 10 12:11:48 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:48:b4:01:83:bc:14:a3:01:27:9a:75:ac:69:6f:20: 8e:08:a5:db:73:11:d1:be:31:a7:4a:23:70:95:4b:49: 38:54:05:2a:e8:02:56:fc:7b:12:45:14:b0:e7:b7:bc: 19:a7:75:78:85:8a:c1:34:93:fd:5e:84:99:87:81:54: 6a:ef:14:14:0c:b1:0d:f3:4c:7f:33:f0:11:c4:d3:0d: df:49:a4:b8:2d:7d:d9:89:95:0b:1e:b1:67:91:2f:ef: b1:0b:52:cc:bf:fb:80:4c:b2:35:3b:c0:b8:1f:db:f2: e2:c4:41:53:73:e0:01:fb:bd:26:1e:83:d9:24:47:81: e0:1a:78:96:40:6a:0b:8d:75:18:c8:a5:87:e0:8a:8e: 31:4d:0c:42:2f:7f:54:ac:fc:dc:53:f3:cb:9c:20:25: 7c:21:47:98:0b:76:d0:12:0d:91:db:a5:17:4c:1a:c6: 6b:fc:90:18:4b:83:a4:63:a4:cd:7f:f0:6b:d8:02:e0: 52:ee:8c:27:6a:2c:48:fb:66:a0:fb:1b:7f:18:82:ec: b9:fc:b2:f9:ef:70:78:67:5f:fb:d9:17:5e:9c:36:ad: 68:2d:c2:0f:47:89:b3:0c:26:75:b8:dd:74:10:20:49: 1e:87:84:ae:76:3c:fe:79:84:93:6b:c7:30:0a:c8:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 86:21:76:1a:f8:cc:5e:61:fc:2b:78:3b:d6:e5:d2:2a: b6:7f:f7:71:b8:65:d6:4f:1e:ae:1d:21:c0:c1:4d:43: 53:0f:c5:a9:06:0e:64:52:fe:d3:49:28:55:7f:4a:91: 4e:b5:6d:21:08:8d:07:6a:d9:82:06:20:14:bc:27:1e: 27:57:71:fd:11:56:b3:fa:6c:e9:15:76:ba:77:b9:c1: 57:39:6a:4e:e6:69:f6:07:2c:25:c6:dd:f2:2a:6b:c2: 73:df:87:69:b4:98:37:91:d0:48:a1:7d:0f:84:08:c0: 0e:27:0f:6b:13:14:61:5b:bd:f1:fd:9e:af:7a:05:3e: 3b:61:93:e8:45:c3:21:cc:c4:e2:29:11:bb:44:9c:84: e3:cf:17:d5:1c:f0:4f:55:21:46:a0:88:18:a8:68:44: d8:f9:53:32:62:9d:ad:fd:7b:58:69:d2:2b:bc:f2:db: 9a:b7:bb:74:d7:c5:d5:1e:47:6a:2d:e1:6f:9f:11:2c: 0f:7f:c5:d3:a4:f9:1e:fa:2e:14:84:3e:17:74:a5:58: 2a:99:6e:b3:e7:48:f1:a0:49:ad:f6:5f:ff:8d:37:d0: 2c:2f:63:1c:7a:db:cd:8f:2d:03:15:5b:a0:c7:eb:d6: 65:48:71:f0:8a:99:f6:ec:57:08:3b:84:78:76:bc:1f Fingerprint (SHA-256): 72:AD:70:D3:52:FC:37:6A:68:FC:E8:17:88:7F:77:F7:48:51:56:D9:F7:B4:FE:50:BA:43:FC:01:7D:6E:CF:AD Fingerprint (SHA1): 05:BF:9E:B7:78:C3:0D:EA:7A:D3:E3:F2:45:4A:B3:12:60:35:B3:B1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2702: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121116 (0x1e67d49c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 12:11:48 2017 Not After : Tue May 10 12:11:48 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:48:b4:01:83:bc:14:a3:01:27:9a:75:ac:69:6f:20: 8e:08:a5:db:73:11:d1:be:31:a7:4a:23:70:95:4b:49: 38:54:05:2a:e8:02:56:fc:7b:12:45:14:b0:e7:b7:bc: 19:a7:75:78:85:8a:c1:34:93:fd:5e:84:99:87:81:54: 6a:ef:14:14:0c:b1:0d:f3:4c:7f:33:f0:11:c4:d3:0d: df:49:a4:b8:2d:7d:d9:89:95:0b:1e:b1:67:91:2f:ef: b1:0b:52:cc:bf:fb:80:4c:b2:35:3b:c0:b8:1f:db:f2: e2:c4:41:53:73:e0:01:fb:bd:26:1e:83:d9:24:47:81: e0:1a:78:96:40:6a:0b:8d:75:18:c8:a5:87:e0:8a:8e: 31:4d:0c:42:2f:7f:54:ac:fc:dc:53:f3:cb:9c:20:25: 7c:21:47:98:0b:76:d0:12:0d:91:db:a5:17:4c:1a:c6: 6b:fc:90:18:4b:83:a4:63:a4:cd:7f:f0:6b:d8:02:e0: 52:ee:8c:27:6a:2c:48:fb:66:a0:fb:1b:7f:18:82:ec: b9:fc:b2:f9:ef:70:78:67:5f:fb:d9:17:5e:9c:36:ad: 68:2d:c2:0f:47:89:b3:0c:26:75:b8:dd:74:10:20:49: 1e:87:84:ae:76:3c:fe:79:84:93:6b:c7:30:0a:c8:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 86:21:76:1a:f8:cc:5e:61:fc:2b:78:3b:d6:e5:d2:2a: b6:7f:f7:71:b8:65:d6:4f:1e:ae:1d:21:c0:c1:4d:43: 53:0f:c5:a9:06:0e:64:52:fe:d3:49:28:55:7f:4a:91: 4e:b5:6d:21:08:8d:07:6a:d9:82:06:20:14:bc:27:1e: 27:57:71:fd:11:56:b3:fa:6c:e9:15:76:ba:77:b9:c1: 57:39:6a:4e:e6:69:f6:07:2c:25:c6:dd:f2:2a:6b:c2: 73:df:87:69:b4:98:37:91:d0:48:a1:7d:0f:84:08:c0: 0e:27:0f:6b:13:14:61:5b:bd:f1:fd:9e:af:7a:05:3e: 3b:61:93:e8:45:c3:21:cc:c4:e2:29:11:bb:44:9c:84: e3:cf:17:d5:1c:f0:4f:55:21:46:a0:88:18:a8:68:44: d8:f9:53:32:62:9d:ad:fd:7b:58:69:d2:2b:bc:f2:db: 9a:b7:bb:74:d7:c5:d5:1e:47:6a:2d:e1:6f:9f:11:2c: 0f:7f:c5:d3:a4:f9:1e:fa:2e:14:84:3e:17:74:a5:58: 2a:99:6e:b3:e7:48:f1:a0:49:ad:f6:5f:ff:8d:37:d0: 2c:2f:63:1c:7a:db:cd:8f:2d:03:15:5b:a0:c7:eb:d6: 65:48:71:f0:8a:99:f6:ec:57:08:3b:84:78:76:bc:1f Fingerprint (SHA-256): 72:AD:70:D3:52:FC:37:6A:68:FC:E8:17:88:7F:77:F7:48:51:56:D9:F7:B4:FE:50:BA:43:FC:01:7D:6E:CF:AD Fingerprint (SHA1): 05:BF:9E:B7:78:C3:0D:EA:7A:D3:E3:F2:45:4A:B3:12:60:35:B3:B1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2703: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #2704: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121121 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2705: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #2706: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #2707: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121122 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2708: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #2709: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #2710: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121123 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2711: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #2712: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #2713: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121124 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2714: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #2715: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #2716: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121125 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2717: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #2718: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #2719: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121126 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2720: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #2721: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #2722: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121127 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2723: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #2724: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #2725: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121128 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2726: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #2727: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #2728: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121129 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2729: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #2730: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #2731: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2732: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 510121130 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2733: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2734: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 510121131 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2735: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2736: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 510121132 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2737: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2738: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #2739: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #2740: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2741: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 510121133 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2742: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2743: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 510121134 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2744: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2745: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 510121135 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2746: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2747: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #2748: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #2749: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2750: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 510121136 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2751: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2752: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 510121137 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2753: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2754: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 510121138 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2755: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2756: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #2757: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #2758: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2759: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 510121139 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2760: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2761: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 510121140 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2762: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2763: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 510121141 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2764: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2765: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #2766: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2767: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2768: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 510121142 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2769: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2770: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2771: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2772: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510121143 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2773: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2774: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121121 (0x1e67d4a1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Wed May 10 12:11:58 2017 Not After : Tue May 10 12:11:58 2067 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:93:f1:c7:f2:7b:e0:5d:25:e1:0c:0a:53:fa:42:4a: 9d:a4:a9:95:d9:fb:6f:e0:fa:04:6b:1f:7e:42:50:da: 4b:2d:91:25:57:07:1b:5d:f2:f8:c9:21:89:f3:d5:9d: e6:a2:2b:9c:13:fd:91:16:89:c9:56:2d:77:69:86:76: 0e:c8:50:31:51:5a:83:a9:53:22:a7:2d:7d:9a:c0:be: 00:da:c0:0b:b5:0b:26:f9:76:39:97:58:32:27:50:d3: 62:7d:16:06:a9:60:bc:01:95:f0:fc:bc:3e:1e:ea:68: 4f:d5:6c:f6:ad:3b:d5:0a:c2:66:f7:d6:f8:77:0d:7d: 66:8e:33:a3:7e:4e:81:3b:2a:90:6e:1b:86:1c:17:ca: fd:09:72:bd:4c:78:b3:69:c5:9c:c0:e1:47:81:e9:f4: 20:bf:a2:1f:0e:8c:15:6f:45:20:1a:e2:c4:b2:2e:78: 1b:7c:1a:d7:9a:8a:1c:a7:4c:35:6f:5d:74:48:6d:67: e6:e6:84:63:0e:f4:97:5b:69:40:6b:67:00:8b:9b:af: a9:62:5c:12:2d:8d:72:ea:ab:e0:c3:b7:39:55:79:74: eb:2d:d5:5a:30:f5:55:6f:34:45:3f:97:43:47:50:86: fa:7f:2a:82:e7:87:95:8a:a5:c2:12:94:db:00:64:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:38:18:08:33:2f:c9:dd:e9:90:fc:2c:21:a7:b0:ff: 5f:6d:a0:f4:91:7f:78:c5:03:bd:94:e5:bf:16:66:34: d2:4d:06:46:9d:11:0d:00:cb:bc:ae:19:55:50:59:3b: 3f:72:21:0e:e5:65:c0:81:21:75:8b:23:8b:38:d8:7d: f0:c1:b7:8f:72:1d:db:94:35:09:f9:c1:69:4b:96:4c: fa:d4:fc:4b:73:82:37:ef:e9:04:6b:73:10:78:7f:58: 2f:7c:1a:70:fe:41:a9:7f:9b:51:57:42:b0:ca:18:8e: d5:7d:d5:2c:bb:e3:9c:08:3c:13:da:54:93:e7:c5:55: eb:81:ca:90:6f:7d:1a:1a:9b:7b:87:cf:46:d5:4b:32: ba:93:15:eb:7c:84:40:ad:e4:fd:39:ba:31:89:c1:83: c2:8b:a4:bd:bc:1d:28:b9:30:5e:ce:20:52:d2:68:da: 59:19:c7:9a:95:2e:47:64:78:6b:99:78:ae:7b:cb:80: 04:a0:4c:d6:cf:8f:64:2d:5e:cc:e8:30:5a:9c:db:6f: c6:70:56:ad:5e:82:98:84:3c:1e:8b:a4:20:2f:10:d1: a4:dd:9b:28:16:ad:65:f0:ba:55:67:45:f8:09:e1:39: 61:e4:9f:cd:86:37:a0:19:74:7e:89:d8:5a:8e:1b:c0 Fingerprint (SHA-256): 6B:47:88:6C:E2:C1:5D:8F:6D:34:D1:08:84:84:41:18:E2:EF:51:45:F2:F2:F5:29:DF:CB:B5:C6:C6:F0:44:A0 Fingerprint (SHA1): 7C:BF:93:B3:CB:A9:8B:CD:6F:F3:C8:19:D4:16:DD:52:B5:76:7B:D0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #2775: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121122 (0x1e67d4a2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Wed May 10 12:11:59 2017 Not After : Tue May 10 12:11:59 2067 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f2:09:be:c5:78:86:b7:1a:80:0a:d6:60:87:96:a1:2d: 98:42:99:4b:53:a6:e9:bc:b2:3c:7d:e7:1d:10:42:57: 08:e2:06:f1:75:b9:d3:b5:fa:5e:01:3e:9c:a1:7d:4b: 63:e7:34:69:0b:da:f7:93:32:b6:9f:9a:68:a4:b7:6d: 93:01:09:a3:fd:fa:a4:10:04:8d:86:18:76:30:01:ef: 9d:9a:a3:94:ff:e5:cc:c0:1f:d7:7c:36:25:d0:d9:8d: f5:00:0d:be:db:b0:95:29:42:13:82:15:eb:a3:cc:71: 2f:0a:12:05:72:f6:c7:55:2f:a3:fd:44:8c:4c:9e:c8: ba:f9:34:0f:11:05:00:ce:43:3b:48:43:e7:41:9a:10: 38:56:32:01:8b:4d:e0:68:83:90:2e:50:a5:65:f1:80: 7b:df:39:e9:b6:08:02:d8:be:5f:03:b5:86:32:09:94: 4f:14:f6:a7:03:77:46:4b:09:c0:fc:4d:e4:63:6e:48: f3:50:95:17:84:35:62:52:d3:6a:ad:74:0f:65:19:39: 89:9e:ae:be:d3:95:26:16:74:64:48:12:93:1a:f9:25: 12:c0:9e:f7:af:d4:a3:21:af:d7:2e:74:07:66:d3:61: 29:5e:73:bc:fb:9f:8e:7f:df:a6:51:21:17:88:a5:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d7:bd:fb:d2:0f:4b:01:ed:f1:fc:48:7c:af:4a:eb:41: d4:13:f8:30:7d:3d:66:b5:f3:cb:27:d9:9b:29:a5:73: a9:a6:8e:af:56:3e:93:a9:09:75:d3:0b:c4:b2:fe:37: bc:ea:97:eb:3e:1f:f2:67:99:39:64:01:95:85:fb:88: 70:a4:ab:8f:93:cf:d0:e5:85:84:e2:78:cf:5d:d5:9a: 2f:33:ff:98:15:99:a6:2b:ed:57:3a:6b:5c:b7:2c:c7: c7:f4:08:4b:fd:fb:7a:1a:5d:04:03:38:d2:a9:d7:6b: 7b:ef:cb:89:f6:74:2a:e6:2b:90:17:ff:5e:ef:ae:05: 8e:1f:0f:80:67:12:bd:e9:03:8b:05:3b:4b:33:a1:6c: 39:02:1c:05:d9:58:2b:91:4e:b7:d4:6c:e7:f4:b8:86: 6b:d1:b2:e2:f2:37:24:af:5a:30:29:6c:20:87:68:ad: 37:10:14:59:a2:e1:dd:30:b0:ce:7d:02:e5:62:61:b8: 98:c8:3e:96:45:9a:58:e4:56:2e:75:71:9f:ee:57:ba: 42:7b:df:15:f4:bb:92:b1:c4:ac:72:7c:9f:60:90:d5: 03:a6:a1:5e:16:ab:b8:3a:71:f4:17:74:f7:aa:6d:b5: 0f:fc:ff:8e:87:af:74:46:f3:33:b5:1b:e5:6e:06:b2 Fingerprint (SHA-256): DC:32:8A:7A:E9:17:E2:13:D3:93:B6:9E:FC:D5:34:1D:8A:3D:9E:DE:BC:A8:77:26:35:1B:FC:AF:AC:A8:4D:DC Fingerprint (SHA1): CD:70:F7:C8:36:13:E2:21:72:62:87:28:3E:42:B0:27:E7:54:5E:23 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #2776: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121123 (0x1e67d4a3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Wed May 10 12:12:01 2017 Not After : Tue May 10 12:12:01 2067 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:99:e2:de:1b:4c:4c:d5:3a:b8:04:b4:f7:62:4e:5f: db:9a:90:52:5d:dd:cc:82:ac:32:c7:00:cb:4b:1b:de: 57:ec:71:de:4d:00:a7:47:90:dd:b5:bc:2c:34:3f:61: fd:aa:bf:f0:64:e7:fa:28:f9:d5:06:19:40:55:97:22: 96:5d:d3:49:e9:42:b7:39:77:09:26:69:fc:0f:7d:0c: 39:5e:16:36:27:1c:22:71:aa:c2:6c:79:ad:ed:5c:fb: 99:d9:50:99:91:2a:e3:b9:6d:98:cc:76:6f:8b:72:29: da:4c:57:a7:e4:dc:bb:3a:d7:6f:3c:e7:c0:94:53:2c: 4a:54:d5:33:5a:26:37:0d:a0:36:6c:33:06:20:2f:5d: 62:9b:c5:93:c7:bf:35:6a:58:9e:1b:61:e4:c7:b4:88: cb:0a:27:ba:31:7a:93:fc:e7:0a:0d:6a:8d:6d:9a:e8: 54:28:bf:91:aa:11:d8:4f:30:6d:b8:95:3a:6d:0f:10: 30:23:3e:a4:49:5c:cf:fc:66:79:ba:52:cc:d0:6b:4e: 11:74:0f:61:9f:ee:c5:d9:86:00:f4:58:e8:20:0b:5a: b0:f1:0d:63:37:d7:16:ba:4f:0f:e8:94:5f:51:5a:2f: 5f:53:f1:50:da:3a:a0:d5:e0:70:69:a4:52:5f:7a:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:66:7c:29:d2:b8:32:7f:b0:0a:c1:b4:c9:93:40:a5: 13:d0:6c:93:09:8f:47:69:f3:73:3c:85:68:83:29:02: 7c:7c:c1:7f:79:75:5c:97:0a:62:36:bd:29:a8:44:d4: e4:bd:7b:38:3a:72:18:55:08:cb:43:74:46:ae:ed:0f: 47:7f:ed:55:e5:46:c4:60:71:b0:da:97:aa:30:ab:b4: 1d:89:0b:ec:95:67:13:a1:f4:c8:76:37:5f:a3:b3:c8: 60:e2:7d:0e:76:d5:ba:2b:28:64:ef:7e:a1:11:82:ab: 5c:bd:ff:0d:22:fb:14:23:f4:d3:55:d1:5c:a3:34:23: 09:32:f0:72:2d:c7:ff:ab:01:c2:12:67:7a:63:90:a1: 12:5c:1d:5e:ca:c3:d7:e2:14:1d:46:dc:6a:19:ae:21: 08:c2:2f:7c:ad:aa:28:6f:c6:b0:8c:01:18:44:fb:67: 8a:01:4b:5a:50:f4:de:ff:89:5d:c6:b3:c9:97:c6:29: 6e:6c:f6:c6:53:9d:6e:c9:2b:92:0c:d6:85:20:c3:88: 7c:75:2b:0a:46:de:5f:e1:06:c3:4b:05:6c:07:52:c7: cd:5c:e2:e2:2a:36:b3:6e:1b:e5:46:2f:41:49:22:23: ca:11:e2:7f:6a:36:fe:12:5b:25:b1:94:e4:78:ce:b1 Fingerprint (SHA-256): 11:5C:56:BD:2D:D5:40:9D:F8:E8:E1:00:7C:1A:A0:15:AB:30:33:97:8F:57:35:67:1E:91:9F:31:CE:DE:73:31 Fingerprint (SHA1): 51:E8:61:CC:E9:04:1D:5F:23:B3:8C:DA:0F:E5:C9:E5:73:EB:08:7E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #2777: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121124 (0x1e67d4a4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Wed May 10 12:12:02 2017 Not After : Tue May 10 12:12:02 2067 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:c8:44:a9:0e:6d:90:38:47:e2:c4:7b:f0:31:b6:ce: 0f:61:01:22:c2:de:3f:3d:28:f5:4c:d1:62:1d:e2:fa: 2f:4b:5b:fb:02:65:e7:ff:22:48:1a:09:78:88:cd:ed: 36:78:c9:24:83:f7:1f:7d:f3:fc:a1:96:d9:63:9a:a9: 45:cb:68:12:24:b5:b6:66:c8:15:72:20:01:be:df:ec: 1d:a4:94:af:3b:b7:5c:7f:7c:18:0b:e1:2a:58:66:9b: fc:c3:36:b7:af:1e:78:a1:b6:3d:9d:bf:8f:1b:28:07: a4:21:50:cd:7e:f5:33:91:22:71:f9:ed:61:a4:ea:91: fa:74:d7:ed:a5:ac:ed:c0:a6:37:63:35:8b:e4:d8:5b: 0e:d3:0d:e3:ac:66:94:ed:5a:81:03:f1:19:eb:59:93: 9a:6d:5f:e0:80:3b:a8:ac:f8:74:90:0e:40:e0:53:9e: a4:b3:5b:aa:e0:4b:4f:9c:9e:8e:1e:48:c9:ed:0b:87: a9:4a:56:ab:e0:f1:17:b1:3c:7f:d7:cf:4b:ab:5e:04: 73:1e:66:c7:c1:50:d0:a9:24:7d:e2:12:49:63:2d:4f: 9f:5a:ed:da:16:67:d1:81:51:8a:6b:48:a4:f4:fe:0f: cf:97:a3:96:0f:ae:bc:5c:49:c9:8b:ad:e5:73:02:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:51:56:f4:f5:5e:cb:4b:e4:e9:11:ff:f9:5f:c1:b1: bf:7b:eb:e4:70:00:34:65:cb:c0:2a:2f:34:c2:89:a6: 18:de:2b:38:5c:dd:ca:2f:52:0e:9d:26:c1:68:db:f0: 02:a6:5b:a5:55:4e:cd:76:02:0a:8f:45:ff:68:fb:71: 5e:59:d3:60:38:e6:31:a4:13:2b:47:06:85:55:32:8b: 3b:6a:9b:b7:dd:f6:11:64:07:42:d9:56:86:5b:86:f1: d8:dd:fc:b3:11:d2:3c:0b:25:a4:39:0c:26:b4:dd:fc: 64:b2:08:c9:ba:94:e8:ce:c5:df:ca:a0:22:5b:21:69: 4d:cf:0c:00:d9:53:15:eb:37:c4:04:fe:09:ca:72:e1: 2b:14:2c:3e:6b:ca:c4:c4:cf:54:ae:af:0a:67:cb:27: 3a:22:19:c3:57:a7:2c:1a:4e:5b:1c:dc:5d:52:1e:a8: 4d:01:aa:40:a3:2d:09:4d:93:01:09:1c:46:87:53:03: 67:ed:9d:c1:31:af:81:a8:1d:46:49:fd:cb:c2:87:9d: e2:8e:29:a2:ff:fe:91:df:44:2e:de:2b:5b:21:7c:7e: 7e:f7:e2:7d:4c:7a:0e:96:95:d9:41:04:a3:0b:f9:ca: 1b:39:52:62:2a:08:5d:f2:d5:65:e4:91:48:2d:ea:7b Fingerprint (SHA-256): D5:5A:72:9C:BD:BA:05:0A:37:64:63:BD:79:4D:D9:79:4B:8C:CC:D4:60:1E:88:76:A8:A5:A3:1D:AB:92:96:35 Fingerprint (SHA1): C2:E9:7E:F1:2B:FD:FD:2C:96:F4:96:00:A9:42:48:9B:D6:BE:3D:D2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #2778: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121125 (0x1e67d4a5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Wed May 10 12:12:02 2017 Not After : Tue May 10 12:12:02 2067 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:e0:a1:74:6f:94:9e:9c:07:8f:dd:91:fe:2c:a8:4c: 39:c0:95:58:89:d0:dd:e4:b7:b8:80:84:f4:10:e1:6e: e8:f6:47:19:43:7a:3b:cc:62:3d:c0:74:cc:f7:b0:9b: 48:74:12:4b:d3:34:aa:45:72:25:21:52:4c:f4:d9:2e: 55:f4:f4:0d:1d:69:fc:85:eb:4c:c3:e4:bc:6c:70:90: a9:0c:ab:ed:d6:fa:2c:9e:ce:92:d4:55:7b:f9:8d:b7: 40:85:f0:4c:90:62:ce:a1:be:69:8c:73:e5:3c:69:78: e7:30:f6:41:d3:b1:45:fc:ad:94:7d:07:57:eb:0a:11: c8:43:90:29:03:c1:93:08:de:9b:10:e4:a7:f7:a3:c3: a3:18:24:3b:d6:58:a8:23:59:8b:e5:52:c5:4a:33:e4: 11:c8:b5:65:68:a9:b6:bd:39:0e:22:14:51:75:a8:66: ff:5e:25:a5:95:6a:ad:29:45:52:24:b6:7f:4c:14:7c: 15:d8:85:6d:20:6d:d5:cc:d5:60:97:51:97:86:b5:8c: b2:0a:c1:95:96:df:bd:e8:36:61:52:28:33:29:87:0d: 84:c0:61:46:0a:3f:22:aa:a6:1c:1b:b9:ff:7f:84:33: b0:88:0e:ce:f4:c9:a8:f8:2a:40:23:da:e8:18:65:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b8:62:c6:0f:6b:86:74:6d:24:3a:d0:ff:1a:e2:e6:7d: ec:0d:12:14:2d:ed:0b:6c:ed:9d:ab:bb:b3:04:2d:40: 8f:af:fa:94:92:88:37:99:1a:3d:da:45:52:6f:4b:da: 16:f0:ff:8c:02:ec:8f:0e:52:ad:10:76:45:c0:7d:8c: ca:71:3e:46:9f:70:7d:0b:c9:d2:e2:3a:c8:94:8f:4a: 5d:52:63:4b:c7:13:11:bc:45:2d:12:59:c1:eb:95:3b: b4:1c:de:06:02:df:11:3c:b6:b5:c0:89:78:fe:00:c2: 84:95:d7:e1:fc:e3:91:55:80:b2:72:af:83:eb:69:92: f6:b0:60:c6:fb:af:85:6d:a6:9f:2d:a3:f6:8e:73:5d: 97:63:bd:1c:96:4f:2d:da:4c:3b:6c:83:d3:77:03:ad: a5:7c:c2:67:18:75:ad:f8:b0:85:e6:e7:b9:b0:f3:e5: 43:d7:81:a0:c0:9c:ce:7c:cf:94:f8:7b:31:68:ad:dd: b5:71:fa:1a:92:35:be:0f:cb:9e:9a:73:d7:ea:d3:48: 4d:72:98:93:5d:72:53:f4:63:cf:15:6d:a7:ea:2b:de: e3:58:32:06:6c:4f:b0:12:02:e4:1c:f4:b9:4b:b4:2e: 69:f4:ea:6a:e3:6f:72:f4:1c:a8:85:5a:e0:ee:ee:35 Fingerprint (SHA-256): 93:4A:3C:25:F1:33:B9:72:79:87:C7:3D:30:C4:B3:12:A1:F1:96:D8:B3:9B:7A:D5:8A:B8:64:DA:B6:4F:18:B9 Fingerprint (SHA1): 28:95:F9:48:69:46:87:42:B7:67:A5:85:F3:07:F9:7C:58:55:FC:11 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #2779: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121126 (0x1e67d4a6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Wed May 10 12:12:04 2017 Not After : Tue May 10 12:12:04 2067 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:d4:c9:1d:fd:e3:ad:a3:b0:64:b5:4c:82:c5:d3:0a: 40:6f:22:80:1b:9e:7f:0e:a8:64:3f:d6:77:18:c0:43: e0:56:9e:ad:8e:95:00:41:69:f0:52:b3:74:b2:d7:cc: 8c:ca:42:f7:a3:46:a8:2e:29:22:f4:ad:7b:57:2a:d9: aa:86:fb:ab:73:69:d3:c9:01:ac:3a:4f:21:1e:0a:21: 2d:e9:70:b5:41:af:96:a2:b9:4d:ec:de:2f:2f:d5:57: 5b:61:e1:4d:1d:e9:98:83:73:76:26:2d:5e:01:17:d7: ad:07:a6:54:7f:6e:28:2e:0d:d1:ea:b5:ca:8c:fd:04: 91:f5:28:ca:bb:bf:69:7d:52:a3:5a:46:11:cf:38:ce: 8a:50:e4:90:d0:d3:09:11:53:5e:46:74:5e:da:89:8b: 10:5e:dc:e5:cf:eb:39:04:5d:04:b0:8d:9c:9c:58:74: 8f:c8:dc:83:ec:0e:f8:ab:84:25:cc:ad:e1:02:3a:f3: b6:44:71:ad:53:c9:92:9c:bf:0f:d9:f6:be:07:b3:a2: 1c:11:b0:78:a5:70:e5:5d:23:07:94:31:a4:60:f7:e2: 42:14:74:ee:ae:21:6f:4a:3f:c9:01:bf:ac:8b:0b:7d: c1:38:c9:3b:f8:db:12:bb:20:57:09:95:f1:b5:3c:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 17:a2:04:8b:b4:3e:21:f7:71:d5:82:35:8d:f3:03:b8: dc:20:12:50:0f:98:5f:e9:64:a2:c7:51:e6:05:55:4f: 11:92:60:3d:ed:30:1c:e9:46:bc:34:87:37:17:9b:02: 0d:a2:c4:70:87:4d:de:50:af:00:e5:a2:f0:7c:24:76: bd:a8:5d:7d:6c:42:4f:3c:68:4d:35:bb:4b:df:6a:1b: 55:02:cb:30:e1:69:c6:cf:8d:53:45:27:b6:38:9a:0e: 8e:cc:d1:23:af:30:6f:ea:bb:6f:77:6b:ce:c7:7f:b9: 92:1e:92:1e:76:7c:24:d6:3c:08:4e:24:0e:d9:70:9d: aa:6f:04:0d:c2:44:c3:bd:a0:af:4e:ce:46:72:62:8e: c6:00:71:02:c0:a9:0e:8f:9e:0c:89:f7:8d:d5:d3:ae: 68:cf:0f:73:5e:c8:b5:d8:7e:f4:44:fa:ff:ec:3f:85: b9:a8:35:03:08:b8:b7:21:d0:80:a0:b1:7a:17:4f:50: df:c7:3f:26:b6:6c:03:6d:e4:81:83:e9:07:e2:ff:c0: 9b:f2:6d:8c:2c:d8:7a:67:90:3c:a9:f4:08:84:45:da: 14:f6:af:74:96:70:d2:3b:9a:dc:eb:54:2c:e4:bf:ce: c3:08:a5:30:5c:c4:c7:97:a3:1a:97:32:bf:02:ae:86 Fingerprint (SHA-256): 9C:E1:28:FF:CA:71:14:C8:DF:49:6F:B2:DB:D5:B2:30:F6:2B:F8:39:20:4F:46:53:8B:57:70:5C:4E:7A:C6:32 Fingerprint (SHA1): 32:40:C5:48:3B:96:9E:EF:95:86:D3:58:DB:76:18:7D:04:F4:DF:23 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #2780: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121127 (0x1e67d4a7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Wed May 10 12:12:04 2017 Not After : Tue May 10 12:12:04 2067 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:ea:69:f2:38:58:b2:dc:fc:d6:a3:c4:84:ca:b5:66: 10:d4:6f:74:0c:00:76:08:0b:e3:a5:27:65:47:6d:5f: 3b:04:0e:dc:c9:5e:f4:98:f3:1a:d4:02:56:1e:75:fb: 45:48:40:28:b6:b9:7e:78:bb:f7:70:45:29:10:89:11: b8:3e:c0:9d:f6:61:dc:5d:43:55:2a:10:e7:ac:1a:6e: 5e:62:87:cf:6b:8f:ca:17:ef:2c:43:99:63:0b:81:45: 4e:60:e0:dc:74:8c:b1:7a:24:01:f3:2a:ed:b4:27:84: d3:40:68:1c:6a:cc:ae:13:14:7e:f8:4b:66:50:7f:08: b4:9d:94:c9:6c:14:f8:85:8a:86:11:00:9a:11:24:06: 25:55:38:ca:34:a0:69:2e:4a:0b:dd:90:69:a9:10:44: 2d:5d:4b:d6:fa:03:13:d5:0c:f2:5b:56:70:50:d8:4f: ab:82:9c:b9:65:7c:af:9d:ce:1b:f5:56:3c:d7:35:3a: c3:ea:cb:e6:99:35:6b:10:e3:77:c5:e1:2b:66:55:ee: e8:e1:bd:69:08:bc:7f:4b:01:ad:46:ce:a4:19:cb:fe: ef:79:60:69:da:38:a1:78:b1:94:89:31:7c:18:84:e9: fb:f3:9f:2c:41:4c:7c:5d:7a:1a:fc:34:bd:8f:9e:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:25:9f:bc:cf:50:b7:ca:24:d3:b4:0b:88:92:44:44: ed:80:0e:50:34:4a:f4:7e:6b:2b:24:b2:1c:d9:d3:39: 71:20:f5:5f:41:60:2b:79:7a:10:fc:8d:d8:b6:04:d7: b5:b2:c0:e2:2c:69:8b:2f:df:0b:0b:b7:87:89:82:0d: bc:3f:12:68:96:8d:b6:0c:dd:fd:15:7c:66:f2:5f:87: 05:44:66:ae:5c:ef:83:28:1a:1e:1d:ab:dd:e4:cf:ed: 7b:7a:15:a6:31:1e:8d:c7:37:09:44:c8:c7:7c:54:73: 65:ee:65:73:ec:c8:58:8a:db:b8:f6:6b:8c:88:12:43: 0a:e9:e3:80:2e:fd:af:c6:3c:38:09:ff:8f:4d:30:46: 7a:a7:18:e6:67:97:1f:31:92:d1:3b:c8:36:de:28:57: e5:14:e4:a3:ac:7a:7f:43:46:27:e6:82:9a:7e:8e:ea: bc:52:8a:2e:94:53:0c:a2:c4:b1:f1:e0:e3:98:32:1d: bb:85:67:6c:c3:0e:ad:7f:0b:60:c5:dc:48:4b:8a:31: 3d:eb:0c:4e:bf:cd:05:ce:89:5f:e9:a8:0a:8e:db:4f: 28:94:c9:80:6e:ae:9c:b6:0e:25:96:bd:15:ca:5c:8f: 3d:77:e5:7b:8e:a9:13:7d:8b:01:4e:fb:63:4a:4f:63 Fingerprint (SHA-256): AD:9B:F5:9C:6B:BC:21:24:A8:77:CE:75:82:76:69:3F:03:30:EB:5F:49:18:CA:33:04:27:CD:B2:BF:EB:D3:AD Fingerprint (SHA1): 88:FB:3A:B8:34:B4:F3:1A:52:2C:65:08:7C:28:29:2F:C6:4B:7B:9A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #2781: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121128 (0x1e67d4a8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Wed May 10 12:12:07 2017 Not After : Tue May 10 12:12:07 2067 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:eb:55:bd:b3:fb:d8:55:26:bc:5c:e0:80:c0:00:94: 5a:08:10:4c:e9:de:8d:f7:47:2d:93:db:5a:fb:ea:79: 48:21:09:27:57:1d:b6:cf:d1:df:da:41:60:75:54:96: 7d:69:7c:eb:65:bc:4a:1d:5f:6d:21:9c:3f:53:81:aa: b8:05:a1:6d:3e:55:c2:a9:c9:c0:de:7f:6a:f8:03:11: 33:89:cf:7a:c4:17:e5:db:29:79:03:c9:26:63:98:08: 9b:62:5a:1b:f0:f6:2f:6a:a2:90:a0:9a:79:4e:0e:0f: 02:da:a0:ce:6c:d8:dd:9c:09:d7:97:4c:be:87:7b:c8: 25:f1:13:84:22:dc:bd:61:b3:e7:1c:88:5b:0d:0f:a8: c7:73:7e:4e:e6:be:82:06:20:a7:51:d6:c5:9c:63:83: 66:16:38:09:d5:0f:69:2b:38:24:d6:a5:0c:23:80:82: 75:cc:8c:bb:a0:39:56:29:5b:1f:fd:4c:d3:df:e1:9d: 54:c3:6c:66:ae:04:9a:43:59:13:7e:37:b1:0b:65:7a: 37:af:d0:ae:a6:ed:6b:96:08:cd:36:e4:27:6e:84:aa: bc:14:ee:7e:b1:68:f7:81:8f:f2:96:93:6f:76:c1:20: f8:07:b1:55:f5:b8:3f:df:23:35:d8:d8:8b:41:6f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ad:3e:bb:72:08:07:b4:1b:ef:a8:2a:5f:29:d4:ea:69: 21:8a:9b:e8:fe:18:b5:99:15:81:c7:85:46:14:cd:5d: b9:86:9c:9f:f2:d0:73:d1:51:1a:86:25:e4:c2:6a:bf: b9:ab:91:34:ef:08:ea:0f:b9:b0:dd:4a:66:73:e1:7d: b1:89:aa:8b:16:e3:b8:dc:8b:da:61:f7:00:45:96:46: 87:3e:2a:4d:8e:5f:80:12:cb:9e:f7:79:c4:cb:0e:4d: 1d:e5:46:05:05:0a:91:85:c0:4d:f1:6a:ee:d1:62:1d: 6a:c1:06:8f:4c:c5:d6:b1:d7:82:95:bb:b8:eb:5c:2f: a1:b0:12:64:0f:99:ad:0d:96:d9:bb:d0:36:cf:74:a5: f9:43:2a:ae:24:81:8d:7a:36:18:89:0a:59:dd:44:b3: 37:df:dd:41:f9:1e:f3:c1:20:ae:9d:a6:e6:9f:59:2e: 16:6d:4f:9c:6d:31:91:85:25:a1:36:21:6b:38:38:38: bc:f2:01:8b:5f:e4:c4:94:d7:2c:c5:09:3c:15:a2:09: ea:2c:1a:42:9f:c8:dc:d4:8b:06:94:83:1f:bf:1c:be: 35:53:c6:71:5b:0c:02:24:5f:05:94:23:f4:de:25:db: de:1f:64:d7:dc:92:45:5f:5d:12:d0:ba:08:3e:6d:f0 Fingerprint (SHA-256): 4E:5D:B2:B6:D3:EA:C1:1D:D3:A6:84:D1:1E:04:12:7C:BA:E9:99:6B:2D:1C:AD:99:C1:D5:3D:73:87:A9:47:DC Fingerprint (SHA1): 27:37:4F:43:7B:35:E8:F2:A6:FA:D0:4B:D7:0F:53:81:92:AE:B5:10 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #2782: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121129 (0x1e67d4a9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Wed May 10 12:12:08 2017 Not After : Tue May 10 12:12:08 2067 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:0d:63:28:f0:36:db:cf:91:29:32:b3:1e:11:35:e2: 49:bc:41:0c:7a:b6:43:ff:f8:38:c6:94:fe:b0:0e:63: b6:33:ea:03:11:27:93:d1:cf:a0:a9:c6:63:35:78:ec: 11:2c:cc:43:6c:1b:c3:17:f0:a5:b7:67:9b:a7:88:86: 4c:f5:ed:d1:42:46:a6:4d:eb:fa:37:b4:11:63:25:5a: c7:d2:41:7b:e4:86:8e:4d:d6:f1:e5:fc:d6:35:48:5d: 0f:ad:fc:a0:8a:5a:69:56:bc:c9:be:d3:70:03:ca:1b: 9e:ad:5d:62:83:cb:d7:64:ab:cf:4a:6a:7a:ca:2e:93: b7:01:8f:97:82:6e:74:4d:a9:44:af:0c:c8:60:98:ac: 5b:d2:1c:fa:d6:85:c6:09:43:67:6a:07:52:c5:21:8b: 2c:ea:d4:b1:7a:83:99:6f:cf:ab:c5:22:b7:ba:bf:cd: 3e:2f:bd:77:2b:35:23:69:5b:cc:f3:86:e7:bb:51:0d: 36:c8:6c:1d:42:dd:af:aa:8f:b2:4f:bd:27:56:61:1d: 8e:1f:91:95:20:19:6b:5e:f5:e1:2d:c5:8f:33:30:33: 44:4d:e8:ec:35:68:ce:34:89:00:1d:70:cb:15:c0:3a: 6c:e9:e0:66:9d:c1:01:c5:e9:da:1c:f3:1d:6c:6a:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:40:35:63:2a:3c:09:33:39:5f:8b:60:a3:b7:bd:4c: 72:82:17:0f:72:d8:58:77:01:0e:08:9e:7b:7e:bb:05: 6e:bb:a0:ca:18:00:f9:ea:ea:25:42:dd:04:f9:ac:6d: de:96:e3:6f:b2:22:16:01:6a:68:69:11:70:af:2a:5c: 7b:2c:e7:11:a3:11:a0:5b:5a:52:c6:49:36:7b:10:44: 47:8b:03:15:62:9d:36:ab:01:22:c0:8b:01:09:74:55: f9:c8:33:87:7d:23:aa:f6:54:7d:bc:fe:4c:84:c3:bc: f9:a8:22:bc:dc:bc:59:05:f1:18:97:66:a9:19:f0:f4: 8c:44:ff:a5:22:53:a2:b4:a3:ac:f3:1f:d8:25:9a:e8: 81:d7:39:0b:40:48:87:4b:78:f5:ed:74:f8:85:8e:f7: 96:05:4e:a9:b0:86:c0:ed:bb:86:49:b7:60:a7:7e:ef: 1b:5c:86:87:66:2f:34:4b:80:72:f4:b3:22:97:65:28: 5b:15:39:70:71:c5:5e:c6:76:27:87:5b:ef:81:29:09: f9:d7:b9:45:91:3a:2a:3a:ad:24:5d:d0:92:14:c8:f3: 36:25:70:7b:bc:f2:7f:ba:21:b9:9e:f2:82:29:97:36: 0b:d8:90:d7:ad:8d:c3:f1:a1:94:7d:d7:5d:68:51:05 Fingerprint (SHA-256): F8:36:EA:15:D0:60:69:99:DD:C2:2B:56:15:DD:47:47:78:60:FD:A9:72:A7:F0:DD:42:E1:E7:32:09:C9:00:F3 Fingerprint (SHA1): EF:5F:6B:A6:83:EB:39:23:60:C6:9F:0F:35:E4:75:D8:7A:88:66:06 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #2783: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2784: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121144 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2785: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2786: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2787: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2788: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510121145 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2789: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2790: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2791: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2792: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510121146 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2793: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2794: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #2795: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2796: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 510121147 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2797: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2798: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2799: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121144 (0x1e67d4b8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:12:19 2017 Not After : Tue May 10 12:12:19 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:4b:d2:f6:3a:73:80:df:0a:69:85:fd:6c:2d:f5:88: 8f:73:c1:30:dc:f8:39:71:ac:9d:7f:38:6f:a4:d9:a3: ba:3d:54:bd:00:76:5e:c9:31:e7:87:21:a9:78:9a:47: a6:d1:30:e5:47:df:68:d0:ad:79:5d:2d:8d:86:4d:71: 9c:f1:67:45:1d:91:08:aa:66:a6:6f:06:4a:c7:25:5b: 4a:36:4e:52:73:82:04:35:5d:0b:f8:2b:96:42:da:89: dd:85:99:99:bf:cf:19:b2:3d:8c:f9:e0:fd:b5:34:19: d5:8d:c4:77:04:1c:91:cd:ba:96:fa:47:d7:e0:47:df: 0f:b3:0e:64:70:a2:42:04:39:0e:4d:ba:54:99:af:5e: e9:33:52:fa:98:d1:40:06:f9:05:41:86:a0:59:61:d1: fc:2d:8d:8a:8f:25:d4:cd:70:c6:78:2c:f6:85:fd:9a: e7:f8:f3:fc:a6:a0:0b:ac:c2:50:6e:6d:01:d6:c0:33: de:06:02:55:5f:f5:8d:50:bb:b5:d1:25:62:f0:6a:d6: a6:ee:a4:70:6d:70:c4:e7:84:94:85:84:93:bc:51:bf: d5:53:2c:28:68:99:bb:01:f3:09:83:7a:94:07:75:45: 60:28:b7:4e:83:50:20:35:60:08:12:32:5e:4e:2a:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:f4:46:e9:95:d3:4a:71:13:81:92:58:4a:00:bf:49: d7:e9:66:74:ca:0a:76:2e:ef:c6:7a:ed:52:23:33:87: f6:45:c0:26:e4:07:33:7c:f9:fc:ce:e2:b7:62:ee:e7: 04:eb:d0:41:3e:91:44:e9:35:bc:62:03:0d:cc:c5:96: 4d:a1:b0:c0:95:7e:a3:e0:6b:62:37:12:25:92:b1:e8: 3a:4c:73:6e:6f:ef:c7:88:61:78:81:45:34:10:00:35: f6:77:99:bb:b8:68:39:1a:80:de:7f:d7:7c:75:e3:79: a9:9a:0d:c2:f3:b7:a5:11:36:29:7d:14:03:32:40:0f: b1:b5:94:af:33:03:67:8f:66:60:a6:00:17:47:19:c7: cb:6b:71:0c:66:4c:01:11:99:47:38:9a:f9:d1:d9:0a: a4:6b:fa:f5:d8:d2:fd:c0:73:11:18:f3:5d:13:fa:f7: 5b:7d:8d:68:70:40:01:07:2a:29:4b:86:66:b9:82:46: 3c:e0:68:e6:bb:fb:de:98:8d:27:81:52:f5:71:c7:99: 17:a6:40:3d:91:64:a2:31:7a:79:81:41:1a:45:d0:c6: c0:ec:30:fd:d9:1c:35:de:33:11:b1:02:80:d3:91:2f: f2:14:54:44:ac:59:21:4e:50:bd:28:53:07:68:c7:07 Fingerprint (SHA-256): 08:C8:1D:29:C0:96:67:51:B2:F2:3C:54:55:4F:34:01:C5:FA:65:F1:D1:D9:38:8E:14:C4:03:44:55:CA:E8:BD Fingerprint (SHA1): FD:85:C2:1F:9C:F3:16:26:1B:CC:56:EA:27:BC:75:27:CC:81:A3:11 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2800: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2801: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121145 (0x1e67d4b9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:12:20 2017 Not After : Tue May 10 12:12:20 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:fa:4a:0a:ce:ec:48:e2:6c:e4:67:35:3b:95:08:a1: aa:93:e7:c7:ca:1c:e8:f4:61:ca:84:f3:79:3a:5f:6c: 36:60:0d:78:b7:ca:72:32:42:58:96:88:8c:0e:ba:76: ab:8d:a2:99:bc:c4:a2:db:85:e3:2b:a7:35:b0:1a:ad: 4e:db:9a:d6:4d:5a:5f:85:2a:11:b7:e6:40:4e:a4:4e: 8e:a4:cd:98:d5:a0:fa:6b:57:ac:ba:cc:e8:06:cb:18: 1c:7b:f9:bc:fb:a3:62:b4:03:2d:30:70:4f:70:a2:30: 61:a9:b9:02:95:4f:24:7f:0d:06:73:fa:5b:0b:76:ca: 9e:f4:84:34:6f:cb:d0:6d:3b:75:22:ea:c6:77:98:a3: 86:ed:6b:1e:12:18:58:34:44:13:95:a9:f3:ea:0c:bb: 2e:8c:20:0b:74:57:49:0f:62:61:07:90:58:03:54:6b: 77:e9:8c:15:8b:2b:76:33:d3:64:dd:fd:e4:01:76:52: 73:4d:c3:ad:30:35:64:60:94:7e:83:1c:8b:32:0f:c0: 31:2c:d1:d6:5b:23:dd:8f:47:16:b5:ff:93:7e:20:07: 9a:32:fa:c7:36:73:f8:ba:3a:e8:be:ac:c2:8f:db:aa: 56:f8:7d:15:bf:f8:33:3e:61:fd:71:ff:96:88:8c:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:33:9d:e1:08:66:d5:5c:a7:bc:d4:11:b0:db:2d:de: 7e:7b:9e:f1:5f:5c:d9:bc:b4:53:62:57:30:1c:8d:f7: b6:d5:06:36:f7:94:cc:f1:40:25:b8:79:62:32:7b:3b: f8:06:16:cf:7a:81:49:da:5a:75:e1:9e:03:5d:21:4b: a8:95:d5:89:cb:f1:d6:95:af:01:93:ff:b9:fd:fb:1a: bc:71:60:b1:c0:f8:48:38:cd:b7:0c:65:36:aa:5d:68: 57:85:17:52:c3:71:7a:fc:a0:ac:2e:f9:22:dc:d6:03: fd:56:07:af:94:13:bf:6e:86:ea:4b:8e:55:93:20:99: ef:0f:76:49:62:92:b2:1e:d1:7f:f7:15:be:33:4c:3d: ff:0f:a5:e6:20:ac:e2:0e:ec:63:ab:da:f6:01:37:fd: d7:55:a2:82:9c:22:79:9a:42:1d:ab:7f:65:57:ac:65: 99:c8:db:81:c4:f2:d5:f6:cd:cb:47:70:88:2a:dd:ae: aa:73:a4:73:97:3d:16:66:89:bc:9b:06:bf:3f:dd:14: d4:d7:30:b5:70:68:26:70:1e:42:80:aa:b5:48:9d:34: 36:0a:b8:10:c2:43:1e:6b:58:be:bf:81:4c:22:8f:67: 59:8f:00:99:03:e8:e6:38:f4:66:c1:90:a1:c4:51:b0 Fingerprint (SHA-256): E9:A8:D5:58:6B:3D:06:CB:E3:40:86:1E:72:B1:87:D5:98:6A:53:FE:DC:E8:C8:F1:F1:8F:0C:86:B0:1D:98:17 Fingerprint (SHA1): 01:AB:3E:D0:A7:2A:A5:AB:0D:59:01:B8:A4:ED:1A:7D:75:BD:DB:FA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2802: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2803: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121146 (0x1e67d4ba) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:12:21 2017 Not After : Tue May 10 12:12:21 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:3a:71:59:fe:97:dd:db:88:21:83:90:81:9c:29:8d: 5e:15:9d:7f:bb:0a:07:0a:39:6c:32:9d:28:36:f8:7a: cb:a1:eb:26:a0:80:a4:0b:e9:d7:86:64:a6:52:72:0b: dc:ae:31:6e:6e:2b:bd:a4:45:f4:0d:8b:85:e2:2c:08: fd:48:d3:f6:6a:32:f0:dc:ae:b0:f4:33:bb:21:4c:17: 58:ee:31:11:35:d6:12:39:73:2c:89:a2:a4:23:ad:d0: fd:83:7b:59:ba:87:45:4a:96:5a:ba:41:14:03:34:40: 1f:ef:15:1d:09:0c:a5:19:c7:6e:52:43:8f:4c:5c:bd: f6:81:67:ad:ed:15:0c:0f:55:5f:83:03:00:4b:c5:eb: ce:15:de:54:1f:95:bd:ca:b1:93:56:1f:2f:2d:ca:d5: 7f:fb:1b:e8:d0:58:65:a0:d5:73:62:7d:48:5c:5e:b7: 59:66:24:53:ef:24:a0:cc:bb:a4:93:c7:2c:63:a1:10: d2:3c:3d:90:ec:9a:6c:c3:c6:0c:09:c0:5f:3c:8c:43: 40:21:6c:c4:78:08:41:34:59:67:c3:78:ec:cd:9f:6b: 24:37:57:a9:85:a1:3a:b5:01:ac:7a:34:e5:bc:0d:79: 25:ed:73:66:e3:76:f6:c3:55:98:ab:6f:4e:0f:36:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:45:aa:f9:d8:0c:64:4d:f5:72:53:5e:62:c4:37:49: 55:f8:7e:c8:bb:7b:f5:d7:bc:7f:58:5d:a8:e4:10:0f: 66:aa:72:c5:63:48:8b:a2:ad:b4:d2:d9:9a:63:92:2c: e9:71:4f:05:84:f9:42:6d:6e:ef:c4:b3:78:5a:06:d0: 93:a4:35:df:d8:ee:b6:85:97:12:ed:2f:7d:a0:34:a6: ba:3f:87:3e:2b:d0:c7:7e:c4:c9:e3:36:dc:be:29:30: cf:ca:ae:54:b5:c7:ca:d4:35:c3:dc:ab:2d:88:38:8e: 0b:5c:b4:de:9b:73:50:39:27:b0:21:43:2f:be:01:cd: 26:2c:09:75:9a:71:8f:e5:67:cb:9f:07:28:1b:ed:5f: 0c:49:12:33:5a:7a:c0:24:07:fe:ad:8d:9b:97:60:47: a6:d3:2b:bd:03:d5:5c:97:30:10:31:71:ec:97:86:46: 3c:03:5c:fc:78:60:37:7c:42:23:37:32:27:93:e1:ce: dc:8b:cc:5e:a7:82:94:89:ee:96:ce:b2:7f:79:8f:77: 82:df:32:9b:b0:06:62:da:dd:b3:f7:11:e2:76:89:6a: 2d:6a:c7:03:23:81:44:a5:54:77:5b:47:c2:84:5a:01: 41:d9:ab:68:28:b2:6e:49:ff:9e:68:58:ca:6a:aa:14 Fingerprint (SHA-256): 4B:AE:AB:7A:1F:D2:6A:BA:A3:7B:DD:FD:70:D5:A1:D7:3D:AC:92:8B:AE:2B:BA:2A:EB:1E:40:CF:15:0C:3B:32 Fingerprint (SHA1): 34:4F:4B:E5:CA:D6:FD:BD:29:36:9D:12:C9:8D:16:3B:97:A3:0A:01 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #2804: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2805: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #2806: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #2807: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #2808: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121144 (0x1e67d4b8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:12:19 2017 Not After : Tue May 10 12:12:19 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:4b:d2:f6:3a:73:80:df:0a:69:85:fd:6c:2d:f5:88: 8f:73:c1:30:dc:f8:39:71:ac:9d:7f:38:6f:a4:d9:a3: ba:3d:54:bd:00:76:5e:c9:31:e7:87:21:a9:78:9a:47: a6:d1:30:e5:47:df:68:d0:ad:79:5d:2d:8d:86:4d:71: 9c:f1:67:45:1d:91:08:aa:66:a6:6f:06:4a:c7:25:5b: 4a:36:4e:52:73:82:04:35:5d:0b:f8:2b:96:42:da:89: dd:85:99:99:bf:cf:19:b2:3d:8c:f9:e0:fd:b5:34:19: d5:8d:c4:77:04:1c:91:cd:ba:96:fa:47:d7:e0:47:df: 0f:b3:0e:64:70:a2:42:04:39:0e:4d:ba:54:99:af:5e: e9:33:52:fa:98:d1:40:06:f9:05:41:86:a0:59:61:d1: fc:2d:8d:8a:8f:25:d4:cd:70:c6:78:2c:f6:85:fd:9a: e7:f8:f3:fc:a6:a0:0b:ac:c2:50:6e:6d:01:d6:c0:33: de:06:02:55:5f:f5:8d:50:bb:b5:d1:25:62:f0:6a:d6: a6:ee:a4:70:6d:70:c4:e7:84:94:85:84:93:bc:51:bf: d5:53:2c:28:68:99:bb:01:f3:09:83:7a:94:07:75:45: 60:28:b7:4e:83:50:20:35:60:08:12:32:5e:4e:2a:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:f4:46:e9:95:d3:4a:71:13:81:92:58:4a:00:bf:49: d7:e9:66:74:ca:0a:76:2e:ef:c6:7a:ed:52:23:33:87: f6:45:c0:26:e4:07:33:7c:f9:fc:ce:e2:b7:62:ee:e7: 04:eb:d0:41:3e:91:44:e9:35:bc:62:03:0d:cc:c5:96: 4d:a1:b0:c0:95:7e:a3:e0:6b:62:37:12:25:92:b1:e8: 3a:4c:73:6e:6f:ef:c7:88:61:78:81:45:34:10:00:35: f6:77:99:bb:b8:68:39:1a:80:de:7f:d7:7c:75:e3:79: a9:9a:0d:c2:f3:b7:a5:11:36:29:7d:14:03:32:40:0f: b1:b5:94:af:33:03:67:8f:66:60:a6:00:17:47:19:c7: cb:6b:71:0c:66:4c:01:11:99:47:38:9a:f9:d1:d9:0a: a4:6b:fa:f5:d8:d2:fd:c0:73:11:18:f3:5d:13:fa:f7: 5b:7d:8d:68:70:40:01:07:2a:29:4b:86:66:b9:82:46: 3c:e0:68:e6:bb:fb:de:98:8d:27:81:52:f5:71:c7:99: 17:a6:40:3d:91:64:a2:31:7a:79:81:41:1a:45:d0:c6: c0:ec:30:fd:d9:1c:35:de:33:11:b1:02:80:d3:91:2f: f2:14:54:44:ac:59:21:4e:50:bd:28:53:07:68:c7:07 Fingerprint (SHA-256): 08:C8:1D:29:C0:96:67:51:B2:F2:3C:54:55:4F:34:01:C5:FA:65:F1:D1:D9:38:8E:14:C4:03:44:55:CA:E8:BD Fingerprint (SHA1): FD:85:C2:1F:9C:F3:16:26:1B:CC:56:EA:27:BC:75:27:CC:81:A3:11 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2809: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2810: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121145 (0x1e67d4b9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:12:20 2017 Not After : Tue May 10 12:12:20 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:fa:4a:0a:ce:ec:48:e2:6c:e4:67:35:3b:95:08:a1: aa:93:e7:c7:ca:1c:e8:f4:61:ca:84:f3:79:3a:5f:6c: 36:60:0d:78:b7:ca:72:32:42:58:96:88:8c:0e:ba:76: ab:8d:a2:99:bc:c4:a2:db:85:e3:2b:a7:35:b0:1a:ad: 4e:db:9a:d6:4d:5a:5f:85:2a:11:b7:e6:40:4e:a4:4e: 8e:a4:cd:98:d5:a0:fa:6b:57:ac:ba:cc:e8:06:cb:18: 1c:7b:f9:bc:fb:a3:62:b4:03:2d:30:70:4f:70:a2:30: 61:a9:b9:02:95:4f:24:7f:0d:06:73:fa:5b:0b:76:ca: 9e:f4:84:34:6f:cb:d0:6d:3b:75:22:ea:c6:77:98:a3: 86:ed:6b:1e:12:18:58:34:44:13:95:a9:f3:ea:0c:bb: 2e:8c:20:0b:74:57:49:0f:62:61:07:90:58:03:54:6b: 77:e9:8c:15:8b:2b:76:33:d3:64:dd:fd:e4:01:76:52: 73:4d:c3:ad:30:35:64:60:94:7e:83:1c:8b:32:0f:c0: 31:2c:d1:d6:5b:23:dd:8f:47:16:b5:ff:93:7e:20:07: 9a:32:fa:c7:36:73:f8:ba:3a:e8:be:ac:c2:8f:db:aa: 56:f8:7d:15:bf:f8:33:3e:61:fd:71:ff:96:88:8c:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:33:9d:e1:08:66:d5:5c:a7:bc:d4:11:b0:db:2d:de: 7e:7b:9e:f1:5f:5c:d9:bc:b4:53:62:57:30:1c:8d:f7: b6:d5:06:36:f7:94:cc:f1:40:25:b8:79:62:32:7b:3b: f8:06:16:cf:7a:81:49:da:5a:75:e1:9e:03:5d:21:4b: a8:95:d5:89:cb:f1:d6:95:af:01:93:ff:b9:fd:fb:1a: bc:71:60:b1:c0:f8:48:38:cd:b7:0c:65:36:aa:5d:68: 57:85:17:52:c3:71:7a:fc:a0:ac:2e:f9:22:dc:d6:03: fd:56:07:af:94:13:bf:6e:86:ea:4b:8e:55:93:20:99: ef:0f:76:49:62:92:b2:1e:d1:7f:f7:15:be:33:4c:3d: ff:0f:a5:e6:20:ac:e2:0e:ec:63:ab:da:f6:01:37:fd: d7:55:a2:82:9c:22:79:9a:42:1d:ab:7f:65:57:ac:65: 99:c8:db:81:c4:f2:d5:f6:cd:cb:47:70:88:2a:dd:ae: aa:73:a4:73:97:3d:16:66:89:bc:9b:06:bf:3f:dd:14: d4:d7:30:b5:70:68:26:70:1e:42:80:aa:b5:48:9d:34: 36:0a:b8:10:c2:43:1e:6b:58:be:bf:81:4c:22:8f:67: 59:8f:00:99:03:e8:e6:38:f4:66:c1:90:a1:c4:51:b0 Fingerprint (SHA-256): E9:A8:D5:58:6B:3D:06:CB:E3:40:86:1E:72:B1:87:D5:98:6A:53:FE:DC:E8:C8:F1:F1:8F:0C:86:B0:1D:98:17 Fingerprint (SHA1): 01:AB:3E:D0:A7:2A:A5:AB:0D:59:01:B8:A4:ED:1A:7D:75:BD:DB:FA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2811: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2812: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121146 (0x1e67d4ba) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:12:21 2017 Not After : Tue May 10 12:12:21 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:3a:71:59:fe:97:dd:db:88:21:83:90:81:9c:29:8d: 5e:15:9d:7f:bb:0a:07:0a:39:6c:32:9d:28:36:f8:7a: cb:a1:eb:26:a0:80:a4:0b:e9:d7:86:64:a6:52:72:0b: dc:ae:31:6e:6e:2b:bd:a4:45:f4:0d:8b:85:e2:2c:08: fd:48:d3:f6:6a:32:f0:dc:ae:b0:f4:33:bb:21:4c:17: 58:ee:31:11:35:d6:12:39:73:2c:89:a2:a4:23:ad:d0: fd:83:7b:59:ba:87:45:4a:96:5a:ba:41:14:03:34:40: 1f:ef:15:1d:09:0c:a5:19:c7:6e:52:43:8f:4c:5c:bd: f6:81:67:ad:ed:15:0c:0f:55:5f:83:03:00:4b:c5:eb: ce:15:de:54:1f:95:bd:ca:b1:93:56:1f:2f:2d:ca:d5: 7f:fb:1b:e8:d0:58:65:a0:d5:73:62:7d:48:5c:5e:b7: 59:66:24:53:ef:24:a0:cc:bb:a4:93:c7:2c:63:a1:10: d2:3c:3d:90:ec:9a:6c:c3:c6:0c:09:c0:5f:3c:8c:43: 40:21:6c:c4:78:08:41:34:59:67:c3:78:ec:cd:9f:6b: 24:37:57:a9:85:a1:3a:b5:01:ac:7a:34:e5:bc:0d:79: 25:ed:73:66:e3:76:f6:c3:55:98:ab:6f:4e:0f:36:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:45:aa:f9:d8:0c:64:4d:f5:72:53:5e:62:c4:37:49: 55:f8:7e:c8:bb:7b:f5:d7:bc:7f:58:5d:a8:e4:10:0f: 66:aa:72:c5:63:48:8b:a2:ad:b4:d2:d9:9a:63:92:2c: e9:71:4f:05:84:f9:42:6d:6e:ef:c4:b3:78:5a:06:d0: 93:a4:35:df:d8:ee:b6:85:97:12:ed:2f:7d:a0:34:a6: ba:3f:87:3e:2b:d0:c7:7e:c4:c9:e3:36:dc:be:29:30: cf:ca:ae:54:b5:c7:ca:d4:35:c3:dc:ab:2d:88:38:8e: 0b:5c:b4:de:9b:73:50:39:27:b0:21:43:2f:be:01:cd: 26:2c:09:75:9a:71:8f:e5:67:cb:9f:07:28:1b:ed:5f: 0c:49:12:33:5a:7a:c0:24:07:fe:ad:8d:9b:97:60:47: a6:d3:2b:bd:03:d5:5c:97:30:10:31:71:ec:97:86:46: 3c:03:5c:fc:78:60:37:7c:42:23:37:32:27:93:e1:ce: dc:8b:cc:5e:a7:82:94:89:ee:96:ce:b2:7f:79:8f:77: 82:df:32:9b:b0:06:62:da:dd:b3:f7:11:e2:76:89:6a: 2d:6a:c7:03:23:81:44:a5:54:77:5b:47:c2:84:5a:01: 41:d9:ab:68:28:b2:6e:49:ff:9e:68:58:ca:6a:aa:14 Fingerprint (SHA-256): 4B:AE:AB:7A:1F:D2:6A:BA:A3:7B:DD:FD:70:D5:A1:D7:3D:AC:92:8B:AE:2B:BA:2A:EB:1E:40:CF:15:0C:3B:32 Fingerprint (SHA1): 34:4F:4B:E5:CA:D6:FD:BD:29:36:9D:12:C9:8D:16:3B:97:A3:0A:01 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #2813: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2814: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2815: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121148 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2816: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2817: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2818: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2819: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510121149 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2820: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2821: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2822: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2823: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510121150 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2824: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2825: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #2826: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2827: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 510121151 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2828: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2829: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #2830: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2831: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 510121152 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2832: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2833: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2834: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121148 (0x1e67d4bc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:12:25 2017 Not After : Tue May 10 12:12:25 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:e8:af:92:13:ce:28:85:10:89:67:e9:f9:12:5b:a4: c4:53:e4:c6:5e:db:ff:e2:46:22:56:cd:9c:66:86:c9: c2:c5:23:4c:11:cc:55:3d:63:95:bc:f1:26:24:13:6a: b7:4f:c0:b2:96:6d:d4:bb:ad:c4:0d:96:1c:85:df:cc: b7:7d:25:f2:dc:bd:50:da:f7:d1:9a:b6:5d:14:9c:2d: 0c:a1:ac:a2:86:5c:bb:56:3b:89:bf:54:7a:a1:91:82: 2f:0c:77:0f:e0:bd:13:1a:95:1a:a3:42:91:fd:20:0b: ba:1c:ef:ba:3e:a4:60:14:c1:8e:ed:25:57:2b:cb:06: 37:ea:67:36:cc:dc:66:7d:70:f9:06:26:57:5f:d7:cf: b0:8a:1f:ec:3a:a2:0d:dd:ab:3f:be:56:aa:b5:c5:89: b2:a4:41:c5:2a:85:40:0b:7e:42:e1:10:b0:dd:66:ae: 4d:91:86:c7:ef:79:0c:77:cb:e7:02:f8:56:1f:06:6a: 3e:f4:d7:2e:f8:b1:5a:a4:67:c6:94:aa:7c:2a:a1:cb: 91:07:5a:da:7b:c8:11:26:78:4f:09:5b:79:34:44:9d: 99:bb:fa:12:ca:37:8f:f5:21:70:a7:75:c6:0b:45:f7: dc:fc:df:e9:25:f9:2b:81:73:d4:8e:b9:c8:23:cf:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:ed:1d:5a:ce:7a:91:a4:b3:a5:a2:03:93:5f:bc:bc: 52:f9:fa:aa:5e:e4:b8:6e:f2:12:cd:a1:32:e4:66:99: 46:9c:1b:cc:d7:dc:0f:52:15:a6:16:14:ec:e0:70:a9: 9f:21:08:2b:db:b3:a3:6d:19:cc:c1:f0:20:09:5d:79: 4e:c1:61:61:c4:73:b3:a4:e1:5a:eb:71:51:c4:cc:1d: 66:a3:9a:36:0f:ba:ed:75:32:09:9b:69:4d:06:09:1e: 38:7e:66:fc:6e:d7:35:e3:88:c7:74:30:e7:cb:2d:03: 42:5a:88:af:18:36:f0:76:bd:4a:65:6f:87:35:d8:c5: ae:6b:a8:0e:79:cd:c8:06:1c:29:f9:8e:e9:26:31:d6: e7:95:bd:8f:47:3f:05:7b:88:1c:b4:14:39:cf:a6:1e: bf:77:a7:bd:58:78:21:d5:38:b5:7c:0d:fa:11:f7:a4: a1:c2:3d:8f:85:b4:0c:42:6b:44:29:ef:2c:fb:04:70: 94:0c:2a:cd:da:0e:74:64:43:22:2d:c6:95:f9:ee:91: b5:63:8f:19:d7:e8:aa:e9:15:fd:86:f4:dd:ea:fb:4f: 01:ab:a6:5c:c6:5f:f8:bc:5e:ca:d6:84:f8:ef:1d:ef: 04:fe:e1:8b:38:ca:bf:23:ce:15:d9:0c:d4:4c:c2:4f Fingerprint (SHA-256): 19:22:A9:5E:DF:6A:E7:21:5C:9F:AA:7F:9F:4D:15:B6:FA:1E:F4:BE:62:8C:8D:5C:9E:7C:23:9D:2F:C7:70:04 Fingerprint (SHA1): CA:86:88:62:35:87:10:AC:E4:3D:E4:E6:FD:99:70:87:F2:14:EC:16 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2835: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2836: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121149 (0x1e67d4bd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:12:27 2017 Not After : Tue May 10 12:12:27 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:8a:2d:d4:ae:42:e5:3e:e5:d3:7c:b0:4a:20:ed:27: a4:ad:d3:a4:18:47:60:aa:2f:22:71:58:ce:ec:2b:47: df:92:ac:ad:6f:40:98:16:71:37:a3:4b:d3:ac:d7:91: fb:ab:fe:c5:c3:6e:61:32:31:5b:7e:0f:2a:33:ea:7f: af:9c:a8:cc:64:de:76:74:ac:4f:6d:39:01:96:3f:fc: 4d:4c:92:07:f9:6e:3d:a9:47:a2:f6:aa:5d:11:89:8a: 44:de:eb:f5:3b:b6:a9:19:2f:c7:7e:58:16:fb:f8:49: 2c:43:b4:46:b1:55:58:a3:da:79:33:1f:07:1d:f9:13: 97:b9:98:96:af:fe:39:ff:29:40:f6:fa:fc:21:26:f8: 61:8a:7b:e9:8c:b8:5d:52:1f:49:76:36:9c:f8:4a:7a: 46:1f:52:10:08:93:fc:72:0f:9c:86:15:11:f0:ca:93: a8:4d:5c:14:f0:63:5b:61:92:fc:5e:34:3e:27:fb:da: 3c:6f:86:99:e1:df:e3:1f:65:0e:b4:fd:08:9b:7d:f6: 76:88:4c:82:03:0f:41:67:d5:31:34:1a:bb:c4:bd:07: e0:b2:d9:1c:b3:7a:b0:4a:18:d1:63:df:7a:8e:30:03: 8a:59:d0:6a:24:b6:b4:5e:a7:d8:f1:7a:53:a4:39:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:b9:af:4c:40:3d:6a:70:a8:80:86:6b:d1:24:bc:65: 89:36:72:2e:2b:a8:aa:6a:d3:a6:b3:aa:35:5b:72:9b: 7f:fa:c3:15:25:b5:85:d1:f1:aa:56:df:4a:ce:98:db: f0:ef:e3:27:0a:43:79:e5:c4:51:56:70:61:27:fa:5d: 21:76:8b:fa:be:37:b3:ea:b5:38:23:64:b9:ed:95:8e: 02:41:fd:5a:79:18:db:d3:3e:0c:9c:01:cf:a8:3e:41: 14:c9:3d:84:b4:cb:97:d3:42:d5:44:7f:92:fa:c9:9b: 2a:b3:92:e0:4a:5c:ef:8e:0b:37:39:c6:1d:5f:e4:6a: 8c:99:e3:92:e9:92:15:8a:3f:bb:e7:74:bb:1a:c5:00: 9a:de:b7:4f:57:55:3e:54:3b:cf:21:9b:66:13:27:9e: a1:b6:72:b7:45:7e:d3:4b:44:1d:bc:4b:a3:ae:4f:ba: 93:96:a8:26:41:cd:87:ef:bd:00:ef:66:cb:30:a1:07: 88:89:e4:24:95:ff:fe:31:4f:81:51:75:5c:95:1a:c5: 8c:f1:0f:f1:cd:a9:90:1d:76:84:02:c7:d4:48:81:83: c4:e4:62:81:f8:bd:c7:fd:97:7a:dc:d6:4d:90:03:6a: f0:e8:fa:c1:6d:e2:35:53:3d:75:a6:06:71:7e:15:f3 Fingerprint (SHA-256): 34:69:43:00:79:C2:C5:BD:35:75:DC:C8:2B:3B:5E:93:D6:DD:5A:F4:57:17:CF:C9:98:46:EE:D3:CD:9A:C1:D0 Fingerprint (SHA1): 8F:68:51:B6:11:F6:2B:43:C0:86:1D:DE:C1:F5:C8:49:C3:65:BE:C1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2837: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2838: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121150 (0x1e67d4be) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:12:29 2017 Not After : Tue May 10 12:12:29 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:de:4d:12:7b:af:87:14:be:c9:aa:a3:6b:d3:8a:a1: 84:50:50:a8:13:55:3a:32:5c:81:2a:8a:07:3d:03:14: 75:75:61:61:e3:d3:92:78:a8:b4:dc:fa:f0:97:8f:a3: 70:f6:ae:f4:5f:72:4a:54:72:6e:f9:c8:86:ab:54:c1: c8:8c:dc:f6:42:a7:a3:d9:58:79:0b:01:6a:2f:45:b6: cd:71:cd:df:44:0e:15:82:bc:bc:e4:92:c8:74:92:dd: b8:7d:25:d1:77:67:30:e8:bf:9b:a7:6d:cf:82:61:c0: 71:f3:69:27:9c:ed:ae:f5:c5:58:22:c9:1f:ab:05:38: b1:ea:ba:0a:b5:08:06:68:7c:84:e2:96:85:9f:15:7a: fc:b0:39:94:3e:3d:48:7f:1a:03:3b:e1:f9:0f:c4:79: e9:3c:a9:68:41:27:63:14:0e:98:3a:72:55:56:22:bf: 4d:9d:40:d1:8d:68:f5:c8:86:12:bf:3f:b4:ba:c9:ca: 6d:87:38:ef:d6:4f:ca:1d:36:b5:04:d5:b3:84:e7:fb: 2f:04:fe:a3:14:03:81:05:13:c2:03:c5:df:72:eb:39: 4f:b8:ad:cf:73:f1:c8:ec:9a:0a:96:34:04:9f:a8:b6: 9c:2a:a9:3a:93:fa:61:e1:71:86:96:d0:c7:c2:3e:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:6d:b9:87:11:fa:de:c8:6f:49:ee:68:e3:3a:f0:60: e5:6d:8d:0f:c0:df:5e:d9:50:22:7c:7c:49:18:6e:c8: 80:61:66:93:be:c5:5a:29:cc:89:d1:4a:b6:86:c5:b4: f3:5a:02:54:ab:32:2d:2c:3f:4b:7f:1c:cd:3f:7d:43: 89:4b:1e:e3:9f:4a:43:0d:56:47:a7:2e:d8:fe:b1:63: 3c:66:8b:2f:e4:e0:21:76:a5:41:7f:86:05:ec:2c:78: 20:22:6d:12:11:b1:b1:85:03:03:28:85:32:89:28:bf: 08:0f:a9:e5:0c:36:b1:82:f5:cc:8b:47:fb:43:2c:ec: 58:af:d0:b1:7a:e3:4f:b2:f1:f3:61:30:d7:f5:a8:52: 4d:8c:92:46:84:77:7a:5d:36:6e:dc:bb:0e:d3:2e:31: fe:08:01:3b:e5:59:22:0c:4b:bd:c4:27:70:e6:2a:f4: 2d:1a:0f:88:7d:49:34:0c:dc:8f:7e:53:e1:2d:99:b4: 12:01:0d:b5:6a:50:f9:4d:04:86:e1:cf:7d:29:fa:bb: 34:aa:7f:3c:09:d3:79:c1:d4:b7:73:1f:66:3e:42:d7: 8d:60:f5:31:3c:96:30:b7:02:1d:ae:57:49:96:8f:a6: 38:ca:a3:4c:1a:a1:dd:c2:9e:83:37:af:d9:01:37:dd Fingerprint (SHA-256): 3C:3E:74:53:ED:06:0C:61:99:CC:0B:1F:5D:C2:5D:6A:D4:F9:52:9D:59:E1:2F:AA:62:DC:B0:5F:84:1D:89:B6 Fingerprint (SHA1): E8:63:32:34:F6:A9:FC:D6:5E:59:63:A0:49:3E:F6:69:25:F6:FD:01 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #2839: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2840: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #2841: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #2842: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #2843: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121148 (0x1e67d4bc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:12:25 2017 Not After : Tue May 10 12:12:25 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:e8:af:92:13:ce:28:85:10:89:67:e9:f9:12:5b:a4: c4:53:e4:c6:5e:db:ff:e2:46:22:56:cd:9c:66:86:c9: c2:c5:23:4c:11:cc:55:3d:63:95:bc:f1:26:24:13:6a: b7:4f:c0:b2:96:6d:d4:bb:ad:c4:0d:96:1c:85:df:cc: b7:7d:25:f2:dc:bd:50:da:f7:d1:9a:b6:5d:14:9c:2d: 0c:a1:ac:a2:86:5c:bb:56:3b:89:bf:54:7a:a1:91:82: 2f:0c:77:0f:e0:bd:13:1a:95:1a:a3:42:91:fd:20:0b: ba:1c:ef:ba:3e:a4:60:14:c1:8e:ed:25:57:2b:cb:06: 37:ea:67:36:cc:dc:66:7d:70:f9:06:26:57:5f:d7:cf: b0:8a:1f:ec:3a:a2:0d:dd:ab:3f:be:56:aa:b5:c5:89: b2:a4:41:c5:2a:85:40:0b:7e:42:e1:10:b0:dd:66:ae: 4d:91:86:c7:ef:79:0c:77:cb:e7:02:f8:56:1f:06:6a: 3e:f4:d7:2e:f8:b1:5a:a4:67:c6:94:aa:7c:2a:a1:cb: 91:07:5a:da:7b:c8:11:26:78:4f:09:5b:79:34:44:9d: 99:bb:fa:12:ca:37:8f:f5:21:70:a7:75:c6:0b:45:f7: dc:fc:df:e9:25:f9:2b:81:73:d4:8e:b9:c8:23:cf:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:ed:1d:5a:ce:7a:91:a4:b3:a5:a2:03:93:5f:bc:bc: 52:f9:fa:aa:5e:e4:b8:6e:f2:12:cd:a1:32:e4:66:99: 46:9c:1b:cc:d7:dc:0f:52:15:a6:16:14:ec:e0:70:a9: 9f:21:08:2b:db:b3:a3:6d:19:cc:c1:f0:20:09:5d:79: 4e:c1:61:61:c4:73:b3:a4:e1:5a:eb:71:51:c4:cc:1d: 66:a3:9a:36:0f:ba:ed:75:32:09:9b:69:4d:06:09:1e: 38:7e:66:fc:6e:d7:35:e3:88:c7:74:30:e7:cb:2d:03: 42:5a:88:af:18:36:f0:76:bd:4a:65:6f:87:35:d8:c5: ae:6b:a8:0e:79:cd:c8:06:1c:29:f9:8e:e9:26:31:d6: e7:95:bd:8f:47:3f:05:7b:88:1c:b4:14:39:cf:a6:1e: bf:77:a7:bd:58:78:21:d5:38:b5:7c:0d:fa:11:f7:a4: a1:c2:3d:8f:85:b4:0c:42:6b:44:29:ef:2c:fb:04:70: 94:0c:2a:cd:da:0e:74:64:43:22:2d:c6:95:f9:ee:91: b5:63:8f:19:d7:e8:aa:e9:15:fd:86:f4:dd:ea:fb:4f: 01:ab:a6:5c:c6:5f:f8:bc:5e:ca:d6:84:f8:ef:1d:ef: 04:fe:e1:8b:38:ca:bf:23:ce:15:d9:0c:d4:4c:c2:4f Fingerprint (SHA-256): 19:22:A9:5E:DF:6A:E7:21:5C:9F:AA:7F:9F:4D:15:B6:FA:1E:F4:BE:62:8C:8D:5C:9E:7C:23:9D:2F:C7:70:04 Fingerprint (SHA1): CA:86:88:62:35:87:10:AC:E4:3D:E4:E6:FD:99:70:87:F2:14:EC:16 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2844: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2845: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121149 (0x1e67d4bd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:12:27 2017 Not After : Tue May 10 12:12:27 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:8a:2d:d4:ae:42:e5:3e:e5:d3:7c:b0:4a:20:ed:27: a4:ad:d3:a4:18:47:60:aa:2f:22:71:58:ce:ec:2b:47: df:92:ac:ad:6f:40:98:16:71:37:a3:4b:d3:ac:d7:91: fb:ab:fe:c5:c3:6e:61:32:31:5b:7e:0f:2a:33:ea:7f: af:9c:a8:cc:64:de:76:74:ac:4f:6d:39:01:96:3f:fc: 4d:4c:92:07:f9:6e:3d:a9:47:a2:f6:aa:5d:11:89:8a: 44:de:eb:f5:3b:b6:a9:19:2f:c7:7e:58:16:fb:f8:49: 2c:43:b4:46:b1:55:58:a3:da:79:33:1f:07:1d:f9:13: 97:b9:98:96:af:fe:39:ff:29:40:f6:fa:fc:21:26:f8: 61:8a:7b:e9:8c:b8:5d:52:1f:49:76:36:9c:f8:4a:7a: 46:1f:52:10:08:93:fc:72:0f:9c:86:15:11:f0:ca:93: a8:4d:5c:14:f0:63:5b:61:92:fc:5e:34:3e:27:fb:da: 3c:6f:86:99:e1:df:e3:1f:65:0e:b4:fd:08:9b:7d:f6: 76:88:4c:82:03:0f:41:67:d5:31:34:1a:bb:c4:bd:07: e0:b2:d9:1c:b3:7a:b0:4a:18:d1:63:df:7a:8e:30:03: 8a:59:d0:6a:24:b6:b4:5e:a7:d8:f1:7a:53:a4:39:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:b9:af:4c:40:3d:6a:70:a8:80:86:6b:d1:24:bc:65: 89:36:72:2e:2b:a8:aa:6a:d3:a6:b3:aa:35:5b:72:9b: 7f:fa:c3:15:25:b5:85:d1:f1:aa:56:df:4a:ce:98:db: f0:ef:e3:27:0a:43:79:e5:c4:51:56:70:61:27:fa:5d: 21:76:8b:fa:be:37:b3:ea:b5:38:23:64:b9:ed:95:8e: 02:41:fd:5a:79:18:db:d3:3e:0c:9c:01:cf:a8:3e:41: 14:c9:3d:84:b4:cb:97:d3:42:d5:44:7f:92:fa:c9:9b: 2a:b3:92:e0:4a:5c:ef:8e:0b:37:39:c6:1d:5f:e4:6a: 8c:99:e3:92:e9:92:15:8a:3f:bb:e7:74:bb:1a:c5:00: 9a:de:b7:4f:57:55:3e:54:3b:cf:21:9b:66:13:27:9e: a1:b6:72:b7:45:7e:d3:4b:44:1d:bc:4b:a3:ae:4f:ba: 93:96:a8:26:41:cd:87:ef:bd:00:ef:66:cb:30:a1:07: 88:89:e4:24:95:ff:fe:31:4f:81:51:75:5c:95:1a:c5: 8c:f1:0f:f1:cd:a9:90:1d:76:84:02:c7:d4:48:81:83: c4:e4:62:81:f8:bd:c7:fd:97:7a:dc:d6:4d:90:03:6a: f0:e8:fa:c1:6d:e2:35:53:3d:75:a6:06:71:7e:15:f3 Fingerprint (SHA-256): 34:69:43:00:79:C2:C5:BD:35:75:DC:C8:2B:3B:5E:93:D6:DD:5A:F4:57:17:CF:C9:98:46:EE:D3:CD:9A:C1:D0 Fingerprint (SHA1): 8F:68:51:B6:11:F6:2B:43:C0:86:1D:DE:C1:F5:C8:49:C3:65:BE:C1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2846: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2847: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121150 (0x1e67d4be) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:12:29 2017 Not After : Tue May 10 12:12:29 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:de:4d:12:7b:af:87:14:be:c9:aa:a3:6b:d3:8a:a1: 84:50:50:a8:13:55:3a:32:5c:81:2a:8a:07:3d:03:14: 75:75:61:61:e3:d3:92:78:a8:b4:dc:fa:f0:97:8f:a3: 70:f6:ae:f4:5f:72:4a:54:72:6e:f9:c8:86:ab:54:c1: c8:8c:dc:f6:42:a7:a3:d9:58:79:0b:01:6a:2f:45:b6: cd:71:cd:df:44:0e:15:82:bc:bc:e4:92:c8:74:92:dd: b8:7d:25:d1:77:67:30:e8:bf:9b:a7:6d:cf:82:61:c0: 71:f3:69:27:9c:ed:ae:f5:c5:58:22:c9:1f:ab:05:38: b1:ea:ba:0a:b5:08:06:68:7c:84:e2:96:85:9f:15:7a: fc:b0:39:94:3e:3d:48:7f:1a:03:3b:e1:f9:0f:c4:79: e9:3c:a9:68:41:27:63:14:0e:98:3a:72:55:56:22:bf: 4d:9d:40:d1:8d:68:f5:c8:86:12:bf:3f:b4:ba:c9:ca: 6d:87:38:ef:d6:4f:ca:1d:36:b5:04:d5:b3:84:e7:fb: 2f:04:fe:a3:14:03:81:05:13:c2:03:c5:df:72:eb:39: 4f:b8:ad:cf:73:f1:c8:ec:9a:0a:96:34:04:9f:a8:b6: 9c:2a:a9:3a:93:fa:61:e1:71:86:96:d0:c7:c2:3e:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:6d:b9:87:11:fa:de:c8:6f:49:ee:68:e3:3a:f0:60: e5:6d:8d:0f:c0:df:5e:d9:50:22:7c:7c:49:18:6e:c8: 80:61:66:93:be:c5:5a:29:cc:89:d1:4a:b6:86:c5:b4: f3:5a:02:54:ab:32:2d:2c:3f:4b:7f:1c:cd:3f:7d:43: 89:4b:1e:e3:9f:4a:43:0d:56:47:a7:2e:d8:fe:b1:63: 3c:66:8b:2f:e4:e0:21:76:a5:41:7f:86:05:ec:2c:78: 20:22:6d:12:11:b1:b1:85:03:03:28:85:32:89:28:bf: 08:0f:a9:e5:0c:36:b1:82:f5:cc:8b:47:fb:43:2c:ec: 58:af:d0:b1:7a:e3:4f:b2:f1:f3:61:30:d7:f5:a8:52: 4d:8c:92:46:84:77:7a:5d:36:6e:dc:bb:0e:d3:2e:31: fe:08:01:3b:e5:59:22:0c:4b:bd:c4:27:70:e6:2a:f4: 2d:1a:0f:88:7d:49:34:0c:dc:8f:7e:53:e1:2d:99:b4: 12:01:0d:b5:6a:50:f9:4d:04:86:e1:cf:7d:29:fa:bb: 34:aa:7f:3c:09:d3:79:c1:d4:b7:73:1f:66:3e:42:d7: 8d:60:f5:31:3c:96:30:b7:02:1d:ae:57:49:96:8f:a6: 38:ca:a3:4c:1a:a1:dd:c2:9e:83:37:af:d9:01:37:dd Fingerprint (SHA-256): 3C:3E:74:53:ED:06:0C:61:99:CC:0B:1F:5D:C2:5D:6A:D4:F9:52:9D:59:E1:2F:AA:62:DC:B0:5F:84:1D:89:B6 Fingerprint (SHA1): E8:63:32:34:F6:A9:FC:D6:5E:59:63:A0:49:3E:F6:69:25:F6:FD:01 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #2848: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2849: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121148 (0x1e67d4bc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:12:25 2017 Not After : Tue May 10 12:12:25 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:e8:af:92:13:ce:28:85:10:89:67:e9:f9:12:5b:a4: c4:53:e4:c6:5e:db:ff:e2:46:22:56:cd:9c:66:86:c9: c2:c5:23:4c:11:cc:55:3d:63:95:bc:f1:26:24:13:6a: b7:4f:c0:b2:96:6d:d4:bb:ad:c4:0d:96:1c:85:df:cc: b7:7d:25:f2:dc:bd:50:da:f7:d1:9a:b6:5d:14:9c:2d: 0c:a1:ac:a2:86:5c:bb:56:3b:89:bf:54:7a:a1:91:82: 2f:0c:77:0f:e0:bd:13:1a:95:1a:a3:42:91:fd:20:0b: ba:1c:ef:ba:3e:a4:60:14:c1:8e:ed:25:57:2b:cb:06: 37:ea:67:36:cc:dc:66:7d:70:f9:06:26:57:5f:d7:cf: b0:8a:1f:ec:3a:a2:0d:dd:ab:3f:be:56:aa:b5:c5:89: b2:a4:41:c5:2a:85:40:0b:7e:42:e1:10:b0:dd:66:ae: 4d:91:86:c7:ef:79:0c:77:cb:e7:02:f8:56:1f:06:6a: 3e:f4:d7:2e:f8:b1:5a:a4:67:c6:94:aa:7c:2a:a1:cb: 91:07:5a:da:7b:c8:11:26:78:4f:09:5b:79:34:44:9d: 99:bb:fa:12:ca:37:8f:f5:21:70:a7:75:c6:0b:45:f7: dc:fc:df:e9:25:f9:2b:81:73:d4:8e:b9:c8:23:cf:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:ed:1d:5a:ce:7a:91:a4:b3:a5:a2:03:93:5f:bc:bc: 52:f9:fa:aa:5e:e4:b8:6e:f2:12:cd:a1:32:e4:66:99: 46:9c:1b:cc:d7:dc:0f:52:15:a6:16:14:ec:e0:70:a9: 9f:21:08:2b:db:b3:a3:6d:19:cc:c1:f0:20:09:5d:79: 4e:c1:61:61:c4:73:b3:a4:e1:5a:eb:71:51:c4:cc:1d: 66:a3:9a:36:0f:ba:ed:75:32:09:9b:69:4d:06:09:1e: 38:7e:66:fc:6e:d7:35:e3:88:c7:74:30:e7:cb:2d:03: 42:5a:88:af:18:36:f0:76:bd:4a:65:6f:87:35:d8:c5: ae:6b:a8:0e:79:cd:c8:06:1c:29:f9:8e:e9:26:31:d6: e7:95:bd:8f:47:3f:05:7b:88:1c:b4:14:39:cf:a6:1e: bf:77:a7:bd:58:78:21:d5:38:b5:7c:0d:fa:11:f7:a4: a1:c2:3d:8f:85:b4:0c:42:6b:44:29:ef:2c:fb:04:70: 94:0c:2a:cd:da:0e:74:64:43:22:2d:c6:95:f9:ee:91: b5:63:8f:19:d7:e8:aa:e9:15:fd:86:f4:dd:ea:fb:4f: 01:ab:a6:5c:c6:5f:f8:bc:5e:ca:d6:84:f8:ef:1d:ef: 04:fe:e1:8b:38:ca:bf:23:ce:15:d9:0c:d4:4c:c2:4f Fingerprint (SHA-256): 19:22:A9:5E:DF:6A:E7:21:5C:9F:AA:7F:9F:4D:15:B6:FA:1E:F4:BE:62:8C:8D:5C:9E:7C:23:9D:2F:C7:70:04 Fingerprint (SHA1): CA:86:88:62:35:87:10:AC:E4:3D:E4:E6:FD:99:70:87:F2:14:EC:16 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2850: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121148 (0x1e67d4bc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:12:25 2017 Not After : Tue May 10 12:12:25 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:e8:af:92:13:ce:28:85:10:89:67:e9:f9:12:5b:a4: c4:53:e4:c6:5e:db:ff:e2:46:22:56:cd:9c:66:86:c9: c2:c5:23:4c:11:cc:55:3d:63:95:bc:f1:26:24:13:6a: b7:4f:c0:b2:96:6d:d4:bb:ad:c4:0d:96:1c:85:df:cc: b7:7d:25:f2:dc:bd:50:da:f7:d1:9a:b6:5d:14:9c:2d: 0c:a1:ac:a2:86:5c:bb:56:3b:89:bf:54:7a:a1:91:82: 2f:0c:77:0f:e0:bd:13:1a:95:1a:a3:42:91:fd:20:0b: ba:1c:ef:ba:3e:a4:60:14:c1:8e:ed:25:57:2b:cb:06: 37:ea:67:36:cc:dc:66:7d:70:f9:06:26:57:5f:d7:cf: b0:8a:1f:ec:3a:a2:0d:dd:ab:3f:be:56:aa:b5:c5:89: b2:a4:41:c5:2a:85:40:0b:7e:42:e1:10:b0:dd:66:ae: 4d:91:86:c7:ef:79:0c:77:cb:e7:02:f8:56:1f:06:6a: 3e:f4:d7:2e:f8:b1:5a:a4:67:c6:94:aa:7c:2a:a1:cb: 91:07:5a:da:7b:c8:11:26:78:4f:09:5b:79:34:44:9d: 99:bb:fa:12:ca:37:8f:f5:21:70:a7:75:c6:0b:45:f7: dc:fc:df:e9:25:f9:2b:81:73:d4:8e:b9:c8:23:cf:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:ed:1d:5a:ce:7a:91:a4:b3:a5:a2:03:93:5f:bc:bc: 52:f9:fa:aa:5e:e4:b8:6e:f2:12:cd:a1:32:e4:66:99: 46:9c:1b:cc:d7:dc:0f:52:15:a6:16:14:ec:e0:70:a9: 9f:21:08:2b:db:b3:a3:6d:19:cc:c1:f0:20:09:5d:79: 4e:c1:61:61:c4:73:b3:a4:e1:5a:eb:71:51:c4:cc:1d: 66:a3:9a:36:0f:ba:ed:75:32:09:9b:69:4d:06:09:1e: 38:7e:66:fc:6e:d7:35:e3:88:c7:74:30:e7:cb:2d:03: 42:5a:88:af:18:36:f0:76:bd:4a:65:6f:87:35:d8:c5: ae:6b:a8:0e:79:cd:c8:06:1c:29:f9:8e:e9:26:31:d6: e7:95:bd:8f:47:3f:05:7b:88:1c:b4:14:39:cf:a6:1e: bf:77:a7:bd:58:78:21:d5:38:b5:7c:0d:fa:11:f7:a4: a1:c2:3d:8f:85:b4:0c:42:6b:44:29:ef:2c:fb:04:70: 94:0c:2a:cd:da:0e:74:64:43:22:2d:c6:95:f9:ee:91: b5:63:8f:19:d7:e8:aa:e9:15:fd:86:f4:dd:ea:fb:4f: 01:ab:a6:5c:c6:5f:f8:bc:5e:ca:d6:84:f8:ef:1d:ef: 04:fe:e1:8b:38:ca:bf:23:ce:15:d9:0c:d4:4c:c2:4f Fingerprint (SHA-256): 19:22:A9:5E:DF:6A:E7:21:5C:9F:AA:7F:9F:4D:15:B6:FA:1E:F4:BE:62:8C:8D:5C:9E:7C:23:9D:2F:C7:70:04 Fingerprint (SHA1): CA:86:88:62:35:87:10:AC:E4:3D:E4:E6:FD:99:70:87:F2:14:EC:16 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2851: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121149 (0x1e67d4bd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:12:27 2017 Not After : Tue May 10 12:12:27 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:8a:2d:d4:ae:42:e5:3e:e5:d3:7c:b0:4a:20:ed:27: a4:ad:d3:a4:18:47:60:aa:2f:22:71:58:ce:ec:2b:47: df:92:ac:ad:6f:40:98:16:71:37:a3:4b:d3:ac:d7:91: fb:ab:fe:c5:c3:6e:61:32:31:5b:7e:0f:2a:33:ea:7f: af:9c:a8:cc:64:de:76:74:ac:4f:6d:39:01:96:3f:fc: 4d:4c:92:07:f9:6e:3d:a9:47:a2:f6:aa:5d:11:89:8a: 44:de:eb:f5:3b:b6:a9:19:2f:c7:7e:58:16:fb:f8:49: 2c:43:b4:46:b1:55:58:a3:da:79:33:1f:07:1d:f9:13: 97:b9:98:96:af:fe:39:ff:29:40:f6:fa:fc:21:26:f8: 61:8a:7b:e9:8c:b8:5d:52:1f:49:76:36:9c:f8:4a:7a: 46:1f:52:10:08:93:fc:72:0f:9c:86:15:11:f0:ca:93: a8:4d:5c:14:f0:63:5b:61:92:fc:5e:34:3e:27:fb:da: 3c:6f:86:99:e1:df:e3:1f:65:0e:b4:fd:08:9b:7d:f6: 76:88:4c:82:03:0f:41:67:d5:31:34:1a:bb:c4:bd:07: e0:b2:d9:1c:b3:7a:b0:4a:18:d1:63:df:7a:8e:30:03: 8a:59:d0:6a:24:b6:b4:5e:a7:d8:f1:7a:53:a4:39:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:b9:af:4c:40:3d:6a:70:a8:80:86:6b:d1:24:bc:65: 89:36:72:2e:2b:a8:aa:6a:d3:a6:b3:aa:35:5b:72:9b: 7f:fa:c3:15:25:b5:85:d1:f1:aa:56:df:4a:ce:98:db: f0:ef:e3:27:0a:43:79:e5:c4:51:56:70:61:27:fa:5d: 21:76:8b:fa:be:37:b3:ea:b5:38:23:64:b9:ed:95:8e: 02:41:fd:5a:79:18:db:d3:3e:0c:9c:01:cf:a8:3e:41: 14:c9:3d:84:b4:cb:97:d3:42:d5:44:7f:92:fa:c9:9b: 2a:b3:92:e0:4a:5c:ef:8e:0b:37:39:c6:1d:5f:e4:6a: 8c:99:e3:92:e9:92:15:8a:3f:bb:e7:74:bb:1a:c5:00: 9a:de:b7:4f:57:55:3e:54:3b:cf:21:9b:66:13:27:9e: a1:b6:72:b7:45:7e:d3:4b:44:1d:bc:4b:a3:ae:4f:ba: 93:96:a8:26:41:cd:87:ef:bd:00:ef:66:cb:30:a1:07: 88:89:e4:24:95:ff:fe:31:4f:81:51:75:5c:95:1a:c5: 8c:f1:0f:f1:cd:a9:90:1d:76:84:02:c7:d4:48:81:83: c4:e4:62:81:f8:bd:c7:fd:97:7a:dc:d6:4d:90:03:6a: f0:e8:fa:c1:6d:e2:35:53:3d:75:a6:06:71:7e:15:f3 Fingerprint (SHA-256): 34:69:43:00:79:C2:C5:BD:35:75:DC:C8:2B:3B:5E:93:D6:DD:5A:F4:57:17:CF:C9:98:46:EE:D3:CD:9A:C1:D0 Fingerprint (SHA1): 8F:68:51:B6:11:F6:2B:43:C0:86:1D:DE:C1:F5:C8:49:C3:65:BE:C1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2852: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121149 (0x1e67d4bd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:12:27 2017 Not After : Tue May 10 12:12:27 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:8a:2d:d4:ae:42:e5:3e:e5:d3:7c:b0:4a:20:ed:27: a4:ad:d3:a4:18:47:60:aa:2f:22:71:58:ce:ec:2b:47: df:92:ac:ad:6f:40:98:16:71:37:a3:4b:d3:ac:d7:91: fb:ab:fe:c5:c3:6e:61:32:31:5b:7e:0f:2a:33:ea:7f: af:9c:a8:cc:64:de:76:74:ac:4f:6d:39:01:96:3f:fc: 4d:4c:92:07:f9:6e:3d:a9:47:a2:f6:aa:5d:11:89:8a: 44:de:eb:f5:3b:b6:a9:19:2f:c7:7e:58:16:fb:f8:49: 2c:43:b4:46:b1:55:58:a3:da:79:33:1f:07:1d:f9:13: 97:b9:98:96:af:fe:39:ff:29:40:f6:fa:fc:21:26:f8: 61:8a:7b:e9:8c:b8:5d:52:1f:49:76:36:9c:f8:4a:7a: 46:1f:52:10:08:93:fc:72:0f:9c:86:15:11:f0:ca:93: a8:4d:5c:14:f0:63:5b:61:92:fc:5e:34:3e:27:fb:da: 3c:6f:86:99:e1:df:e3:1f:65:0e:b4:fd:08:9b:7d:f6: 76:88:4c:82:03:0f:41:67:d5:31:34:1a:bb:c4:bd:07: e0:b2:d9:1c:b3:7a:b0:4a:18:d1:63:df:7a:8e:30:03: 8a:59:d0:6a:24:b6:b4:5e:a7:d8:f1:7a:53:a4:39:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:b9:af:4c:40:3d:6a:70:a8:80:86:6b:d1:24:bc:65: 89:36:72:2e:2b:a8:aa:6a:d3:a6:b3:aa:35:5b:72:9b: 7f:fa:c3:15:25:b5:85:d1:f1:aa:56:df:4a:ce:98:db: f0:ef:e3:27:0a:43:79:e5:c4:51:56:70:61:27:fa:5d: 21:76:8b:fa:be:37:b3:ea:b5:38:23:64:b9:ed:95:8e: 02:41:fd:5a:79:18:db:d3:3e:0c:9c:01:cf:a8:3e:41: 14:c9:3d:84:b4:cb:97:d3:42:d5:44:7f:92:fa:c9:9b: 2a:b3:92:e0:4a:5c:ef:8e:0b:37:39:c6:1d:5f:e4:6a: 8c:99:e3:92:e9:92:15:8a:3f:bb:e7:74:bb:1a:c5:00: 9a:de:b7:4f:57:55:3e:54:3b:cf:21:9b:66:13:27:9e: a1:b6:72:b7:45:7e:d3:4b:44:1d:bc:4b:a3:ae:4f:ba: 93:96:a8:26:41:cd:87:ef:bd:00:ef:66:cb:30:a1:07: 88:89:e4:24:95:ff:fe:31:4f:81:51:75:5c:95:1a:c5: 8c:f1:0f:f1:cd:a9:90:1d:76:84:02:c7:d4:48:81:83: c4:e4:62:81:f8:bd:c7:fd:97:7a:dc:d6:4d:90:03:6a: f0:e8:fa:c1:6d:e2:35:53:3d:75:a6:06:71:7e:15:f3 Fingerprint (SHA-256): 34:69:43:00:79:C2:C5:BD:35:75:DC:C8:2B:3B:5E:93:D6:DD:5A:F4:57:17:CF:C9:98:46:EE:D3:CD:9A:C1:D0 Fingerprint (SHA1): 8F:68:51:B6:11:F6:2B:43:C0:86:1D:DE:C1:F5:C8:49:C3:65:BE:C1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2853: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121150 (0x1e67d4be) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:12:29 2017 Not After : Tue May 10 12:12:29 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:de:4d:12:7b:af:87:14:be:c9:aa:a3:6b:d3:8a:a1: 84:50:50:a8:13:55:3a:32:5c:81:2a:8a:07:3d:03:14: 75:75:61:61:e3:d3:92:78:a8:b4:dc:fa:f0:97:8f:a3: 70:f6:ae:f4:5f:72:4a:54:72:6e:f9:c8:86:ab:54:c1: c8:8c:dc:f6:42:a7:a3:d9:58:79:0b:01:6a:2f:45:b6: cd:71:cd:df:44:0e:15:82:bc:bc:e4:92:c8:74:92:dd: b8:7d:25:d1:77:67:30:e8:bf:9b:a7:6d:cf:82:61:c0: 71:f3:69:27:9c:ed:ae:f5:c5:58:22:c9:1f:ab:05:38: b1:ea:ba:0a:b5:08:06:68:7c:84:e2:96:85:9f:15:7a: fc:b0:39:94:3e:3d:48:7f:1a:03:3b:e1:f9:0f:c4:79: e9:3c:a9:68:41:27:63:14:0e:98:3a:72:55:56:22:bf: 4d:9d:40:d1:8d:68:f5:c8:86:12:bf:3f:b4:ba:c9:ca: 6d:87:38:ef:d6:4f:ca:1d:36:b5:04:d5:b3:84:e7:fb: 2f:04:fe:a3:14:03:81:05:13:c2:03:c5:df:72:eb:39: 4f:b8:ad:cf:73:f1:c8:ec:9a:0a:96:34:04:9f:a8:b6: 9c:2a:a9:3a:93:fa:61:e1:71:86:96:d0:c7:c2:3e:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:6d:b9:87:11:fa:de:c8:6f:49:ee:68:e3:3a:f0:60: e5:6d:8d:0f:c0:df:5e:d9:50:22:7c:7c:49:18:6e:c8: 80:61:66:93:be:c5:5a:29:cc:89:d1:4a:b6:86:c5:b4: f3:5a:02:54:ab:32:2d:2c:3f:4b:7f:1c:cd:3f:7d:43: 89:4b:1e:e3:9f:4a:43:0d:56:47:a7:2e:d8:fe:b1:63: 3c:66:8b:2f:e4:e0:21:76:a5:41:7f:86:05:ec:2c:78: 20:22:6d:12:11:b1:b1:85:03:03:28:85:32:89:28:bf: 08:0f:a9:e5:0c:36:b1:82:f5:cc:8b:47:fb:43:2c:ec: 58:af:d0:b1:7a:e3:4f:b2:f1:f3:61:30:d7:f5:a8:52: 4d:8c:92:46:84:77:7a:5d:36:6e:dc:bb:0e:d3:2e:31: fe:08:01:3b:e5:59:22:0c:4b:bd:c4:27:70:e6:2a:f4: 2d:1a:0f:88:7d:49:34:0c:dc:8f:7e:53:e1:2d:99:b4: 12:01:0d:b5:6a:50:f9:4d:04:86:e1:cf:7d:29:fa:bb: 34:aa:7f:3c:09:d3:79:c1:d4:b7:73:1f:66:3e:42:d7: 8d:60:f5:31:3c:96:30:b7:02:1d:ae:57:49:96:8f:a6: 38:ca:a3:4c:1a:a1:dd:c2:9e:83:37:af:d9:01:37:dd Fingerprint (SHA-256): 3C:3E:74:53:ED:06:0C:61:99:CC:0B:1F:5D:C2:5D:6A:D4:F9:52:9D:59:E1:2F:AA:62:DC:B0:5F:84:1D:89:B6 Fingerprint (SHA1): E8:63:32:34:F6:A9:FC:D6:5E:59:63:A0:49:3E:F6:69:25:F6:FD:01 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #2854: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121150 (0x1e67d4be) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:12:29 2017 Not After : Tue May 10 12:12:29 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:de:4d:12:7b:af:87:14:be:c9:aa:a3:6b:d3:8a:a1: 84:50:50:a8:13:55:3a:32:5c:81:2a:8a:07:3d:03:14: 75:75:61:61:e3:d3:92:78:a8:b4:dc:fa:f0:97:8f:a3: 70:f6:ae:f4:5f:72:4a:54:72:6e:f9:c8:86:ab:54:c1: c8:8c:dc:f6:42:a7:a3:d9:58:79:0b:01:6a:2f:45:b6: cd:71:cd:df:44:0e:15:82:bc:bc:e4:92:c8:74:92:dd: b8:7d:25:d1:77:67:30:e8:bf:9b:a7:6d:cf:82:61:c0: 71:f3:69:27:9c:ed:ae:f5:c5:58:22:c9:1f:ab:05:38: b1:ea:ba:0a:b5:08:06:68:7c:84:e2:96:85:9f:15:7a: fc:b0:39:94:3e:3d:48:7f:1a:03:3b:e1:f9:0f:c4:79: e9:3c:a9:68:41:27:63:14:0e:98:3a:72:55:56:22:bf: 4d:9d:40:d1:8d:68:f5:c8:86:12:bf:3f:b4:ba:c9:ca: 6d:87:38:ef:d6:4f:ca:1d:36:b5:04:d5:b3:84:e7:fb: 2f:04:fe:a3:14:03:81:05:13:c2:03:c5:df:72:eb:39: 4f:b8:ad:cf:73:f1:c8:ec:9a:0a:96:34:04:9f:a8:b6: 9c:2a:a9:3a:93:fa:61:e1:71:86:96:d0:c7:c2:3e:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:6d:b9:87:11:fa:de:c8:6f:49:ee:68:e3:3a:f0:60: e5:6d:8d:0f:c0:df:5e:d9:50:22:7c:7c:49:18:6e:c8: 80:61:66:93:be:c5:5a:29:cc:89:d1:4a:b6:86:c5:b4: f3:5a:02:54:ab:32:2d:2c:3f:4b:7f:1c:cd:3f:7d:43: 89:4b:1e:e3:9f:4a:43:0d:56:47:a7:2e:d8:fe:b1:63: 3c:66:8b:2f:e4:e0:21:76:a5:41:7f:86:05:ec:2c:78: 20:22:6d:12:11:b1:b1:85:03:03:28:85:32:89:28:bf: 08:0f:a9:e5:0c:36:b1:82:f5:cc:8b:47:fb:43:2c:ec: 58:af:d0:b1:7a:e3:4f:b2:f1:f3:61:30:d7:f5:a8:52: 4d:8c:92:46:84:77:7a:5d:36:6e:dc:bb:0e:d3:2e:31: fe:08:01:3b:e5:59:22:0c:4b:bd:c4:27:70:e6:2a:f4: 2d:1a:0f:88:7d:49:34:0c:dc:8f:7e:53:e1:2d:99:b4: 12:01:0d:b5:6a:50:f9:4d:04:86:e1:cf:7d:29:fa:bb: 34:aa:7f:3c:09:d3:79:c1:d4:b7:73:1f:66:3e:42:d7: 8d:60:f5:31:3c:96:30:b7:02:1d:ae:57:49:96:8f:a6: 38:ca:a3:4c:1a:a1:dd:c2:9e:83:37:af:d9:01:37:dd Fingerprint (SHA-256): 3C:3E:74:53:ED:06:0C:61:99:CC:0B:1F:5D:C2:5D:6A:D4:F9:52:9D:59:E1:2F:AA:62:DC:B0:5F:84:1D:89:B6 Fingerprint (SHA1): E8:63:32:34:F6:A9:FC:D6:5E:59:63:A0:49:3E:F6:69:25:F6:FD:01 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #2855: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #2856: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121153 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2857: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #2858: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2859: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2860: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 510121154 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2861: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2862: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2863: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2864: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510121155 --extCP --extIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #2865: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2866: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #2867: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2868: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 510121156 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2869: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2870: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #2871: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2872: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 510121157 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2873: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2874: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #2875: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2876: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 510121158 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2877: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2878: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #2879: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2880: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 510121159 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2881: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2882: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2883: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #2884: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #2885: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #2886: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #2887: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121153 (0x1e67d4c1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:12:35 2017 Not After : Tue May 10 12:12:35 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:5b:07:82:98:7d:26:10:c5:98:60:4f:d1:a0:c3:65: 76:78:ec:81:0a:51:3d:2e:78:4c:84:e5:4f:6e:31:db: 18:91:0a:f6:a1:67:d2:e5:45:db:2b:0a:b9:a4:0a:8e: e2:0b:91:49:88:d9:28:d4:65:4c:50:2f:64:03:9e:52: 9e:19:e1:d7:a2:de:27:c1:65:c2:cb:c7:a3:36:18:12: 4b:2d:11:0e:01:dd:74:bd:59:95:6f:aa:0b:f3:65:b3: d3:98:0f:2f:3b:4b:eb:39:d3:b7:e4:75:83:89:32:be: 41:1d:69:2a:4b:e6:41:ab:f0:be:87:98:51:8e:4d:b1: 86:20:9d:19:52:06:2d:cb:87:2d:03:2c:86:b1:33:97: 64:fa:89:ee:06:59:ce:02:42:b8:2b:41:dc:cc:51:3c: c6:60:c0:98:6f:69:58:4d:30:46:b1:6e:d9:95:b2:fc: 7e:4d:50:a5:d4:b9:32:21:6c:50:16:8d:f5:5d:21:19: d7:82:b3:b2:e1:2e:94:d7:6e:49:ba:36:82:e5:85:04: 1c:99:1e:44:bc:4b:65:00:22:2d:c5:79:07:55:93:75: 50:66:f1:81:63:17:54:ec:26:97:6f:f7:1d:5e:15:01: fb:ea:73:82:b4:69:bb:e4:c4:59:ea:32:5d:ce:00:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 74:10:66:2f:fe:7d:f2:98:a2:b1:07:fc:1c:3f:7a:e9: 27:6d:7d:f6:bb:b2:c0:3b:ad:0d:e6:0c:f2:ff:8c:75: 45:50:c9:2c:84:2f:c8:86:bb:ae:38:22:a1:f8:92:55: de:48:6d:b6:5e:bd:11:e7:e5:b7:4e:24:96:ac:78:ce: 1d:8c:66:b3:7d:45:ad:4d:6c:82:23:0c:e1:5d:12:03: 55:34:aa:73:cc:a8:09:b0:39:1d:84:84:96:c5:92:e2: ce:9a:4d:47:4d:b3:b9:95:28:5b:2d:eb:69:e1:58:29: 76:f5:fe:41:08:f1:fc:42:4d:93:fd:90:35:c1:f1:2d: 64:05:e6:8f:ed:a4:73:81:34:32:5f:0d:85:ff:3b:fb: 88:52:2e:cf:a4:86:42:f0:70:76:47:f1:5f:62:98:b5: a0:7a:73:01:9f:8c:4e:da:bb:7d:b1:93:9c:98:71:40: f5:16:db:14:27:38:84:e7:06:fd:fd:2a:3e:52:25:0b: 69:82:a0:dd:c9:4e:df:e6:bd:c4:d7:db:83:ec:f3:1d: 7f:54:85:33:c8:5b:31:22:d5:bf:90:57:07:7d:bd:8f: a2:66:1f:d6:fe:ef:66:2a:7a:df:cb:f2:9f:c5:95:50: 8e:f8:21:3e:a2:34:46:ce:ca:ea:28:fa:29:1b:cc:54 Fingerprint (SHA-256): D0:9B:EF:71:97:9B:36:7D:D6:66:6F:3D:C4:73:3A:51:96:6B:2C:8F:EF:6D:73:6F:0C:2A:5F:FD:1A:09:76:91 Fingerprint (SHA1): D1:F9:D6:1B:37:90:15:F8:43:C1:74:34:91:47:01:2E:DA:A0:E9:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2888: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2889: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2890: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2891: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121153 (0x1e67d4c1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:12:35 2017 Not After : Tue May 10 12:12:35 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:5b:07:82:98:7d:26:10:c5:98:60:4f:d1:a0:c3:65: 76:78:ec:81:0a:51:3d:2e:78:4c:84:e5:4f:6e:31:db: 18:91:0a:f6:a1:67:d2:e5:45:db:2b:0a:b9:a4:0a:8e: e2:0b:91:49:88:d9:28:d4:65:4c:50:2f:64:03:9e:52: 9e:19:e1:d7:a2:de:27:c1:65:c2:cb:c7:a3:36:18:12: 4b:2d:11:0e:01:dd:74:bd:59:95:6f:aa:0b:f3:65:b3: d3:98:0f:2f:3b:4b:eb:39:d3:b7:e4:75:83:89:32:be: 41:1d:69:2a:4b:e6:41:ab:f0:be:87:98:51:8e:4d:b1: 86:20:9d:19:52:06:2d:cb:87:2d:03:2c:86:b1:33:97: 64:fa:89:ee:06:59:ce:02:42:b8:2b:41:dc:cc:51:3c: c6:60:c0:98:6f:69:58:4d:30:46:b1:6e:d9:95:b2:fc: 7e:4d:50:a5:d4:b9:32:21:6c:50:16:8d:f5:5d:21:19: d7:82:b3:b2:e1:2e:94:d7:6e:49:ba:36:82:e5:85:04: 1c:99:1e:44:bc:4b:65:00:22:2d:c5:79:07:55:93:75: 50:66:f1:81:63:17:54:ec:26:97:6f:f7:1d:5e:15:01: fb:ea:73:82:b4:69:bb:e4:c4:59:ea:32:5d:ce:00:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 74:10:66:2f:fe:7d:f2:98:a2:b1:07:fc:1c:3f:7a:e9: 27:6d:7d:f6:bb:b2:c0:3b:ad:0d:e6:0c:f2:ff:8c:75: 45:50:c9:2c:84:2f:c8:86:bb:ae:38:22:a1:f8:92:55: de:48:6d:b6:5e:bd:11:e7:e5:b7:4e:24:96:ac:78:ce: 1d:8c:66:b3:7d:45:ad:4d:6c:82:23:0c:e1:5d:12:03: 55:34:aa:73:cc:a8:09:b0:39:1d:84:84:96:c5:92:e2: ce:9a:4d:47:4d:b3:b9:95:28:5b:2d:eb:69:e1:58:29: 76:f5:fe:41:08:f1:fc:42:4d:93:fd:90:35:c1:f1:2d: 64:05:e6:8f:ed:a4:73:81:34:32:5f:0d:85:ff:3b:fb: 88:52:2e:cf:a4:86:42:f0:70:76:47:f1:5f:62:98:b5: a0:7a:73:01:9f:8c:4e:da:bb:7d:b1:93:9c:98:71:40: f5:16:db:14:27:38:84:e7:06:fd:fd:2a:3e:52:25:0b: 69:82:a0:dd:c9:4e:df:e6:bd:c4:d7:db:83:ec:f3:1d: 7f:54:85:33:c8:5b:31:22:d5:bf:90:57:07:7d:bd:8f: a2:66:1f:d6:fe:ef:66:2a:7a:df:cb:f2:9f:c5:95:50: 8e:f8:21:3e:a2:34:46:ce:ca:ea:28:fa:29:1b:cc:54 Fingerprint (SHA-256): D0:9B:EF:71:97:9B:36:7D:D6:66:6F:3D:C4:73:3A:51:96:6B:2C:8F:EF:6D:73:6F:0C:2A:5F:FD:1A:09:76:91 Fingerprint (SHA1): D1:F9:D6:1B:37:90:15:F8:43:C1:74:34:91:47:01:2E:DA:A0:E9:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2892: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2893: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #2894: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121160 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2895: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #2896: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2897: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2898: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 510121161 --extCP --extIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #2899: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2900: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #2901: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2902: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 510121162 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2903: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2904: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #2905: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2906: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 510121163 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2907: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2908: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2909: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2910: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 510121164 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2911: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2912: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #2913: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2914: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 510121165 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2915: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2916: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #2917: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2918: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 510121166 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2919: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2920: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #2921: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2922: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 510121167 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2923: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2924: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #2925: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2926: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 510121168 --extCP --extIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #2927: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2928: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #2929: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2930: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 510121169 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2931: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2932: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #2933: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2934: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 510121170 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2935: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2936: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #2937: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2938: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 510121171 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2939: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2940: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #2941: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2942: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 510121172 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2943: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2944: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #2945: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2946: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 510121173 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2947: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2948: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #2949: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2950: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 510121174 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2951: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2952: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #2953: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2954: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 510121175 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2955: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2956: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #2957: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2958: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 510121176 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2959: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2960: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #2961: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2962: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 510121177 --extCP --extIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #2963: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2964: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #2965: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2966: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 510121178 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2967: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2968: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #2969: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2970: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 510121179 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2971: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2972: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #2973: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2974: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 510121180 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2975: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2976: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #2977: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2978: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 510121181 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2979: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2980: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #2981: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2982: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 510121182 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2983: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2984: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #2985: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2986: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 510121183 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2987: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2988: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #2989: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2990: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 510121184 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2991: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2992: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #2993: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2994: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 510121185 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2995: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2996: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #2997: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2998: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 510121186 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2999: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3000: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #3001: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3002: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 510121187 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3003: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3004: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #3005: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3006: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 510121188 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3007: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3008: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #3009: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3010: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 510121189 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3011: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3012: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3013: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121160 (0x1e67d4c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:12:43 2017 Not After : Tue May 10 12:12:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:bc:0a:c0:ad:98:4b:99:34:8e:23:ae:12:aa:c6:32: c6:9d:cf:2e:d7:98:6b:b7:2b:4f:37:3c:09:aa:37:49: c1:a0:7c:ca:8b:a5:ba:20:92:3e:96:c3:ef:89:08:3b: 6a:87:85:97:e2:d9:07:81:0f:2a:31:37:31:73:f2:4f: ff:88:01:72:76:4f:b1:e9:d1:9e:73:b9:a6:ac:5d:97: c0:3d:42:84:a4:91:79:99:e7:ff:97:bf:b8:c3:81:34: dd:ac:00:5c:27:35:f8:62:2c:57:da:11:7d:5f:99:00: e4:54:04:8e:27:18:83:3b:cc:fd:40:1f:64:b1:5b:44: c9:6f:f5:5e:ab:3f:39:95:61:f7:64:f8:e1:98:13:78: 7b:f2:4d:69:7e:0a:c3:0e:0a:c8:6f:cf:a1:fc:e4:b2: 67:ea:32:c0:24:ef:65:b9:82:7c:d2:ae:e8:fe:2d:46: b1:1a:45:0c:91:11:a3:d2:1e:b0:7c:7e:e0:84:de:5b: 5f:b6:d9:5c:ca:3e:48:94:28:48:fa:79:90:b8:9e:9c: 2a:0c:34:b0:5b:1c:51:9a:f9:db:d4:75:45:eb:0c:d4: d6:99:a6:a5:0f:4b:30:2e:fd:97:cf:4a:21:26:74:ee: 3f:70:82:60:45:02:31:d3:43:9a:f0:10:72:98:2b:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:e0:9f:72:a3:33:93:6d:bc:95:e1:d4:97:36:1b:65: 7c:21:6b:ef:21:92:75:e5:97:e0:d1:6a:f3:35:03:c2: 80:c6:87:b8:31:cb:52:fe:96:28:e3:df:e5:b7:8b:5a: 9b:31:10:fd:d0:be:49:94:3c:06:cd:ad:c6:76:f0:1b: 02:b6:a1:cb:8b:d3:4d:b3:5c:f6:77:87:f4:3b:5d:8e: 84:d1:e3:ec:cd:36:fa:89:73:35:11:db:58:7d:5e:8f: f7:9b:e5:b1:39:f8:ed:32:fe:07:75:cb:4d:d4:66:61: de:91:a6:7c:27:bc:c3:6a:4c:aa:44:aa:d3:ba:8a:ca: 31:00:d5:2b:ac:ce:b3:82:41:15:86:c7:73:2c:b6:d3: 47:97:71:01:26:b1:fa:b3:53:1a:9f:d8:ec:3a:f1:e9: db:46:ce:95:48:09:9a:52:1e:2e:58:e3:54:25:aa:27: b9:7d:9b:59:96:a6:35:8b:a7:20:e3:1e:0f:29:c9:bd: d4:21:c1:01:e3:25:74:c0:4a:59:2e:e4:99:35:bf:f8: 19:e7:11:39:e8:4c:6b:7d:a0:61:45:75:fa:71:b5:d1: 03:b7:5f:ca:b3:7a:8a:27:b6:9d:d7:3d:66:79:b6:7e: b1:0a:58:9e:25:e6:51:8d:5c:35:2f:b7:5f:3e:58:c5 Fingerprint (SHA-256): D2:6D:E0:25:3F:1C:48:77:34:C0:60:70:BD:E3:B9:AB:A4:D7:0A:5C:C3:4E:BE:6B:B2:00:1F:5F:C4:1C:5E:E3 Fingerprint (SHA1): 89:5D:58:E0:DA:1C:54:9F:A5:31:4D:D9:BF:26:66:5C:30:F5:B9:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3014: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3015: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121160 (0x1e67d4c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:12:43 2017 Not After : Tue May 10 12:12:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:bc:0a:c0:ad:98:4b:99:34:8e:23:ae:12:aa:c6:32: c6:9d:cf:2e:d7:98:6b:b7:2b:4f:37:3c:09:aa:37:49: c1:a0:7c:ca:8b:a5:ba:20:92:3e:96:c3:ef:89:08:3b: 6a:87:85:97:e2:d9:07:81:0f:2a:31:37:31:73:f2:4f: ff:88:01:72:76:4f:b1:e9:d1:9e:73:b9:a6:ac:5d:97: c0:3d:42:84:a4:91:79:99:e7:ff:97:bf:b8:c3:81:34: dd:ac:00:5c:27:35:f8:62:2c:57:da:11:7d:5f:99:00: e4:54:04:8e:27:18:83:3b:cc:fd:40:1f:64:b1:5b:44: c9:6f:f5:5e:ab:3f:39:95:61:f7:64:f8:e1:98:13:78: 7b:f2:4d:69:7e:0a:c3:0e:0a:c8:6f:cf:a1:fc:e4:b2: 67:ea:32:c0:24:ef:65:b9:82:7c:d2:ae:e8:fe:2d:46: b1:1a:45:0c:91:11:a3:d2:1e:b0:7c:7e:e0:84:de:5b: 5f:b6:d9:5c:ca:3e:48:94:28:48:fa:79:90:b8:9e:9c: 2a:0c:34:b0:5b:1c:51:9a:f9:db:d4:75:45:eb:0c:d4: d6:99:a6:a5:0f:4b:30:2e:fd:97:cf:4a:21:26:74:ee: 3f:70:82:60:45:02:31:d3:43:9a:f0:10:72:98:2b:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:e0:9f:72:a3:33:93:6d:bc:95:e1:d4:97:36:1b:65: 7c:21:6b:ef:21:92:75:e5:97:e0:d1:6a:f3:35:03:c2: 80:c6:87:b8:31:cb:52:fe:96:28:e3:df:e5:b7:8b:5a: 9b:31:10:fd:d0:be:49:94:3c:06:cd:ad:c6:76:f0:1b: 02:b6:a1:cb:8b:d3:4d:b3:5c:f6:77:87:f4:3b:5d:8e: 84:d1:e3:ec:cd:36:fa:89:73:35:11:db:58:7d:5e:8f: f7:9b:e5:b1:39:f8:ed:32:fe:07:75:cb:4d:d4:66:61: de:91:a6:7c:27:bc:c3:6a:4c:aa:44:aa:d3:ba:8a:ca: 31:00:d5:2b:ac:ce:b3:82:41:15:86:c7:73:2c:b6:d3: 47:97:71:01:26:b1:fa:b3:53:1a:9f:d8:ec:3a:f1:e9: db:46:ce:95:48:09:9a:52:1e:2e:58:e3:54:25:aa:27: b9:7d:9b:59:96:a6:35:8b:a7:20:e3:1e:0f:29:c9:bd: d4:21:c1:01:e3:25:74:c0:4a:59:2e:e4:99:35:bf:f8: 19:e7:11:39:e8:4c:6b:7d:a0:61:45:75:fa:71:b5:d1: 03:b7:5f:ca:b3:7a:8a:27:b6:9d:d7:3d:66:79:b6:7e: b1:0a:58:9e:25:e6:51:8d:5c:35:2f:b7:5f:3e:58:c5 Fingerprint (SHA-256): D2:6D:E0:25:3F:1C:48:77:34:C0:60:70:BD:E3:B9:AB:A4:D7:0A:5C:C3:4E:BE:6B:B2:00:1F:5F:C4:1C:5E:E3 Fingerprint (SHA1): 89:5D:58:E0:DA:1C:54:9F:A5:31:4D:D9:BF:26:66:5C:30:F5:B9:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3016: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3017: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3018: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3019: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121160 (0x1e67d4c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:12:43 2017 Not After : Tue May 10 12:12:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:bc:0a:c0:ad:98:4b:99:34:8e:23:ae:12:aa:c6:32: c6:9d:cf:2e:d7:98:6b:b7:2b:4f:37:3c:09:aa:37:49: c1:a0:7c:ca:8b:a5:ba:20:92:3e:96:c3:ef:89:08:3b: 6a:87:85:97:e2:d9:07:81:0f:2a:31:37:31:73:f2:4f: ff:88:01:72:76:4f:b1:e9:d1:9e:73:b9:a6:ac:5d:97: c0:3d:42:84:a4:91:79:99:e7:ff:97:bf:b8:c3:81:34: dd:ac:00:5c:27:35:f8:62:2c:57:da:11:7d:5f:99:00: e4:54:04:8e:27:18:83:3b:cc:fd:40:1f:64:b1:5b:44: c9:6f:f5:5e:ab:3f:39:95:61:f7:64:f8:e1:98:13:78: 7b:f2:4d:69:7e:0a:c3:0e:0a:c8:6f:cf:a1:fc:e4:b2: 67:ea:32:c0:24:ef:65:b9:82:7c:d2:ae:e8:fe:2d:46: b1:1a:45:0c:91:11:a3:d2:1e:b0:7c:7e:e0:84:de:5b: 5f:b6:d9:5c:ca:3e:48:94:28:48:fa:79:90:b8:9e:9c: 2a:0c:34:b0:5b:1c:51:9a:f9:db:d4:75:45:eb:0c:d4: d6:99:a6:a5:0f:4b:30:2e:fd:97:cf:4a:21:26:74:ee: 3f:70:82:60:45:02:31:d3:43:9a:f0:10:72:98:2b:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:e0:9f:72:a3:33:93:6d:bc:95:e1:d4:97:36:1b:65: 7c:21:6b:ef:21:92:75:e5:97:e0:d1:6a:f3:35:03:c2: 80:c6:87:b8:31:cb:52:fe:96:28:e3:df:e5:b7:8b:5a: 9b:31:10:fd:d0:be:49:94:3c:06:cd:ad:c6:76:f0:1b: 02:b6:a1:cb:8b:d3:4d:b3:5c:f6:77:87:f4:3b:5d:8e: 84:d1:e3:ec:cd:36:fa:89:73:35:11:db:58:7d:5e:8f: f7:9b:e5:b1:39:f8:ed:32:fe:07:75:cb:4d:d4:66:61: de:91:a6:7c:27:bc:c3:6a:4c:aa:44:aa:d3:ba:8a:ca: 31:00:d5:2b:ac:ce:b3:82:41:15:86:c7:73:2c:b6:d3: 47:97:71:01:26:b1:fa:b3:53:1a:9f:d8:ec:3a:f1:e9: db:46:ce:95:48:09:9a:52:1e:2e:58:e3:54:25:aa:27: b9:7d:9b:59:96:a6:35:8b:a7:20:e3:1e:0f:29:c9:bd: d4:21:c1:01:e3:25:74:c0:4a:59:2e:e4:99:35:bf:f8: 19:e7:11:39:e8:4c:6b:7d:a0:61:45:75:fa:71:b5:d1: 03:b7:5f:ca:b3:7a:8a:27:b6:9d:d7:3d:66:79:b6:7e: b1:0a:58:9e:25:e6:51:8d:5c:35:2f:b7:5f:3e:58:c5 Fingerprint (SHA-256): D2:6D:E0:25:3F:1C:48:77:34:C0:60:70:BD:E3:B9:AB:A4:D7:0A:5C:C3:4E:BE:6B:B2:00:1F:5F:C4:1C:5E:E3 Fingerprint (SHA1): 89:5D:58:E0:DA:1C:54:9F:A5:31:4D:D9:BF:26:66:5C:30:F5:B9:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3020: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3021: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3022: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3023: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121160 (0x1e67d4c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:12:43 2017 Not After : Tue May 10 12:12:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:bc:0a:c0:ad:98:4b:99:34:8e:23:ae:12:aa:c6:32: c6:9d:cf:2e:d7:98:6b:b7:2b:4f:37:3c:09:aa:37:49: c1:a0:7c:ca:8b:a5:ba:20:92:3e:96:c3:ef:89:08:3b: 6a:87:85:97:e2:d9:07:81:0f:2a:31:37:31:73:f2:4f: ff:88:01:72:76:4f:b1:e9:d1:9e:73:b9:a6:ac:5d:97: c0:3d:42:84:a4:91:79:99:e7:ff:97:bf:b8:c3:81:34: dd:ac:00:5c:27:35:f8:62:2c:57:da:11:7d:5f:99:00: e4:54:04:8e:27:18:83:3b:cc:fd:40:1f:64:b1:5b:44: c9:6f:f5:5e:ab:3f:39:95:61:f7:64:f8:e1:98:13:78: 7b:f2:4d:69:7e:0a:c3:0e:0a:c8:6f:cf:a1:fc:e4:b2: 67:ea:32:c0:24:ef:65:b9:82:7c:d2:ae:e8:fe:2d:46: b1:1a:45:0c:91:11:a3:d2:1e:b0:7c:7e:e0:84:de:5b: 5f:b6:d9:5c:ca:3e:48:94:28:48:fa:79:90:b8:9e:9c: 2a:0c:34:b0:5b:1c:51:9a:f9:db:d4:75:45:eb:0c:d4: d6:99:a6:a5:0f:4b:30:2e:fd:97:cf:4a:21:26:74:ee: 3f:70:82:60:45:02:31:d3:43:9a:f0:10:72:98:2b:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:e0:9f:72:a3:33:93:6d:bc:95:e1:d4:97:36:1b:65: 7c:21:6b:ef:21:92:75:e5:97:e0:d1:6a:f3:35:03:c2: 80:c6:87:b8:31:cb:52:fe:96:28:e3:df:e5:b7:8b:5a: 9b:31:10:fd:d0:be:49:94:3c:06:cd:ad:c6:76:f0:1b: 02:b6:a1:cb:8b:d3:4d:b3:5c:f6:77:87:f4:3b:5d:8e: 84:d1:e3:ec:cd:36:fa:89:73:35:11:db:58:7d:5e:8f: f7:9b:e5:b1:39:f8:ed:32:fe:07:75:cb:4d:d4:66:61: de:91:a6:7c:27:bc:c3:6a:4c:aa:44:aa:d3:ba:8a:ca: 31:00:d5:2b:ac:ce:b3:82:41:15:86:c7:73:2c:b6:d3: 47:97:71:01:26:b1:fa:b3:53:1a:9f:d8:ec:3a:f1:e9: db:46:ce:95:48:09:9a:52:1e:2e:58:e3:54:25:aa:27: b9:7d:9b:59:96:a6:35:8b:a7:20:e3:1e:0f:29:c9:bd: d4:21:c1:01:e3:25:74:c0:4a:59:2e:e4:99:35:bf:f8: 19:e7:11:39:e8:4c:6b:7d:a0:61:45:75:fa:71:b5:d1: 03:b7:5f:ca:b3:7a:8a:27:b6:9d:d7:3d:66:79:b6:7e: b1:0a:58:9e:25:e6:51:8d:5c:35:2f:b7:5f:3e:58:c5 Fingerprint (SHA-256): D2:6D:E0:25:3F:1C:48:77:34:C0:60:70:BD:E3:B9:AB:A4:D7:0A:5C:C3:4E:BE:6B:B2:00:1F:5F:C4:1C:5E:E3 Fingerprint (SHA1): 89:5D:58:E0:DA:1C:54:9F:A5:31:4D:D9:BF:26:66:5C:30:F5:B9:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3024: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121160 (0x1e67d4c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:12:43 2017 Not After : Tue May 10 12:12:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:bc:0a:c0:ad:98:4b:99:34:8e:23:ae:12:aa:c6:32: c6:9d:cf:2e:d7:98:6b:b7:2b:4f:37:3c:09:aa:37:49: c1:a0:7c:ca:8b:a5:ba:20:92:3e:96:c3:ef:89:08:3b: 6a:87:85:97:e2:d9:07:81:0f:2a:31:37:31:73:f2:4f: ff:88:01:72:76:4f:b1:e9:d1:9e:73:b9:a6:ac:5d:97: c0:3d:42:84:a4:91:79:99:e7:ff:97:bf:b8:c3:81:34: dd:ac:00:5c:27:35:f8:62:2c:57:da:11:7d:5f:99:00: e4:54:04:8e:27:18:83:3b:cc:fd:40:1f:64:b1:5b:44: c9:6f:f5:5e:ab:3f:39:95:61:f7:64:f8:e1:98:13:78: 7b:f2:4d:69:7e:0a:c3:0e:0a:c8:6f:cf:a1:fc:e4:b2: 67:ea:32:c0:24:ef:65:b9:82:7c:d2:ae:e8:fe:2d:46: b1:1a:45:0c:91:11:a3:d2:1e:b0:7c:7e:e0:84:de:5b: 5f:b6:d9:5c:ca:3e:48:94:28:48:fa:79:90:b8:9e:9c: 2a:0c:34:b0:5b:1c:51:9a:f9:db:d4:75:45:eb:0c:d4: d6:99:a6:a5:0f:4b:30:2e:fd:97:cf:4a:21:26:74:ee: 3f:70:82:60:45:02:31:d3:43:9a:f0:10:72:98:2b:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:e0:9f:72:a3:33:93:6d:bc:95:e1:d4:97:36:1b:65: 7c:21:6b:ef:21:92:75:e5:97:e0:d1:6a:f3:35:03:c2: 80:c6:87:b8:31:cb:52:fe:96:28:e3:df:e5:b7:8b:5a: 9b:31:10:fd:d0:be:49:94:3c:06:cd:ad:c6:76:f0:1b: 02:b6:a1:cb:8b:d3:4d:b3:5c:f6:77:87:f4:3b:5d:8e: 84:d1:e3:ec:cd:36:fa:89:73:35:11:db:58:7d:5e:8f: f7:9b:e5:b1:39:f8:ed:32:fe:07:75:cb:4d:d4:66:61: de:91:a6:7c:27:bc:c3:6a:4c:aa:44:aa:d3:ba:8a:ca: 31:00:d5:2b:ac:ce:b3:82:41:15:86:c7:73:2c:b6:d3: 47:97:71:01:26:b1:fa:b3:53:1a:9f:d8:ec:3a:f1:e9: db:46:ce:95:48:09:9a:52:1e:2e:58:e3:54:25:aa:27: b9:7d:9b:59:96:a6:35:8b:a7:20:e3:1e:0f:29:c9:bd: d4:21:c1:01:e3:25:74:c0:4a:59:2e:e4:99:35:bf:f8: 19:e7:11:39:e8:4c:6b:7d:a0:61:45:75:fa:71:b5:d1: 03:b7:5f:ca:b3:7a:8a:27:b6:9d:d7:3d:66:79:b6:7e: b1:0a:58:9e:25:e6:51:8d:5c:35:2f:b7:5f:3e:58:c5 Fingerprint (SHA-256): D2:6D:E0:25:3F:1C:48:77:34:C0:60:70:BD:E3:B9:AB:A4:D7:0A:5C:C3:4E:BE:6B:B2:00:1F:5F:C4:1C:5E:E3 Fingerprint (SHA1): 89:5D:58:E0:DA:1C:54:9F:A5:31:4D:D9:BF:26:66:5C:30:F5:B9:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3025: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3026: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121160 (0x1e67d4c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:12:43 2017 Not After : Tue May 10 12:12:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:bc:0a:c0:ad:98:4b:99:34:8e:23:ae:12:aa:c6:32: c6:9d:cf:2e:d7:98:6b:b7:2b:4f:37:3c:09:aa:37:49: c1:a0:7c:ca:8b:a5:ba:20:92:3e:96:c3:ef:89:08:3b: 6a:87:85:97:e2:d9:07:81:0f:2a:31:37:31:73:f2:4f: ff:88:01:72:76:4f:b1:e9:d1:9e:73:b9:a6:ac:5d:97: c0:3d:42:84:a4:91:79:99:e7:ff:97:bf:b8:c3:81:34: dd:ac:00:5c:27:35:f8:62:2c:57:da:11:7d:5f:99:00: e4:54:04:8e:27:18:83:3b:cc:fd:40:1f:64:b1:5b:44: c9:6f:f5:5e:ab:3f:39:95:61:f7:64:f8:e1:98:13:78: 7b:f2:4d:69:7e:0a:c3:0e:0a:c8:6f:cf:a1:fc:e4:b2: 67:ea:32:c0:24:ef:65:b9:82:7c:d2:ae:e8:fe:2d:46: b1:1a:45:0c:91:11:a3:d2:1e:b0:7c:7e:e0:84:de:5b: 5f:b6:d9:5c:ca:3e:48:94:28:48:fa:79:90:b8:9e:9c: 2a:0c:34:b0:5b:1c:51:9a:f9:db:d4:75:45:eb:0c:d4: d6:99:a6:a5:0f:4b:30:2e:fd:97:cf:4a:21:26:74:ee: 3f:70:82:60:45:02:31:d3:43:9a:f0:10:72:98:2b:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:e0:9f:72:a3:33:93:6d:bc:95:e1:d4:97:36:1b:65: 7c:21:6b:ef:21:92:75:e5:97:e0:d1:6a:f3:35:03:c2: 80:c6:87:b8:31:cb:52:fe:96:28:e3:df:e5:b7:8b:5a: 9b:31:10:fd:d0:be:49:94:3c:06:cd:ad:c6:76:f0:1b: 02:b6:a1:cb:8b:d3:4d:b3:5c:f6:77:87:f4:3b:5d:8e: 84:d1:e3:ec:cd:36:fa:89:73:35:11:db:58:7d:5e:8f: f7:9b:e5:b1:39:f8:ed:32:fe:07:75:cb:4d:d4:66:61: de:91:a6:7c:27:bc:c3:6a:4c:aa:44:aa:d3:ba:8a:ca: 31:00:d5:2b:ac:ce:b3:82:41:15:86:c7:73:2c:b6:d3: 47:97:71:01:26:b1:fa:b3:53:1a:9f:d8:ec:3a:f1:e9: db:46:ce:95:48:09:9a:52:1e:2e:58:e3:54:25:aa:27: b9:7d:9b:59:96:a6:35:8b:a7:20:e3:1e:0f:29:c9:bd: d4:21:c1:01:e3:25:74:c0:4a:59:2e:e4:99:35:bf:f8: 19:e7:11:39:e8:4c:6b:7d:a0:61:45:75:fa:71:b5:d1: 03:b7:5f:ca:b3:7a:8a:27:b6:9d:d7:3d:66:79:b6:7e: b1:0a:58:9e:25:e6:51:8d:5c:35:2f:b7:5f:3e:58:c5 Fingerprint (SHA-256): D2:6D:E0:25:3F:1C:48:77:34:C0:60:70:BD:E3:B9:AB:A4:D7:0A:5C:C3:4E:BE:6B:B2:00:1F:5F:C4:1C:5E:E3 Fingerprint (SHA1): 89:5D:58:E0:DA:1C:54:9F:A5:31:4D:D9:BF:26:66:5C:30:F5:B9:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3027: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3028: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3029: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3030: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121160 (0x1e67d4c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:12:43 2017 Not After : Tue May 10 12:12:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:bc:0a:c0:ad:98:4b:99:34:8e:23:ae:12:aa:c6:32: c6:9d:cf:2e:d7:98:6b:b7:2b:4f:37:3c:09:aa:37:49: c1:a0:7c:ca:8b:a5:ba:20:92:3e:96:c3:ef:89:08:3b: 6a:87:85:97:e2:d9:07:81:0f:2a:31:37:31:73:f2:4f: ff:88:01:72:76:4f:b1:e9:d1:9e:73:b9:a6:ac:5d:97: c0:3d:42:84:a4:91:79:99:e7:ff:97:bf:b8:c3:81:34: dd:ac:00:5c:27:35:f8:62:2c:57:da:11:7d:5f:99:00: e4:54:04:8e:27:18:83:3b:cc:fd:40:1f:64:b1:5b:44: c9:6f:f5:5e:ab:3f:39:95:61:f7:64:f8:e1:98:13:78: 7b:f2:4d:69:7e:0a:c3:0e:0a:c8:6f:cf:a1:fc:e4:b2: 67:ea:32:c0:24:ef:65:b9:82:7c:d2:ae:e8:fe:2d:46: b1:1a:45:0c:91:11:a3:d2:1e:b0:7c:7e:e0:84:de:5b: 5f:b6:d9:5c:ca:3e:48:94:28:48:fa:79:90:b8:9e:9c: 2a:0c:34:b0:5b:1c:51:9a:f9:db:d4:75:45:eb:0c:d4: d6:99:a6:a5:0f:4b:30:2e:fd:97:cf:4a:21:26:74:ee: 3f:70:82:60:45:02:31:d3:43:9a:f0:10:72:98:2b:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:e0:9f:72:a3:33:93:6d:bc:95:e1:d4:97:36:1b:65: 7c:21:6b:ef:21:92:75:e5:97:e0:d1:6a:f3:35:03:c2: 80:c6:87:b8:31:cb:52:fe:96:28:e3:df:e5:b7:8b:5a: 9b:31:10:fd:d0:be:49:94:3c:06:cd:ad:c6:76:f0:1b: 02:b6:a1:cb:8b:d3:4d:b3:5c:f6:77:87:f4:3b:5d:8e: 84:d1:e3:ec:cd:36:fa:89:73:35:11:db:58:7d:5e:8f: f7:9b:e5:b1:39:f8:ed:32:fe:07:75:cb:4d:d4:66:61: de:91:a6:7c:27:bc:c3:6a:4c:aa:44:aa:d3:ba:8a:ca: 31:00:d5:2b:ac:ce:b3:82:41:15:86:c7:73:2c:b6:d3: 47:97:71:01:26:b1:fa:b3:53:1a:9f:d8:ec:3a:f1:e9: db:46:ce:95:48:09:9a:52:1e:2e:58:e3:54:25:aa:27: b9:7d:9b:59:96:a6:35:8b:a7:20:e3:1e:0f:29:c9:bd: d4:21:c1:01:e3:25:74:c0:4a:59:2e:e4:99:35:bf:f8: 19:e7:11:39:e8:4c:6b:7d:a0:61:45:75:fa:71:b5:d1: 03:b7:5f:ca:b3:7a:8a:27:b6:9d:d7:3d:66:79:b6:7e: b1:0a:58:9e:25:e6:51:8d:5c:35:2f:b7:5f:3e:58:c5 Fingerprint (SHA-256): D2:6D:E0:25:3F:1C:48:77:34:C0:60:70:BD:E3:B9:AB:A4:D7:0A:5C:C3:4E:BE:6B:B2:00:1F:5F:C4:1C:5E:E3 Fingerprint (SHA1): 89:5D:58:E0:DA:1C:54:9F:A5:31:4D:D9:BF:26:66:5C:30:F5:B9:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3031: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121160 (0x1e67d4c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:12:43 2017 Not After : Tue May 10 12:12:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:bc:0a:c0:ad:98:4b:99:34:8e:23:ae:12:aa:c6:32: c6:9d:cf:2e:d7:98:6b:b7:2b:4f:37:3c:09:aa:37:49: c1:a0:7c:ca:8b:a5:ba:20:92:3e:96:c3:ef:89:08:3b: 6a:87:85:97:e2:d9:07:81:0f:2a:31:37:31:73:f2:4f: ff:88:01:72:76:4f:b1:e9:d1:9e:73:b9:a6:ac:5d:97: c0:3d:42:84:a4:91:79:99:e7:ff:97:bf:b8:c3:81:34: dd:ac:00:5c:27:35:f8:62:2c:57:da:11:7d:5f:99:00: e4:54:04:8e:27:18:83:3b:cc:fd:40:1f:64:b1:5b:44: c9:6f:f5:5e:ab:3f:39:95:61:f7:64:f8:e1:98:13:78: 7b:f2:4d:69:7e:0a:c3:0e:0a:c8:6f:cf:a1:fc:e4:b2: 67:ea:32:c0:24:ef:65:b9:82:7c:d2:ae:e8:fe:2d:46: b1:1a:45:0c:91:11:a3:d2:1e:b0:7c:7e:e0:84:de:5b: 5f:b6:d9:5c:ca:3e:48:94:28:48:fa:79:90:b8:9e:9c: 2a:0c:34:b0:5b:1c:51:9a:f9:db:d4:75:45:eb:0c:d4: d6:99:a6:a5:0f:4b:30:2e:fd:97:cf:4a:21:26:74:ee: 3f:70:82:60:45:02:31:d3:43:9a:f0:10:72:98:2b:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:e0:9f:72:a3:33:93:6d:bc:95:e1:d4:97:36:1b:65: 7c:21:6b:ef:21:92:75:e5:97:e0:d1:6a:f3:35:03:c2: 80:c6:87:b8:31:cb:52:fe:96:28:e3:df:e5:b7:8b:5a: 9b:31:10:fd:d0:be:49:94:3c:06:cd:ad:c6:76:f0:1b: 02:b6:a1:cb:8b:d3:4d:b3:5c:f6:77:87:f4:3b:5d:8e: 84:d1:e3:ec:cd:36:fa:89:73:35:11:db:58:7d:5e:8f: f7:9b:e5:b1:39:f8:ed:32:fe:07:75:cb:4d:d4:66:61: de:91:a6:7c:27:bc:c3:6a:4c:aa:44:aa:d3:ba:8a:ca: 31:00:d5:2b:ac:ce:b3:82:41:15:86:c7:73:2c:b6:d3: 47:97:71:01:26:b1:fa:b3:53:1a:9f:d8:ec:3a:f1:e9: db:46:ce:95:48:09:9a:52:1e:2e:58:e3:54:25:aa:27: b9:7d:9b:59:96:a6:35:8b:a7:20:e3:1e:0f:29:c9:bd: d4:21:c1:01:e3:25:74:c0:4a:59:2e:e4:99:35:bf:f8: 19:e7:11:39:e8:4c:6b:7d:a0:61:45:75:fa:71:b5:d1: 03:b7:5f:ca:b3:7a:8a:27:b6:9d:d7:3d:66:79:b6:7e: b1:0a:58:9e:25:e6:51:8d:5c:35:2f:b7:5f:3e:58:c5 Fingerprint (SHA-256): D2:6D:E0:25:3F:1C:48:77:34:C0:60:70:BD:E3:B9:AB:A4:D7:0A:5C:C3:4E:BE:6B:B2:00:1F:5F:C4:1C:5E:E3 Fingerprint (SHA1): 89:5D:58:E0:DA:1C:54:9F:A5:31:4D:D9:BF:26:66:5C:30:F5:B9:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3032: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121160 (0x1e67d4c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:12:43 2017 Not After : Tue May 10 12:12:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:bc:0a:c0:ad:98:4b:99:34:8e:23:ae:12:aa:c6:32: c6:9d:cf:2e:d7:98:6b:b7:2b:4f:37:3c:09:aa:37:49: c1:a0:7c:ca:8b:a5:ba:20:92:3e:96:c3:ef:89:08:3b: 6a:87:85:97:e2:d9:07:81:0f:2a:31:37:31:73:f2:4f: ff:88:01:72:76:4f:b1:e9:d1:9e:73:b9:a6:ac:5d:97: c0:3d:42:84:a4:91:79:99:e7:ff:97:bf:b8:c3:81:34: dd:ac:00:5c:27:35:f8:62:2c:57:da:11:7d:5f:99:00: e4:54:04:8e:27:18:83:3b:cc:fd:40:1f:64:b1:5b:44: c9:6f:f5:5e:ab:3f:39:95:61:f7:64:f8:e1:98:13:78: 7b:f2:4d:69:7e:0a:c3:0e:0a:c8:6f:cf:a1:fc:e4:b2: 67:ea:32:c0:24:ef:65:b9:82:7c:d2:ae:e8:fe:2d:46: b1:1a:45:0c:91:11:a3:d2:1e:b0:7c:7e:e0:84:de:5b: 5f:b6:d9:5c:ca:3e:48:94:28:48:fa:79:90:b8:9e:9c: 2a:0c:34:b0:5b:1c:51:9a:f9:db:d4:75:45:eb:0c:d4: d6:99:a6:a5:0f:4b:30:2e:fd:97:cf:4a:21:26:74:ee: 3f:70:82:60:45:02:31:d3:43:9a:f0:10:72:98:2b:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:e0:9f:72:a3:33:93:6d:bc:95:e1:d4:97:36:1b:65: 7c:21:6b:ef:21:92:75:e5:97:e0:d1:6a:f3:35:03:c2: 80:c6:87:b8:31:cb:52:fe:96:28:e3:df:e5:b7:8b:5a: 9b:31:10:fd:d0:be:49:94:3c:06:cd:ad:c6:76:f0:1b: 02:b6:a1:cb:8b:d3:4d:b3:5c:f6:77:87:f4:3b:5d:8e: 84:d1:e3:ec:cd:36:fa:89:73:35:11:db:58:7d:5e:8f: f7:9b:e5:b1:39:f8:ed:32:fe:07:75:cb:4d:d4:66:61: de:91:a6:7c:27:bc:c3:6a:4c:aa:44:aa:d3:ba:8a:ca: 31:00:d5:2b:ac:ce:b3:82:41:15:86:c7:73:2c:b6:d3: 47:97:71:01:26:b1:fa:b3:53:1a:9f:d8:ec:3a:f1:e9: db:46:ce:95:48:09:9a:52:1e:2e:58:e3:54:25:aa:27: b9:7d:9b:59:96:a6:35:8b:a7:20:e3:1e:0f:29:c9:bd: d4:21:c1:01:e3:25:74:c0:4a:59:2e:e4:99:35:bf:f8: 19:e7:11:39:e8:4c:6b:7d:a0:61:45:75:fa:71:b5:d1: 03:b7:5f:ca:b3:7a:8a:27:b6:9d:d7:3d:66:79:b6:7e: b1:0a:58:9e:25:e6:51:8d:5c:35:2f:b7:5f:3e:58:c5 Fingerprint (SHA-256): D2:6D:E0:25:3F:1C:48:77:34:C0:60:70:BD:E3:B9:AB:A4:D7:0A:5C:C3:4E:BE:6B:B2:00:1F:5F:C4:1C:5E:E3 Fingerprint (SHA1): 89:5D:58:E0:DA:1C:54:9F:A5:31:4D:D9:BF:26:66:5C:30:F5:B9:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3033: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121160 (0x1e67d4c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:12:43 2017 Not After : Tue May 10 12:12:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:bc:0a:c0:ad:98:4b:99:34:8e:23:ae:12:aa:c6:32: c6:9d:cf:2e:d7:98:6b:b7:2b:4f:37:3c:09:aa:37:49: c1:a0:7c:ca:8b:a5:ba:20:92:3e:96:c3:ef:89:08:3b: 6a:87:85:97:e2:d9:07:81:0f:2a:31:37:31:73:f2:4f: ff:88:01:72:76:4f:b1:e9:d1:9e:73:b9:a6:ac:5d:97: c0:3d:42:84:a4:91:79:99:e7:ff:97:bf:b8:c3:81:34: dd:ac:00:5c:27:35:f8:62:2c:57:da:11:7d:5f:99:00: e4:54:04:8e:27:18:83:3b:cc:fd:40:1f:64:b1:5b:44: c9:6f:f5:5e:ab:3f:39:95:61:f7:64:f8:e1:98:13:78: 7b:f2:4d:69:7e:0a:c3:0e:0a:c8:6f:cf:a1:fc:e4:b2: 67:ea:32:c0:24:ef:65:b9:82:7c:d2:ae:e8:fe:2d:46: b1:1a:45:0c:91:11:a3:d2:1e:b0:7c:7e:e0:84:de:5b: 5f:b6:d9:5c:ca:3e:48:94:28:48:fa:79:90:b8:9e:9c: 2a:0c:34:b0:5b:1c:51:9a:f9:db:d4:75:45:eb:0c:d4: d6:99:a6:a5:0f:4b:30:2e:fd:97:cf:4a:21:26:74:ee: 3f:70:82:60:45:02:31:d3:43:9a:f0:10:72:98:2b:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:e0:9f:72:a3:33:93:6d:bc:95:e1:d4:97:36:1b:65: 7c:21:6b:ef:21:92:75:e5:97:e0:d1:6a:f3:35:03:c2: 80:c6:87:b8:31:cb:52:fe:96:28:e3:df:e5:b7:8b:5a: 9b:31:10:fd:d0:be:49:94:3c:06:cd:ad:c6:76:f0:1b: 02:b6:a1:cb:8b:d3:4d:b3:5c:f6:77:87:f4:3b:5d:8e: 84:d1:e3:ec:cd:36:fa:89:73:35:11:db:58:7d:5e:8f: f7:9b:e5:b1:39:f8:ed:32:fe:07:75:cb:4d:d4:66:61: de:91:a6:7c:27:bc:c3:6a:4c:aa:44:aa:d3:ba:8a:ca: 31:00:d5:2b:ac:ce:b3:82:41:15:86:c7:73:2c:b6:d3: 47:97:71:01:26:b1:fa:b3:53:1a:9f:d8:ec:3a:f1:e9: db:46:ce:95:48:09:9a:52:1e:2e:58:e3:54:25:aa:27: b9:7d:9b:59:96:a6:35:8b:a7:20:e3:1e:0f:29:c9:bd: d4:21:c1:01:e3:25:74:c0:4a:59:2e:e4:99:35:bf:f8: 19:e7:11:39:e8:4c:6b:7d:a0:61:45:75:fa:71:b5:d1: 03:b7:5f:ca:b3:7a:8a:27:b6:9d:d7:3d:66:79:b6:7e: b1:0a:58:9e:25:e6:51:8d:5c:35:2f:b7:5f:3e:58:c5 Fingerprint (SHA-256): D2:6D:E0:25:3F:1C:48:77:34:C0:60:70:BD:E3:B9:AB:A4:D7:0A:5C:C3:4E:BE:6B:B2:00:1F:5F:C4:1C:5E:E3 Fingerprint (SHA1): 89:5D:58:E0:DA:1C:54:9F:A5:31:4D:D9:BF:26:66:5C:30:F5:B9:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3034: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121160 (0x1e67d4c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:12:43 2017 Not After : Tue May 10 12:12:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:bc:0a:c0:ad:98:4b:99:34:8e:23:ae:12:aa:c6:32: c6:9d:cf:2e:d7:98:6b:b7:2b:4f:37:3c:09:aa:37:49: c1:a0:7c:ca:8b:a5:ba:20:92:3e:96:c3:ef:89:08:3b: 6a:87:85:97:e2:d9:07:81:0f:2a:31:37:31:73:f2:4f: ff:88:01:72:76:4f:b1:e9:d1:9e:73:b9:a6:ac:5d:97: c0:3d:42:84:a4:91:79:99:e7:ff:97:bf:b8:c3:81:34: dd:ac:00:5c:27:35:f8:62:2c:57:da:11:7d:5f:99:00: e4:54:04:8e:27:18:83:3b:cc:fd:40:1f:64:b1:5b:44: c9:6f:f5:5e:ab:3f:39:95:61:f7:64:f8:e1:98:13:78: 7b:f2:4d:69:7e:0a:c3:0e:0a:c8:6f:cf:a1:fc:e4:b2: 67:ea:32:c0:24:ef:65:b9:82:7c:d2:ae:e8:fe:2d:46: b1:1a:45:0c:91:11:a3:d2:1e:b0:7c:7e:e0:84:de:5b: 5f:b6:d9:5c:ca:3e:48:94:28:48:fa:79:90:b8:9e:9c: 2a:0c:34:b0:5b:1c:51:9a:f9:db:d4:75:45:eb:0c:d4: d6:99:a6:a5:0f:4b:30:2e:fd:97:cf:4a:21:26:74:ee: 3f:70:82:60:45:02:31:d3:43:9a:f0:10:72:98:2b:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:e0:9f:72:a3:33:93:6d:bc:95:e1:d4:97:36:1b:65: 7c:21:6b:ef:21:92:75:e5:97:e0:d1:6a:f3:35:03:c2: 80:c6:87:b8:31:cb:52:fe:96:28:e3:df:e5:b7:8b:5a: 9b:31:10:fd:d0:be:49:94:3c:06:cd:ad:c6:76:f0:1b: 02:b6:a1:cb:8b:d3:4d:b3:5c:f6:77:87:f4:3b:5d:8e: 84:d1:e3:ec:cd:36:fa:89:73:35:11:db:58:7d:5e:8f: f7:9b:e5:b1:39:f8:ed:32:fe:07:75:cb:4d:d4:66:61: de:91:a6:7c:27:bc:c3:6a:4c:aa:44:aa:d3:ba:8a:ca: 31:00:d5:2b:ac:ce:b3:82:41:15:86:c7:73:2c:b6:d3: 47:97:71:01:26:b1:fa:b3:53:1a:9f:d8:ec:3a:f1:e9: db:46:ce:95:48:09:9a:52:1e:2e:58:e3:54:25:aa:27: b9:7d:9b:59:96:a6:35:8b:a7:20:e3:1e:0f:29:c9:bd: d4:21:c1:01:e3:25:74:c0:4a:59:2e:e4:99:35:bf:f8: 19:e7:11:39:e8:4c:6b:7d:a0:61:45:75:fa:71:b5:d1: 03:b7:5f:ca:b3:7a:8a:27:b6:9d:d7:3d:66:79:b6:7e: b1:0a:58:9e:25:e6:51:8d:5c:35:2f:b7:5f:3e:58:c5 Fingerprint (SHA-256): D2:6D:E0:25:3F:1C:48:77:34:C0:60:70:BD:E3:B9:AB:A4:D7:0A:5C:C3:4E:BE:6B:B2:00:1F:5F:C4:1C:5E:E3 Fingerprint (SHA1): 89:5D:58:E0:DA:1C:54:9F:A5:31:4D:D9:BF:26:66:5C:30:F5:B9:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3035: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121160 (0x1e67d4c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:12:43 2017 Not After : Tue May 10 12:12:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:bc:0a:c0:ad:98:4b:99:34:8e:23:ae:12:aa:c6:32: c6:9d:cf:2e:d7:98:6b:b7:2b:4f:37:3c:09:aa:37:49: c1:a0:7c:ca:8b:a5:ba:20:92:3e:96:c3:ef:89:08:3b: 6a:87:85:97:e2:d9:07:81:0f:2a:31:37:31:73:f2:4f: ff:88:01:72:76:4f:b1:e9:d1:9e:73:b9:a6:ac:5d:97: c0:3d:42:84:a4:91:79:99:e7:ff:97:bf:b8:c3:81:34: dd:ac:00:5c:27:35:f8:62:2c:57:da:11:7d:5f:99:00: e4:54:04:8e:27:18:83:3b:cc:fd:40:1f:64:b1:5b:44: c9:6f:f5:5e:ab:3f:39:95:61:f7:64:f8:e1:98:13:78: 7b:f2:4d:69:7e:0a:c3:0e:0a:c8:6f:cf:a1:fc:e4:b2: 67:ea:32:c0:24:ef:65:b9:82:7c:d2:ae:e8:fe:2d:46: b1:1a:45:0c:91:11:a3:d2:1e:b0:7c:7e:e0:84:de:5b: 5f:b6:d9:5c:ca:3e:48:94:28:48:fa:79:90:b8:9e:9c: 2a:0c:34:b0:5b:1c:51:9a:f9:db:d4:75:45:eb:0c:d4: d6:99:a6:a5:0f:4b:30:2e:fd:97:cf:4a:21:26:74:ee: 3f:70:82:60:45:02:31:d3:43:9a:f0:10:72:98:2b:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:e0:9f:72:a3:33:93:6d:bc:95:e1:d4:97:36:1b:65: 7c:21:6b:ef:21:92:75:e5:97:e0:d1:6a:f3:35:03:c2: 80:c6:87:b8:31:cb:52:fe:96:28:e3:df:e5:b7:8b:5a: 9b:31:10:fd:d0:be:49:94:3c:06:cd:ad:c6:76:f0:1b: 02:b6:a1:cb:8b:d3:4d:b3:5c:f6:77:87:f4:3b:5d:8e: 84:d1:e3:ec:cd:36:fa:89:73:35:11:db:58:7d:5e:8f: f7:9b:e5:b1:39:f8:ed:32:fe:07:75:cb:4d:d4:66:61: de:91:a6:7c:27:bc:c3:6a:4c:aa:44:aa:d3:ba:8a:ca: 31:00:d5:2b:ac:ce:b3:82:41:15:86:c7:73:2c:b6:d3: 47:97:71:01:26:b1:fa:b3:53:1a:9f:d8:ec:3a:f1:e9: db:46:ce:95:48:09:9a:52:1e:2e:58:e3:54:25:aa:27: b9:7d:9b:59:96:a6:35:8b:a7:20:e3:1e:0f:29:c9:bd: d4:21:c1:01:e3:25:74:c0:4a:59:2e:e4:99:35:bf:f8: 19:e7:11:39:e8:4c:6b:7d:a0:61:45:75:fa:71:b5:d1: 03:b7:5f:ca:b3:7a:8a:27:b6:9d:d7:3d:66:79:b6:7e: b1:0a:58:9e:25:e6:51:8d:5c:35:2f:b7:5f:3e:58:c5 Fingerprint (SHA-256): D2:6D:E0:25:3F:1C:48:77:34:C0:60:70:BD:E3:B9:AB:A4:D7:0A:5C:C3:4E:BE:6B:B2:00:1F:5F:C4:1C:5E:E3 Fingerprint (SHA1): 89:5D:58:E0:DA:1C:54:9F:A5:31:4D:D9:BF:26:66:5C:30:F5:B9:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3036: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3037: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3038: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121190 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3039: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3040: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #3041: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3042: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 510121191 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3043: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3044: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #3045: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3046: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 510121192 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3047: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3048: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #3049: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3050: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 510121193 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3051: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3052: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #3053: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3054: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 510121194 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3055: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3056: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #3057: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3058: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 510121195 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3059: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3060: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #3061: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3062: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 510121196 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3063: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3064: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3065: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121190 (0x1e67d4e6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:13:30 2017 Not After : Tue May 10 12:13:30 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:30:63:85:64:d0:d6:05:16:89:41:84:3d:bc:33:16: e8:b5:a7:ba:be:e0:ea:a2:9d:25:f6:ee:c0:d1:39:b3: fe:1b:4f:8a:16:3a:20:b7:fa:0c:fd:af:d6:c9:37:fd: 80:77:f6:fc:a0:3c:1f:67:52:ed:8e:81:ab:a5:0e:15: bf:1b:58:71:50:57:a7:06:78:51:c5:7f:12:04:af:32: 66:b0:9f:d4:63:ea:68:b0:01:2b:c0:46:cd:2a:a9:e8: 89:f0:33:d7:ac:3a:be:93:ed:91:13:96:c7:72:4d:81: 55:b4:95:5d:8b:8d:06:55:64:d1:e5:2f:db:80:56:d0: c7:31:3a:46:cb:c3:3f:4e:f9:3e:77:d9:e3:81:0c:34: da:5e:ba:3f:45:9d:48:9b:6e:34:75:b7:2e:c6:d4:9d: 4b:9a:03:78:f1:03:f6:28:da:a9:18:c8:3a:ec:4a:cc: d7:7e:9c:23:0b:ee:46:a5:7c:30:09:85:42:39:8f:e8: 1f:86:20:34:2a:26:2e:5b:08:f6:9c:d7:ee:78:e5:39: 96:ec:0e:25:bf:ac:ce:8b:1f:d4:7d:aa:f7:f8:d1:fb: 67:23:20:56:7f:61:ff:04:87:bd:fb:53:19:9d:78:3f: cc:4a:8c:94:a8:a0:4b:ec:27:1b:89:9a:c3:2e:23:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:a9:98:f6:b4:61:20:eb:0d:f3:8b:88:ac:cb:26:27: 62:3a:d1:6f:45:9c:19:9b:40:bb:d7:5e:c6:e8:bf:fd: 93:77:a0:75:31:7f:7e:51:74:f5:2a:e0:f0:a6:e4:62: a6:62:19:8f:12:ba:1c:95:0e:79:c6:64:8e:c5:2f:78: 38:c0:aa:07:eb:b4:98:f8:1c:d1:41:f1:0a:95:5c:70: ff:37:cf:2a:33:e3:fa:d7:09:fe:95:28:92:69:6d:5d: 89:36:01:98:7c:c0:13:24:35:e8:b3:a4:f5:ca:e3:76: a1:78:e3:ac:d9:10:01:9c:12:3e:70:a9:f1:c2:2d:2b: d2:e0:97:8b:f7:95:a9:15:3b:5d:42:c8:38:ab:d4:ca: 94:f2:11:10:c3:0c:21:ce:07:9f:14:ba:b2:34:15:0d: 3b:14:12:11:3e:3d:1b:17:7e:18:b0:da:c3:a8:1e:ff: de:2a:ab:43:ae:00:5a:cf:72:df:b5:e2:aa:a4:07:8a: 64:cf:06:9b:a4:38:77:83:d9:c0:26:61:50:d6:11:13: 6e:37:02:43:f9:53:99:ec:8f:c3:75:a1:b4:69:1e:c7: 72:bc:ee:53:65:04:8d:b1:a2:68:3b:63:ea:e8:00:88: 1f:11:f7:f6:7b:f8:1e:d5:7c:a8:0b:11:4f:24:d3:59 Fingerprint (SHA-256): D6:2F:03:1D:A0:88:62:A1:C0:FA:2D:BE:1B:5B:6E:A4:78:FE:85:72:24:AB:9A:5A:DC:4A:97:3E:44:54:62:91 Fingerprint (SHA1): 59:07:E6:4B:53:CB:BB:7E:6E:77:CF:30:25:9B:09:E3:28:BE:43:79 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #3066: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3067: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3068: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3069: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121190 (0x1e67d4e6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:13:30 2017 Not After : Tue May 10 12:13:30 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:30:63:85:64:d0:d6:05:16:89:41:84:3d:bc:33:16: e8:b5:a7:ba:be:e0:ea:a2:9d:25:f6:ee:c0:d1:39:b3: fe:1b:4f:8a:16:3a:20:b7:fa:0c:fd:af:d6:c9:37:fd: 80:77:f6:fc:a0:3c:1f:67:52:ed:8e:81:ab:a5:0e:15: bf:1b:58:71:50:57:a7:06:78:51:c5:7f:12:04:af:32: 66:b0:9f:d4:63:ea:68:b0:01:2b:c0:46:cd:2a:a9:e8: 89:f0:33:d7:ac:3a:be:93:ed:91:13:96:c7:72:4d:81: 55:b4:95:5d:8b:8d:06:55:64:d1:e5:2f:db:80:56:d0: c7:31:3a:46:cb:c3:3f:4e:f9:3e:77:d9:e3:81:0c:34: da:5e:ba:3f:45:9d:48:9b:6e:34:75:b7:2e:c6:d4:9d: 4b:9a:03:78:f1:03:f6:28:da:a9:18:c8:3a:ec:4a:cc: d7:7e:9c:23:0b:ee:46:a5:7c:30:09:85:42:39:8f:e8: 1f:86:20:34:2a:26:2e:5b:08:f6:9c:d7:ee:78:e5:39: 96:ec:0e:25:bf:ac:ce:8b:1f:d4:7d:aa:f7:f8:d1:fb: 67:23:20:56:7f:61:ff:04:87:bd:fb:53:19:9d:78:3f: cc:4a:8c:94:a8:a0:4b:ec:27:1b:89:9a:c3:2e:23:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:a9:98:f6:b4:61:20:eb:0d:f3:8b:88:ac:cb:26:27: 62:3a:d1:6f:45:9c:19:9b:40:bb:d7:5e:c6:e8:bf:fd: 93:77:a0:75:31:7f:7e:51:74:f5:2a:e0:f0:a6:e4:62: a6:62:19:8f:12:ba:1c:95:0e:79:c6:64:8e:c5:2f:78: 38:c0:aa:07:eb:b4:98:f8:1c:d1:41:f1:0a:95:5c:70: ff:37:cf:2a:33:e3:fa:d7:09:fe:95:28:92:69:6d:5d: 89:36:01:98:7c:c0:13:24:35:e8:b3:a4:f5:ca:e3:76: a1:78:e3:ac:d9:10:01:9c:12:3e:70:a9:f1:c2:2d:2b: d2:e0:97:8b:f7:95:a9:15:3b:5d:42:c8:38:ab:d4:ca: 94:f2:11:10:c3:0c:21:ce:07:9f:14:ba:b2:34:15:0d: 3b:14:12:11:3e:3d:1b:17:7e:18:b0:da:c3:a8:1e:ff: de:2a:ab:43:ae:00:5a:cf:72:df:b5:e2:aa:a4:07:8a: 64:cf:06:9b:a4:38:77:83:d9:c0:26:61:50:d6:11:13: 6e:37:02:43:f9:53:99:ec:8f:c3:75:a1:b4:69:1e:c7: 72:bc:ee:53:65:04:8d:b1:a2:68:3b:63:ea:e8:00:88: 1f:11:f7:f6:7b:f8:1e:d5:7c:a8:0b:11:4f:24:d3:59 Fingerprint (SHA-256): D6:2F:03:1D:A0:88:62:A1:C0:FA:2D:BE:1B:5B:6E:A4:78:FE:85:72:24:AB:9A:5A:DC:4A:97:3E:44:54:62:91 Fingerprint (SHA1): 59:07:E6:4B:53:CB:BB:7E:6E:77:CF:30:25:9B:09:E3:28:BE:43:79 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #3070: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3071: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3072: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3073: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121197 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3074: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3075: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3076: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3077: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510121198 --extCP --extPM < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3078: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3079: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3080: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3081: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510121199 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3082: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3083: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3084: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3085: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 510121200 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3086: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3087: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3088: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3089: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3090: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3091: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121197 (0x1e67d4ed) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:13:39 2017 Not After : Tue May 10 12:13:39 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:1c:f7:9c:d4:d8:e9:56:32:db:2c:69:02:17:16:cc: a8:38:92:ba:ab:cb:93:b2:36:54:5e:b9:dc:86:87:ba: 90:a0:3e:90:4e:0d:6b:0b:6f:73:8d:4e:26:62:f6:2e: 86:15:2f:ef:d9:a4:ab:41:de:05:eb:b7:23:c0:a8:1a: 14:2e:3f:8c:84:df:de:15:8b:f4:ef:96:a5:8e:d5:6e: 98:e9:e2:ef:b9:43:8a:37:07:3b:64:a1:6c:7e:95:33: 7e:f8:60:1e:d8:48:27:03:f6:2b:57:55:66:1e:01:64: f9:83:25:38:43:db:c6:98:37:5d:b5:91:ae:b8:b4:ab: 8d:62:ba:62:95:c1:57:1d:17:82:02:db:27:ca:fd:23: be:41:ad:bc:5a:8d:13:f6:f7:14:49:1c:4a:ce:58:3e: ca:6a:40:0d:26:d3:15:33:b3:e2:24:3b:33:db:46:29: 1b:85:57:95:4c:85:29:b7:c1:05:2d:23:d3:72:1f:c4: 5e:63:1b:60:75:16:d4:01:9e:28:ca:14:71:4c:eb:80: cc:5e:83:08:1c:68:a0:f1:a6:74:e0:1d:5f:d6:74:c9: 7d:f7:13:bb:85:85:03:aa:f7:ec:1c:85:ca:10:20:25: ea:b0:f8:c8:aa:3e:85:3b:1f:bf:ff:00:c4:ef:79:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bd:0d:39:e7:fb:95:bc:22:0e:4f:86:5d:f9:98:c4:8b: 47:2f:23:7b:66:18:90:0b:93:99:01:4e:bd:c2:fd:75: 8d:c4:47:e4:67:c7:a9:ff:2e:b4:e1:8e:0c:b6:83:a9: 30:47:6c:04:b4:af:6a:d2:98:3d:69:b1:e6:ac:1a:ea: 44:7c:f7:51:db:eb:3f:29:7c:1a:09:67:8c:fb:11:47: ae:e2:a5:c7:b3:64:da:73:56:e1:16:46:1e:da:4d:2b: 69:c4:8b:03:da:f8:3e:60:11:1c:f3:a0:47:ea:06:1e: 63:78:d0:b1:ce:d6:4a:d1:57:1c:0f:c9:1d:dd:8d:df: 1f:82:53:36:83:31:48:14:95:16:14:ad:10:ad:1b:3e: 3d:a2:f2:58:5e:bb:d8:97:28:18:85:b7:ae:2d:20:5a: ca:eb:c4:2b:66:86:9d:96:e6:b4:32:55:7a:f3:51:7c: 97:d6:e4:f5:1d:54:ae:75:1a:d5:60:b8:b5:60:72:af: 63:98:cc:df:3c:e7:cb:52:27:2c:7d:1d:1c:ea:47:3c: 4d:5c:e5:f9:fb:f4:30:54:fa:b6:0f:75:4c:5e:18:29: 44:11:29:41:5e:b8:f3:c5:81:29:b6:f2:75:da:12:5f: 68:cb:f0:51:3a:be:52:22:9d:f1:f9:9a:93:7a:1a:63 Fingerprint (SHA-256): BF:17:73:D4:BA:ED:AD:B2:09:8E:EA:68:2C:12:BE:22:E6:6A:79:4B:3E:4D:49:79:8E:4D:49:E8:1E:47:50:C2 Fingerprint (SHA1): 39:CE:FD:47:B5:7F:1F:32:75:C7:64:D9:19:E6:7E:BA:A1:32:59:E7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3092: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3093: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3094: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121198 (0x1e67d4ee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:13:41 2017 Not After : Tue May 10 12:13:41 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:85:39:e7:72:1b:9a:73:79:bd:31:2d:36:2e:a6:b8: 3c:cd:e9:56:07:44:cc:a5:15:00:6e:d7:e8:c8:38:9b: 3e:fe:c6:52:67:7d:60:1c:b1:94:b7:dc:a0:76:59:6a: 68:d4:fd:f0:e3:d8:25:21:97:7f:8b:ba:fc:c9:4a:e3: c2:f7:92:db:33:ae:d9:02:54:fc:8d:6f:7e:ff:af:40: e6:37:7b:3d:14:0f:20:41:c2:5c:e8:e0:30:09:2b:16: 23:4d:e6:41:07:c2:84:0f:b1:ae:54:4e:8a:d3:2b:85: 7b:41:76:f9:bd:26:a8:c0:d1:b6:09:08:97:5c:e8:65: a3:cf:1d:ae:a2:86:a2:45:9e:27:b9:f3:de:ed:95:4e: 2b:13:44:5e:e5:85:03:04:a9:6d:ce:33:7b:15:97:0c: 5c:f5:85:cc:54:bc:8e:15:9a:86:bb:97:cc:31:8e:7f: b1:1b:fa:53:f5:6e:3b:62:91:a4:f4:85:ac:78:5f:4e: 92:62:80:3a:d3:e6:77:8f:f3:f6:d3:b5:0d:09:51:40: 4d:b9:03:f6:69:20:77:2c:43:3a:8d:2a:93:9d:ba:5e: 2b:92:62:f2:5e:b1:9d:9b:18:a7:5a:2b:9f:27:2c:81: e2:4c:62:1a:c8:ca:63:d7:24:2b:f3:02:de:c2:aa:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 01:d5:66:3c:a5:cc:27:ba:91:51:06:ca:e9:aa:34:a5: 42:1d:e8:dc:59:c3:93:61:41:dd:5b:88:5e:56:2e:8d: 45:6a:19:89:53:43:ef:05:3e:af:3d:fb:d7:6a:90:6c: 8f:d7:75:d3:a5:33:82:eb:12:c4:91:30:02:23:dc:0d: bf:bc:9d:2c:da:5f:27:ec:74:31:ee:97:b3:9b:4d:aa: 9a:0e:9a:3a:4c:96:c9:13:57:d4:d2:3e:b3:65:ea:3f: d0:f7:a5:e3:be:6e:11:9a:0e:0c:7a:eb:55:4d:57:38: a6:b4:64:05:6c:3b:1f:04:86:35:2d:04:ab:1f:0d:58: dc:02:24:63:33:9d:02:bc:bc:44:76:6b:66:fd:1e:b4: 45:d6:99:43:7e:19:0e:6f:40:bb:01:22:a2:85:44:16: a6:b5:3f:05:95:ef:a6:fd:0a:cf:11:34:94:81:2f:93: e0:60:81:8c:5d:81:6e:13:32:cc:09:66:8c:5b:c9:f3: d9:47:22:d3:94:30:fc:e4:bc:ab:b0:b5:01:12:85:d0: c6:d1:f1:77:31:ea:12:a2:80:26:5a:e4:4e:49:d2:c0: 58:58:ac:73:33:6b:c0:38:92:1e:2a:35:1a:92:d0:0e: bc:99:ff:7f:d9:5d:d0:f2:37:cf:20:ef:9f:12:70:d4 Fingerprint (SHA-256): 0D:81:15:5C:FF:E9:B1:23:C2:C4:B6:FA:44:42:2E:39:F3:80:A4:50:E2:6B:36:59:43:02:0B:11:93:5B:B4:B5 Fingerprint (SHA1): 9A:D3:44:A0:0F:27:94:69:D0:E8:34:22:47:2B:72:EC:18:14:98:60 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3095: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3096: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121199 (0x1e67d4ef) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:13:42 2017 Not After : Tue May 10 12:13:42 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:c8:64:74:a0:b2:d8:a4:cc:5f:af:7f:5d:a7:d3:b1: 02:6d:88:d6:40:3d:ce:95:df:95:93:45:82:53:e9:59: e5:68:1f:d5:43:b0:36:da:fb:2f:1b:ec:eb:7f:e7:e7: 19:e3:a6:e6:1b:bf:2d:4a:1d:a9:b0:e7:6e:0a:e9:43: 78:ce:12:3a:1a:cc:de:75:33:55:63:6a:22:4a:b7:21: 45:51:19:19:3c:a2:5d:a5:94:ef:05:52:91:be:e4:27: 13:59:60:87:93:cc:12:e3:65:e0:f6:a5:15:7a:30:17: b4:97:db:b1:19:b7:8a:92:d2:e5:fe:b3:b2:f5:cf:7a: 8e:42:21:6e:6c:4d:50:ac:4f:12:0d:71:db:2d:50:5e: c7:60:65:55:a4:42:3a:9d:48:5a:07:d2:72:2e:c4:bb: 97:7b:de:4e:c4:a0:28:1b:bf:36:3f:f0:52:cc:c7:e2: 56:89:b1:d8:03:42:0f:3c:6b:6d:5f:01:4c:3e:15:d3: 52:da:68:a5:72:cb:5f:8f:f7:9a:a1:61:0b:a0:b5:6d: 35:5d:b6:9d:97:eb:d1:ba:42:75:f2:57:2a:35:19:7d: bd:f3:96:88:41:c4:4b:67:fa:d3:0f:e5:37:07:40:18: 27:9c:bf:ff:9a:e0:33:83:92:42:56:d5:2e:14:42:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 12:37:74:33:fc:c5:48:78:5d:cd:80:7a:5b:11:85:e5: cd:18:72:4c:f0:e7:bf:5e:8e:f2:91:7e:41:e9:2d:0f: 47:84:ac:25:d7:3b:f0:bb:37:8a:36:67:97:ba:7c:7e: 1c:44:cb:a9:03:1e:ea:38:b9:cd:2b:38:81:41:bd:a5: a8:cc:19:da:02:9e:de:77:75:43:3f:a8:9f:35:31:63: 74:45:65:a7:be:b4:56:4b:20:1e:bb:83:3a:b9:a4:10: cd:41:72:18:af:24:4e:b1:07:d8:9d:d3:33:ac:4e:39: e9:68:37:36:7f:f5:4f:6d:de:45:99:4c:5c:9a:05:1a: 22:b6:ec:a5:83:cf:dc:3d:80:08:b2:9c:9a:bb:de:ac: 89:83:18:36:28:fb:01:44:75:f4:e2:fc:d8:eb:8a:d2: 5b:e1:32:5a:24:88:59:80:46:be:7c:f2:2b:c2:c6:40: 08:4f:97:19:0a:89:fd:89:d0:ea:69:5c:d8:4d:a5:1e: e4:7f:c9:a6:e5:cd:51:a8:6b:62:c7:cf:bb:58:7c:80: 65:f6:98:9a:fb:84:f1:b9:2f:63:c2:12:50:3f:49:08: b4:53:af:41:1f:b7:5e:2e:88:08:84:3f:cd:cc:f0:53: e2:da:b3:1d:0a:ef:1d:24:5f:3e:81:56:55:ba:3f:3b Fingerprint (SHA-256): F2:CD:1D:93:9E:10:8B:AE:C4:67:FA:4D:DD:8F:29:34:97:28:8D:27:EE:E6:F7:D7:1A:9D:B4:13:BF:09:16:DC Fingerprint (SHA1): 68:E8:41:68:EB:DF:38:C5:CE:8C:5A:1C:23:AB:9A:B8:B6:B7:C8:C2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #3097: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3098: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121201 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3099: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3100: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3101: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3102: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510121202 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3103: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3104: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3105: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3106: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510121203 --extCP --extPM < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3107: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3108: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #3109: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3110: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 510121204 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3111: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3112: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3113: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3114: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 510121205 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3115: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3116: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3117: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3118: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3119: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3120: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #3121: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121201 (0x1e67d4f1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:13:45 2017 Not After : Tue May 10 12:13:45 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:f3:78:87:8d:56:28:db:34:5d:ac:85:72:7a:e0:cf: e5:31:b3:d1:52:85:c9:fc:a6:e1:3a:bb:88:6d:e3:7a: 5b:3f:82:e7:05:48:27:c3:89:03:a7:12:12:eb:9a:1e: 95:49:9a:3e:ce:87:ab:24:ca:cb:55:3a:6b:18:94:f4: b4:fd:0a:ed:59:b9:0d:76:5e:58:88:96:0e:ec:54:84: c6:ed:06:32:0e:8f:2f:1c:88:89:9d:7a:b5:03:84:e0: a4:d1:d0:2c:fc:9f:7d:3f:f3:15:2a:a4:40:77:71:5e: 82:34:93:2c:26:c5:1d:38:09:6a:57:3a:92:10:7a:71: 63:e7:7a:a2:af:a2:96:07:d0:14:cf:d4:94:1b:17:eb: 5d:96:74:71:7e:cf:3a:07:11:df:24:27:17:c6:1b:11: b1:48:0f:7e:c4:c5:06:f0:37:3d:7c:77:99:01:13:77: 55:99:7c:e5:b1:41:f3:0d:01:83:21:ae:1e:66:30:42: cf:cd:b7:04:3d:46:e0:3f:66:c9:a2:53:f2:93:5d:6b: c6:a9:83:90:4f:91:28:00:5f:99:7e:57:e8:19:58:1c: 20:5f:3a:ad:fc:3f:09:34:ed:13:eb:30:8d:5b:f8:9a: a5:10:b7:95:fc:c6:f3:26:50:3e:00:51:af:d3:6d:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6c:88:96:d7:20:0b:c3:51:a3:e6:02:e8:44:ef:09:82: 4e:b8:88:6f:b1:b5:9f:a1:ad:2f:1d:44:ba:71:14:ca: f6:b3:2a:0e:b5:ae:ae:4c:2d:ad:17:16:94:0e:81:04: 4a:b5:94:36:6a:01:2a:7f:ee:06:d3:80:cf:dd:ff:34: 81:79:9b:20:f5:b7:bb:88:6f:3d:16:44:01:3a:76:f6: f3:36:94:17:0c:a5:47:9b:7d:87:48:17:51:e7:55:b2: 7e:b1:b0:11:84:c6:5b:03:58:ff:eb:1b:dc:f8:7f:5a: d9:f2:d1:f0:65:33:d4:6b:f0:26:59:7a:a6:c3:a3:25: ce:05:e0:d8:a0:b4:39:27:a3:5b:17:e2:c8:c2:d6:bb: 60:68:50:db:59:3e:48:f1:0c:58:43:77:88:38:d3:9d: 48:a7:c3:cd:e5:6c:2a:b7:4d:e2:90:b6:c5:c7:65:10: e9:30:ed:81:61:28:d9:4b:85:d1:88:35:03:21:1e:d7: 4f:1d:3f:43:1c:a3:7d:1b:95:bf:1a:84:d8:38:8f:c2: 64:93:50:74:32:8d:36:a2:6e:41:c5:3f:77:f4:6f:16: cb:b0:64:60:9b:61:2d:1b:ce:7d:b0:72:c1:13:a4:5b: 5b:14:14:d3:e1:65:ec:c6:b1:6d:16:e3:93:08:a1:72 Fingerprint (SHA-256): 9B:31:FE:65:27:A9:F0:16:DD:32:96:2C:D1:91:C6:D8:7B:9D:2C:A6:FC:ED:D8:5F:46:EE:55:76:1D:54:65:76 Fingerprint (SHA1): AA:F4:6C:B5:94:F0:97:66:18:51:38:C9:E0:49:A4:43:C5:4E:9C:E8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3122: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3123: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121202 (0x1e67d4f2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:13:47 2017 Not After : Tue May 10 12:13:47 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:b1:ec:87:41:a9:f7:b9:be:c0:d2:d6:63:5d:ea:3b: 9a:ed:72:6f:df:cb:a0:90:41:a9:6e:a9:bd:8e:66:21: 89:a6:16:c7:a1:9c:74:e2:9a:c2:7d:92:8e:de:d8:f5: 94:f9:f4:14:b5:86:95:bd:b5:e0:30:f5:ff:62:3e:2f: 41:c5:06:c0:9f:3a:a1:e7:ca:01:19:17:96:6e:18:cf: 27:4b:44:7d:c4:80:90:91:3f:10:33:b9:41:0e:15:bd: 92:91:47:5a:f6:42:8f:e4:5a:1a:c5:b4:03:7e:18:8a: eb:91:04:1d:67:63:1d:8a:8f:61:35:4f:02:fc:b0:4f: 5a:46:a2:1f:7a:cd:ac:56:43:73:0f:8e:fa:a4:1d:9e: 9c:21:27:9e:1e:20:ae:d6:4d:18:61:eb:08:6f:d0:78: 1a:ac:ff:97:70:bc:96:05:d5:34:4c:ff:28:ee:9d:b8: be:4d:44:40:c6:9c:e1:f8:26:d5:40:5c:27:dc:7c:b5: 2e:98:b0:da:55:f4:d1:19:e6:a8:22:50:55:2c:27:01: 67:df:70:d0:5a:b3:a4:43:14:b0:bb:54:b7:01:9c:a1: 1c:41:61:23:2e:cd:3b:17:29:19:6f:ac:fe:d2:0d:12: 56:59:f6:ae:ab:ca:3b:3b:6c:00:cf:14:00:d2:5a:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 22:ec:a2:1a:cf:a7:7a:aa:1f:3d:9d:1c:93:80:84:62: 01:a5:9e:c8:dd:11:ba:af:27:d4:b5:54:65:0c:82:f2: d1:76:33:de:18:39:44:6a:fd:3b:25:3a:70:4e:45:26: 98:a0:9f:51:36:68:4b:88:9a:df:f5:e1:cb:f8:53:b1: c3:7d:c6:41:f9:8d:82:ba:e6:ad:c4:57:ad:5f:ff:33: d0:e7:e3:86:b6:bb:92:84:da:d9:fe:a0:48:ae:5e:3e: 76:30:22:64:77:7d:1c:5a:dc:d8:d1:df:62:fb:2e:4e: 49:3d:d0:f0:35:4d:69:5e:32:8f:b1:d4:c8:95:be:87: dc:a8:9f:e2:00:8c:69:1e:e4:32:78:ea:a1:11:1b:47: e2:e0:ac:53:0d:f4:62:f3:95:bd:43:35:3d:66:4a:56: 83:86:0e:a3:17:be:84:2b:d6:98:20:2d:38:38:2d:38: dc:b5:de:1e:72:a9:ea:2f:83:b5:46:76:1c:ff:3e:b7: 81:d3:09:75:1c:0e:f5:cb:28:18:72:d5:dc:88:33:47: 0f:5c:87:8f:25:33:54:d0:1c:3d:42:17:c9:63:ab:7d: 9c:cd:bd:19:6b:15:5a:bf:73:2c:ca:74:16:de:5e:bf: ab:85:2d:5a:02:c3:17:ab:32:dd:b0:a2:45:c6:41:78 Fingerprint (SHA-256): 59:8D:45:28:82:7F:39:1B:BF:7A:B3:E0:47:91:4E:50:9D:07:25:E1:43:0A:89:53:7C:84:59:1B:24:87:6C:5D Fingerprint (SHA1): 95:18:78:C3:39:CB:8E:18:F2:37:13:BB:A6:9B:CC:45:AB:B3:AC:E5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3124: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3125: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3126: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121203 (0x1e67d4f3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:13:50 2017 Not After : Tue May 10 12:13:50 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:53:3f:bb:4d:ef:e8:d8:35:ed:d1:9a:91:88:fc:9f: 35:d4:0b:e7:80:1e:52:fc:a7:e5:9e:38:25:ab:0a:b5: bd:ee:e1:d5:dd:9d:5e:1a:3b:5a:33:bb:21:01:cb:56: 48:bb:d4:d3:5a:e7:d3:72:8e:f2:c2:11:b5:ce:cc:0b: 95:5e:5f:2e:b5:c5:38:86:78:fd:b3:7b:d9:64:16:f2: b2:7e:6d:59:5b:52:21:9b:97:72:01:d7:6b:62:44:fb: ed:5e:d1:7c:b1:2e:36:53:c3:91:db:f1:99:c5:f9:2d: ee:45:a6:30:bc:58:11:82:05:d0:6d:3b:64:e4:69:64: 9d:46:b4:86:ce:4d:35:38:b6:a9:fc:c4:ec:b5:32:92: 94:21:73:04:cc:19:c8:e8:4a:13:e8:d2:b2:a5:77:e6: 36:5d:cb:b0:1a:84:aa:c8:6f:b2:a7:75:24:90:1c:b2: 63:da:05:89:00:9d:8d:13:72:85:64:11:d2:aa:f1:49: d9:d7:65:64:83:68:02:35:51:8c:21:d0:93:cd:59:b8: fa:3d:ad:1c:37:ce:7a:87:50:73:e1:9e:77:4b:73:2a: e4:28:44:26:61:1f:48:83:a5:fa:b4:77:23:c6:0c:e6: 91:a1:8f:38:4a:bd:51:ec:c1:5e:97:b0:6c:9f:e2:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:09:94:f2:c1:65:1f:0e:45:e4:d7:cd:37:9f:4b:70: ef:33:09:6b:9b:45:23:51:b3:8d:6c:ba:b6:fb:d8:43: 90:b6:ed:9d:fb:04:e0:a5:e7:8c:91:d2:db:28:a2:0f: 34:b1:75:eb:a2:4d:37:3a:9a:64:d9:05:22:f8:f3:5b: 0d:40:c6:1f:77:bb:d9:63:cf:38:1d:ae:01:48:2b:ec: 36:a7:9d:c1:ab:72:5c:c3:30:5e:fb:f1:7e:4c:7b:54: 6b:7e:91:2f:15:e3:9a:54:f8:4d:24:d4:fc:4e:3a:e6: 5e:23:bb:1c:cc:a4:a8:1b:83:e4:bc:98:e2:f6:3c:4c: d6:00:7c:8b:be:f6:cd:cd:73:de:dc:a9:31:14:dc:6f: ab:5f:f9:9a:ca:fb:c6:28:2a:f0:f0:d5:de:f5:a2:37: 06:2e:56:f0:80:06:af:c6:e5:a7:01:92:df:34:db:93: 6b:3d:37:01:1d:31:de:f5:22:80:d7:76:62:a8:e2:94: 73:b7:0c:b2:64:70:15:56:6a:42:31:aa:81:f1:a7:5f: b8:1b:91:f7:75:75:10:43:de:22:21:97:39:83:9a:83: 0c:5c:b4:5c:46:e2:27:41:75:e6:cb:1d:48:95:68:fd: f8:df:36:1e:cd:b1:2d:1f:69:b8:ff:e0:04:cd:8f:f9 Fingerprint (SHA-256): F8:83:9E:5A:57:2E:01:BF:9A:F9:4A:CC:E7:02:A8:F5:5F:1D:4B:86:6A:F2:B4:15:4E:5F:48:3E:A5:2C:55:EE Fingerprint (SHA1): 4A:5D:3B:E4:9B:FE:63:F5:34:FF:CB:65:BE:2D:72:7E:C4:98:D8:E9 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #3127: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3128: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121206 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3129: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3130: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3131: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3132: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510121207 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3133: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3134: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3135: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3136: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510121208 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA1Root-510121115.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3137: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3138: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3139: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3140: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 510121209 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3141: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3142: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #3143: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121206 (0x1e67d4f6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:13:55 2017 Not After : Tue May 10 12:13:55 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:75:48:6d:69:bc:c4:01:50:b2:18:01:e7:e3:e9:39: 7e:45:3d:29:be:00:0b:28:65:69:f3:13:10:e6:95:2e: 36:c5:4d:76:b7:b6:f8:eb:be:27:78:b6:13:a7:c0:04: fc:f8:b9:a8:9e:23:0b:dc:66:f4:72:47:6b:6e:50:a3: b6:be:08:89:ad:f3:79:0f:7e:66:f9:c3:36:3b:02:fc: e7:6d:7d:b0:ef:88:68:ac:73:e1:28:07:dd:1a:88:2c: 46:55:6d:4a:4b:66:1a:8f:05:5b:fc:57:3f:01:bb:9f: ca:fa:19:71:e5:d4:15:0d:8d:bb:1a:a2:b1:cf:3e:4f: 33:32:17:24:c1:c8:dc:8e:8c:d3:96:00:f0:59:0d:6d: 4d:4f:53:13:c2:a9:a8:14:f6:0a:c0:5d:4b:7b:be:fb: c3:10:43:1a:71:c7:3a:c3:5f:95:54:8f:73:26:51:4e: df:14:80:56:fc:ab:66:3f:2b:8f:10:fb:8b:72:43:e0: 8c:8e:49:59:60:36:8b:ab:e8:92:69:47:18:66:af:79: 0c:23:f6:59:eb:5d:5e:8a:18:f9:6d:ac:24:e1:cf:92: c1:73:71:e9:83:35:e4:72:ba:3c:43:12:cf:4b:12:c6: c4:a7:49:c5:f6:4d:d7:09:42:9f:3f:bc:7c:26:51:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:f8:b0:3d:1f:67:1b:13:c3:4e:44:3f:5f:2f:28:83: b7:c7:0c:33:cf:eb:ce:e7:6d:e1:b1:b6:45:7f:8c:21: f2:8f:71:fc:a6:09:02:28:00:bb:4b:4a:19:6c:78:d2: 9c:22:1a:d3:59:a8:ee:6a:21:9d:4a:19:04:aa:89:bf: ec:7e:10:7b:15:e3:df:14:83:ba:85:7d:a1:61:a1:9b: 93:0f:b8:3d:cc:c5:f5:6a:c8:bc:6f:96:6a:bb:76:d6: a6:13:83:45:e1:4f:02:42:07:0c:00:f9:c4:92:fb:6f: 2b:1f:9d:de:d7:f3:42:ce:34:1e:b1:3d:9c:4f:0e:97: 0d:09:1b:6c:83:c9:87:0c:11:fb:5b:92:37:5e:38:83: cd:07:90:87:d8:74:67:fb:fa:7f:49:6e:f5:c2:e5:45: fa:18:0a:d3:68:3d:99:ff:14:12:54:64:52:2a:d4:f8: 5d:6f:b0:93:17:2f:50:dd:5f:9f:80:66:cc:bc:e3:22: f7:77:b0:05:d0:cf:04:a0:bb:bc:15:44:e0:ab:70:5c: 9d:d2:a1:92:f4:26:7d:f6:12:4d:db:8f:01:08:59:d5: 3e:fe:2c:ef:55:87:fb:94:8e:ed:1c:41:05:96:27:4b: ef:10:54:16:b4:02:0a:b6:ac:ff:11:bd:74:e6:6b:44 Fingerprint (SHA-256): 95:8C:C1:0B:9B:07:B1:BE:6D:D6:12:46:AE:8A:75:B5:34:F9:90:30:C4:1C:35:EE:2F:22:8C:CB:47:26:77:7B Fingerprint (SHA1): FC:C6:A1:6D:D2:2B:31:7E:F5:65:06:5E:C6:AE:5B:EE:AF:29:67:0E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3144: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3145: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121210 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3146: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3147: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3148: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121211 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3149: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3150: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3151: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3152: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 510121212 -7 Bridge@Army < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3153: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3154: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 510121213 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3155: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3156: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #3157: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3158: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3159: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 510121214 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-Bridge-510121116.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3160: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3161: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3162: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3163: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510121215 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3164: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3165: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #3166: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #3167: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121211 (0x1e67d4fb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:14:00 2017 Not After : Tue May 10 12:14:00 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:17:10:2f:a5:84:72:05:95:92:f1:50:30:24:e5:d2: 38:98:cf:dd:22:28:4e:af:a6:29:bf:ac:38:36:02:83: 87:51:5c:1f:f9:3d:27:39:d2:fd:bf:f7:36:fe:f8:41: 13:0f:75:08:e8:03:97:c8:c7:f5:14:59:7d:d0:2e:1c: 22:a3:d8:54:5c:68:d8:2d:bf:43:b4:ff:5e:7a:94:9b: ea:e7:67:6a:b6:87:73:4c:f4:2f:af:e0:1e:cc:1b:53: 77:05:af:0c:4f:22:64:99:9d:f7:72:cc:74:18:ea:9d: 8b:bc:37:21:ad:07:9e:e7:72:67:9a:e9:b2:0d:8c:64: a7:ca:9c:25:63:e0:95:40:ff:fc:a7:00:ae:4c:de:a5: 86:2a:27:4d:fc:78:02:26:81:f4:1d:61:31:b5:0d:20: 47:57:de:b2:18:83:6b:dc:d2:c1:54:3b:f2:31:6d:1a: a0:ef:71:26:de:73:1d:e0:ed:13:d8:92:2a:82:a5:1a: 81:e1:0d:a0:3a:0d:9c:a3:98:fe:ab:0b:48:67:05:3c: b7:49:1e:9b:04:e1:dd:7b:d6:d0:7d:fd:8a:59:78:9a: ba:c0:b0:f6:94:74:76:3a:8b:3b:1c:59:bf:51:8f:4c: 27:c1:2e:47:ee:4d:f9:31:e5:d9:b4:28:b3:2d:ef:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:24:a2:b0:98:e7:a0:e8:7c:af:8d:59:45:dc:41:e7: dd:48:1f:d2:8b:e4:63:57:cc:70:e7:da:79:40:ea:36: 98:41:ba:b5:e3:48:d9:09:83:7a:5f:1c:02:44:a8:2b: 0a:08:3b:8b:8b:8e:07:5f:86:0e:c8:d8:62:26:9b:6a: 27:df:ed:c3:88:0b:93:ea:f2:54:eb:d7:be:68:c6:cb: 9a:c2:a1:b3:8c:69:cf:ad:ad:22:02:0b:ee:b1:f3:b1: 4f:05:0b:95:52:85:fb:ff:df:4f:11:9c:f0:79:d5:5f: 27:1f:3a:7f:ac:02:07:13:d9:4c:d4:bb:9d:d6:56:ce: 36:36:5f:f7:aa:1b:4b:5f:b7:89:81:ad:24:51:35:0e: 5d:36:ac:6e:5b:e6:4c:99:16:8a:ed:41:97:e8:77:a1: df:63:4d:ab:65:9d:4f:a5:6e:f0:23:db:9d:cf:63:64: 10:76:bc:12:52:6a:9d:4d:ab:80:c4:42:ca:7a:a8:6d: ae:2e:6f:12:c6:a4:c7:03:61:cd:d7:c4:83:a4:6f:15: a5:f7:ef:c1:aa:d1:0e:d7:66:c6:76:ec:e0:02:e2:be: f1:28:e4:18:53:4a:db:16:19:1d:06:45:14:bd:bb:21: 35:69:73:22:e5:6e:1a:8e:9e:66:34:ed:9f:e9:0e:71 Fingerprint (SHA-256): 5C:30:5B:B4:B8:EA:64:F9:E7:CB:11:7A:A7:D4:21:50:8F:BE:0C:0D:A8:E3:F7:EF:D6:65:BB:7A:A9:E3:1E:69 Fingerprint (SHA1): 38:6B:B2:6C:E1:DD:F3:91:C1:35:01:BE:50:3B:C0:34:BF:43:0D:A7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3168: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121211 (0x1e67d4fb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:14:00 2017 Not After : Tue May 10 12:14:00 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:17:10:2f:a5:84:72:05:95:92:f1:50:30:24:e5:d2: 38:98:cf:dd:22:28:4e:af:a6:29:bf:ac:38:36:02:83: 87:51:5c:1f:f9:3d:27:39:d2:fd:bf:f7:36:fe:f8:41: 13:0f:75:08:e8:03:97:c8:c7:f5:14:59:7d:d0:2e:1c: 22:a3:d8:54:5c:68:d8:2d:bf:43:b4:ff:5e:7a:94:9b: ea:e7:67:6a:b6:87:73:4c:f4:2f:af:e0:1e:cc:1b:53: 77:05:af:0c:4f:22:64:99:9d:f7:72:cc:74:18:ea:9d: 8b:bc:37:21:ad:07:9e:e7:72:67:9a:e9:b2:0d:8c:64: a7:ca:9c:25:63:e0:95:40:ff:fc:a7:00:ae:4c:de:a5: 86:2a:27:4d:fc:78:02:26:81:f4:1d:61:31:b5:0d:20: 47:57:de:b2:18:83:6b:dc:d2:c1:54:3b:f2:31:6d:1a: a0:ef:71:26:de:73:1d:e0:ed:13:d8:92:2a:82:a5:1a: 81:e1:0d:a0:3a:0d:9c:a3:98:fe:ab:0b:48:67:05:3c: b7:49:1e:9b:04:e1:dd:7b:d6:d0:7d:fd:8a:59:78:9a: ba:c0:b0:f6:94:74:76:3a:8b:3b:1c:59:bf:51:8f:4c: 27:c1:2e:47:ee:4d:f9:31:e5:d9:b4:28:b3:2d:ef:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:24:a2:b0:98:e7:a0:e8:7c:af:8d:59:45:dc:41:e7: dd:48:1f:d2:8b:e4:63:57:cc:70:e7:da:79:40:ea:36: 98:41:ba:b5:e3:48:d9:09:83:7a:5f:1c:02:44:a8:2b: 0a:08:3b:8b:8b:8e:07:5f:86:0e:c8:d8:62:26:9b:6a: 27:df:ed:c3:88:0b:93:ea:f2:54:eb:d7:be:68:c6:cb: 9a:c2:a1:b3:8c:69:cf:ad:ad:22:02:0b:ee:b1:f3:b1: 4f:05:0b:95:52:85:fb:ff:df:4f:11:9c:f0:79:d5:5f: 27:1f:3a:7f:ac:02:07:13:d9:4c:d4:bb:9d:d6:56:ce: 36:36:5f:f7:aa:1b:4b:5f:b7:89:81:ad:24:51:35:0e: 5d:36:ac:6e:5b:e6:4c:99:16:8a:ed:41:97:e8:77:a1: df:63:4d:ab:65:9d:4f:a5:6e:f0:23:db:9d:cf:63:64: 10:76:bc:12:52:6a:9d:4d:ab:80:c4:42:ca:7a:a8:6d: ae:2e:6f:12:c6:a4:c7:03:61:cd:d7:c4:83:a4:6f:15: a5:f7:ef:c1:aa:d1:0e:d7:66:c6:76:ec:e0:02:e2:be: f1:28:e4:18:53:4a:db:16:19:1d:06:45:14:bd:bb:21: 35:69:73:22:e5:6e:1a:8e:9e:66:34:ed:9f:e9:0e:71 Fingerprint (SHA-256): 5C:30:5B:B4:B8:EA:64:F9:E7:CB:11:7A:A7:D4:21:50:8F:BE:0C:0D:A8:E3:F7:EF:D6:65:BB:7A:A9:E3:1E:69 Fingerprint (SHA1): 38:6B:B2:6C:E1:DD:F3:91:C1:35:01:BE:50:3B:C0:34:BF:43:0D:A7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3169: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3170: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121216 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3171: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3172: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3173: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121217 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3174: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3175: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3176: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3177: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 510121218 -7 Bridge@Army < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3178: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3179: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 510121219 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3180: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3181: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #3182: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3183: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3184: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 510121220 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-Bridge-510121117.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3185: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3186: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3187: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3188: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510121221 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3189: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3190: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3191: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3192: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 510121222 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-BridgeNavy-510121118.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3193: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3194: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3195: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3196: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 510121223 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3197: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3198: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #3199: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #3200: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121217 (0x1e67d501) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:14:07 2017 Not After : Tue May 10 12:14:07 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:df:b2:6f:3f:3a:b3:2c:a4:4e:a7:97:a1:f2:d2:7f: 6a:09:2e:ef:0e:e3:f1:4e:79:3f:27:2d:5b:95:02:d4: 8d:d6:6e:cb:a4:bf:ff:11:03:d5:f4:4e:89:1c:28:c2: 53:9f:7b:87:e1:11:6c:5b:47:fd:bd:bd:63:2a:bb:58: a3:5b:fe:3c:4b:8a:64:bb:80:c2:61:0b:cc:0f:2a:43: 02:46:05:d6:be:24:15:4a:34:c6:93:d0:19:1d:61:40: d1:c6:24:f8:28:30:c1:40:6d:13:b4:6b:b7:30:bd:98: b4:97:3e:cf:d9:61:35:00:2d:9c:41:11:fe:db:53:55: 8d:4a:48:38:37:cf:0c:e4:bf:61:c5:c4:36:8d:c9:ba: ac:be:20:32:96:d5:a7:32:dc:8a:27:a3:8e:9b:4c:62: d2:51:1e:e8:8b:e2:d2:85:8e:c5:52:d7:c5:ca:f3:ee: 24:ba:b2:5d:b1:76:1a:05:c0:3b:25:46:e4:d2:0a:55: d6:23:a5:a0:1a:8d:23:75:8c:a3:cf:c3:b2:f5:21:4b: 1e:9a:68:e9:8d:7d:d5:f0:46:c3:9d:79:bd:f1:34:0c: a4:f1:f4:e1:fb:e4:0c:c2:54:90:e3:3c:f5:b6:d7:6c: ae:95:17:c4:46:1a:93:8d:b6:4e:6e:77:2d:0f:82:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:3b:fb:0c:ed:19:75:49:3c:95:ce:25:d4:45:ce:96: 9e:01:37:7f:c6:a7:72:e8:22:ee:74:d9:dc:3d:e3:e5: da:84:e5:40:55:51:83:af:31:e8:3c:b1:e8:1e:53:68: 66:64:07:70:8a:49:61:24:99:c4:1b:c1:b4:ba:59:3b: ce:c7:4b:08:b0:6b:20:14:de:cd:0e:fe:6a:c1:3b:cc: cb:74:de:01:db:fb:36:e3:3f:ec:e2:fe:87:b1:91:ce: 24:20:91:85:fe:81:75:fe:65:03:cc:af:4c:75:41:c1: ea:34:30:fe:aa:5d:0f:16:c1:3b:8f:d8:2e:d4:68:49: 1c:77:4e:ec:56:5c:cd:7a:12:36:cf:de:dd:b3:df:53: 9c:45:61:10:0e:20:d1:db:2b:ef:d1:3f:d0:c3:4e:13: c6:73:e1:a4:58:5b:80:a0:b0:44:10:5f:20:eb:54:63: 72:11:60:67:c7:b0:09:72:9f:72:49:9e:8d:8c:08:ba: 9f:a3:50:1b:5b:03:71:7c:e0:77:c0:32:5d:5d:bb:54: 8b:d4:eb:34:88:48:01:60:72:ec:6e:46:fb:52:f9:63: d9:50:a3:fd:e2:90:e6:4a:ac:36:1f:a5:74:83:a9:b2: 5b:b8:cb:9a:65:e9:4b:b7:81:4a:ec:34:9c:31:16:8a Fingerprint (SHA-256): 01:83:3D:1C:10:9F:D1:30:66:B6:0B:7A:2C:E1:D0:EB:06:00:35:FA:5C:CF:A8:8D:21:8B:A1:E5:49:7C:0B:30 Fingerprint (SHA1): 14:81:9D:3E:03:0F:36:12:03:5B:B1:87:4D:D7:1E:CE:21:28:C4:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3201: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121217 (0x1e67d501) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:14:07 2017 Not After : Tue May 10 12:14:07 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:df:b2:6f:3f:3a:b3:2c:a4:4e:a7:97:a1:f2:d2:7f: 6a:09:2e:ef:0e:e3:f1:4e:79:3f:27:2d:5b:95:02:d4: 8d:d6:6e:cb:a4:bf:ff:11:03:d5:f4:4e:89:1c:28:c2: 53:9f:7b:87:e1:11:6c:5b:47:fd:bd:bd:63:2a:bb:58: a3:5b:fe:3c:4b:8a:64:bb:80:c2:61:0b:cc:0f:2a:43: 02:46:05:d6:be:24:15:4a:34:c6:93:d0:19:1d:61:40: d1:c6:24:f8:28:30:c1:40:6d:13:b4:6b:b7:30:bd:98: b4:97:3e:cf:d9:61:35:00:2d:9c:41:11:fe:db:53:55: 8d:4a:48:38:37:cf:0c:e4:bf:61:c5:c4:36:8d:c9:ba: ac:be:20:32:96:d5:a7:32:dc:8a:27:a3:8e:9b:4c:62: d2:51:1e:e8:8b:e2:d2:85:8e:c5:52:d7:c5:ca:f3:ee: 24:ba:b2:5d:b1:76:1a:05:c0:3b:25:46:e4:d2:0a:55: d6:23:a5:a0:1a:8d:23:75:8c:a3:cf:c3:b2:f5:21:4b: 1e:9a:68:e9:8d:7d:d5:f0:46:c3:9d:79:bd:f1:34:0c: a4:f1:f4:e1:fb:e4:0c:c2:54:90:e3:3c:f5:b6:d7:6c: ae:95:17:c4:46:1a:93:8d:b6:4e:6e:77:2d:0f:82:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:3b:fb:0c:ed:19:75:49:3c:95:ce:25:d4:45:ce:96: 9e:01:37:7f:c6:a7:72:e8:22:ee:74:d9:dc:3d:e3:e5: da:84:e5:40:55:51:83:af:31:e8:3c:b1:e8:1e:53:68: 66:64:07:70:8a:49:61:24:99:c4:1b:c1:b4:ba:59:3b: ce:c7:4b:08:b0:6b:20:14:de:cd:0e:fe:6a:c1:3b:cc: cb:74:de:01:db:fb:36:e3:3f:ec:e2:fe:87:b1:91:ce: 24:20:91:85:fe:81:75:fe:65:03:cc:af:4c:75:41:c1: ea:34:30:fe:aa:5d:0f:16:c1:3b:8f:d8:2e:d4:68:49: 1c:77:4e:ec:56:5c:cd:7a:12:36:cf:de:dd:b3:df:53: 9c:45:61:10:0e:20:d1:db:2b:ef:d1:3f:d0:c3:4e:13: c6:73:e1:a4:58:5b:80:a0:b0:44:10:5f:20:eb:54:63: 72:11:60:67:c7:b0:09:72:9f:72:49:9e:8d:8c:08:ba: 9f:a3:50:1b:5b:03:71:7c:e0:77:c0:32:5d:5d:bb:54: 8b:d4:eb:34:88:48:01:60:72:ec:6e:46:fb:52:f9:63: d9:50:a3:fd:e2:90:e6:4a:ac:36:1f:a5:74:83:a9:b2: 5b:b8:cb:9a:65:e9:4b:b7:81:4a:ec:34:9c:31:16:8a Fingerprint (SHA-256): 01:83:3D:1C:10:9F:D1:30:66:B6:0B:7A:2C:E1:D0:EB:06:00:35:FA:5C:CF:A8:8D:21:8B:A1:E5:49:7C:0B:30 Fingerprint (SHA1): 14:81:9D:3E:03:0F:36:12:03:5B:B1:87:4D:D7:1E:CE:21:28:C4:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3202: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #3203: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121216 (0x1e67d500) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 12:14:06 2017 Not After : Tue May 10 12:14:06 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:d0:ac:4c:51:92:44:75:96:53:05:56:e6:77:28:72: bb:0f:42:3b:de:1b:a0:ab:49:e2:d5:4c:df:7e:b3:0e: 86:e1:f3:b8:f1:28:c8:a1:a7:85:68:02:ea:54:22:b8: 47:63:0b:4d:d9:bc:8b:32:0b:dc:88:65:ad:9f:a8:c2: 89:ec:95:96:8b:a5:85:8d:52:90:04:90:ce:40:11:01: 42:b3:83:fb:1b:3b:53:24:99:6c:a2:81:9c:42:fa:9b: 46:13:27:c2:35:31:65:15:04:a0:06:fc:88:09:7c:5f: 5d:cb:70:72:59:6e:2d:1b:66:31:c8:09:b3:cb:57:a9: a6:82:13:d7:eb:8e:02:db:1b:0e:ee:9f:af:e5:5f:46: eb:e5:55:9e:87:15:20:c8:89:af:58:1d:66:15:3a:be: 3e:59:30:cd:8f:ed:25:6d:ab:b3:1b:cc:32:07:00:4a: 6d:0a:a3:d8:ed:bd:92:45:ac:88:98:40:f0:4f:34:51: bb:86:d4:14:6c:26:b8:85:86:5d:14:b4:a5:4f:05:cd: f8:0b:d2:00:49:e1:a4:f8:4f:23:b5:60:37:61:3a:a5: c5:d9:39:af:d4:e1:e4:5c:e7:7e:41:b7:c0:0a:6c:a0: 0d:cf:cd:80:8e:ff:ce:74:e0:d6:90:38:29:ff:39:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 13:c7:5b:fd:8c:14:6d:de:90:1a:63:b9:6a:04:4c:01: 6e:74:45:da:86:78:cf:bc:5b:27:00:a4:3c:ca:3e:89: 11:d6:f7:ed:6b:b3:90:12:c2:cf:34:dc:8d:8f:ed:2a: 15:59:e3:aa:df:08:54:06:3e:eb:1d:5c:e9:a4:f5:55: 6e:07:31:58:2e:f6:8b:07:97:b4:5b:e2:9a:50:fa:8c: 9f:88:5f:e6:6e:4e:e8:ba:1e:62:16:2b:ca:c1:50:9a: 0f:66:e1:88:d5:b9:32:80:1c:f8:8b:5c:9c:88:0b:5e: 51:b9:12:68:22:03:0d:9f:fa:0e:70:7a:e7:ea:e8:0a: ba:69:ba:0a:c6:9c:d3:02:ea:de:bf:76:ba:52:51:03: c4:f3:55:5a:e4:26:10:8d:f8:b5:fc:a4:ac:2c:b9:9c: 67:fd:47:5e:ec:48:e0:bb:80:2d:f3:d9:b1:b0:da:e9: c6:6e:8e:9b:d0:45:3d:28:70:ea:ca:1f:ec:81:1d:76: 6a:02:ed:d3:62:0b:84:b4:46:20:0c:0f:df:a4:b2:94: b9:3d:fd:20:73:91:bd:39:d9:67:b1:10:6e:63:65:15: 86:06:b0:8c:06:cb:96:7a:c1:76:b3:f8:e3:51:85:5b: 27:ed:77:33:d5:8a:2c:14:42:8e:7b:90:03:e0:e3:f7 Fingerprint (SHA-256): C9:09:26:67:96:E4:7C:50:47:13:92:12:79:FF:02:AE:92:D5:5D:BA:47:2D:9C:02:33:13:AD:57:66:9B:22:7C Fingerprint (SHA1): 36:A1:3A:60:09:30:78:A2:87:8A:71:B2:EF:CF:CD:B7:08:EF:E7:6F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3204: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121217 (0x1e67d501) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:14:07 2017 Not After : Tue May 10 12:14:07 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:df:b2:6f:3f:3a:b3:2c:a4:4e:a7:97:a1:f2:d2:7f: 6a:09:2e:ef:0e:e3:f1:4e:79:3f:27:2d:5b:95:02:d4: 8d:d6:6e:cb:a4:bf:ff:11:03:d5:f4:4e:89:1c:28:c2: 53:9f:7b:87:e1:11:6c:5b:47:fd:bd:bd:63:2a:bb:58: a3:5b:fe:3c:4b:8a:64:bb:80:c2:61:0b:cc:0f:2a:43: 02:46:05:d6:be:24:15:4a:34:c6:93:d0:19:1d:61:40: d1:c6:24:f8:28:30:c1:40:6d:13:b4:6b:b7:30:bd:98: b4:97:3e:cf:d9:61:35:00:2d:9c:41:11:fe:db:53:55: 8d:4a:48:38:37:cf:0c:e4:bf:61:c5:c4:36:8d:c9:ba: ac:be:20:32:96:d5:a7:32:dc:8a:27:a3:8e:9b:4c:62: d2:51:1e:e8:8b:e2:d2:85:8e:c5:52:d7:c5:ca:f3:ee: 24:ba:b2:5d:b1:76:1a:05:c0:3b:25:46:e4:d2:0a:55: d6:23:a5:a0:1a:8d:23:75:8c:a3:cf:c3:b2:f5:21:4b: 1e:9a:68:e9:8d:7d:d5:f0:46:c3:9d:79:bd:f1:34:0c: a4:f1:f4:e1:fb:e4:0c:c2:54:90:e3:3c:f5:b6:d7:6c: ae:95:17:c4:46:1a:93:8d:b6:4e:6e:77:2d:0f:82:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:3b:fb:0c:ed:19:75:49:3c:95:ce:25:d4:45:ce:96: 9e:01:37:7f:c6:a7:72:e8:22:ee:74:d9:dc:3d:e3:e5: da:84:e5:40:55:51:83:af:31:e8:3c:b1:e8:1e:53:68: 66:64:07:70:8a:49:61:24:99:c4:1b:c1:b4:ba:59:3b: ce:c7:4b:08:b0:6b:20:14:de:cd:0e:fe:6a:c1:3b:cc: cb:74:de:01:db:fb:36:e3:3f:ec:e2:fe:87:b1:91:ce: 24:20:91:85:fe:81:75:fe:65:03:cc:af:4c:75:41:c1: ea:34:30:fe:aa:5d:0f:16:c1:3b:8f:d8:2e:d4:68:49: 1c:77:4e:ec:56:5c:cd:7a:12:36:cf:de:dd:b3:df:53: 9c:45:61:10:0e:20:d1:db:2b:ef:d1:3f:d0:c3:4e:13: c6:73:e1:a4:58:5b:80:a0:b0:44:10:5f:20:eb:54:63: 72:11:60:67:c7:b0:09:72:9f:72:49:9e:8d:8c:08:ba: 9f:a3:50:1b:5b:03:71:7c:e0:77:c0:32:5d:5d:bb:54: 8b:d4:eb:34:88:48:01:60:72:ec:6e:46:fb:52:f9:63: d9:50:a3:fd:e2:90:e6:4a:ac:36:1f:a5:74:83:a9:b2: 5b:b8:cb:9a:65:e9:4b:b7:81:4a:ec:34:9c:31:16:8a Fingerprint (SHA-256): 01:83:3D:1C:10:9F:D1:30:66:B6:0B:7A:2C:E1:D0:EB:06:00:35:FA:5C:CF:A8:8D:21:8B:A1:E5:49:7C:0B:30 Fingerprint (SHA1): 14:81:9D:3E:03:0F:36:12:03:5B:B1:87:4D:D7:1E:CE:21:28:C4:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3205: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121217 (0x1e67d501) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:14:07 2017 Not After : Tue May 10 12:14:07 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:df:b2:6f:3f:3a:b3:2c:a4:4e:a7:97:a1:f2:d2:7f: 6a:09:2e:ef:0e:e3:f1:4e:79:3f:27:2d:5b:95:02:d4: 8d:d6:6e:cb:a4:bf:ff:11:03:d5:f4:4e:89:1c:28:c2: 53:9f:7b:87:e1:11:6c:5b:47:fd:bd:bd:63:2a:bb:58: a3:5b:fe:3c:4b:8a:64:bb:80:c2:61:0b:cc:0f:2a:43: 02:46:05:d6:be:24:15:4a:34:c6:93:d0:19:1d:61:40: d1:c6:24:f8:28:30:c1:40:6d:13:b4:6b:b7:30:bd:98: b4:97:3e:cf:d9:61:35:00:2d:9c:41:11:fe:db:53:55: 8d:4a:48:38:37:cf:0c:e4:bf:61:c5:c4:36:8d:c9:ba: ac:be:20:32:96:d5:a7:32:dc:8a:27:a3:8e:9b:4c:62: d2:51:1e:e8:8b:e2:d2:85:8e:c5:52:d7:c5:ca:f3:ee: 24:ba:b2:5d:b1:76:1a:05:c0:3b:25:46:e4:d2:0a:55: d6:23:a5:a0:1a:8d:23:75:8c:a3:cf:c3:b2:f5:21:4b: 1e:9a:68:e9:8d:7d:d5:f0:46:c3:9d:79:bd:f1:34:0c: a4:f1:f4:e1:fb:e4:0c:c2:54:90:e3:3c:f5:b6:d7:6c: ae:95:17:c4:46:1a:93:8d:b6:4e:6e:77:2d:0f:82:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:3b:fb:0c:ed:19:75:49:3c:95:ce:25:d4:45:ce:96: 9e:01:37:7f:c6:a7:72:e8:22:ee:74:d9:dc:3d:e3:e5: da:84:e5:40:55:51:83:af:31:e8:3c:b1:e8:1e:53:68: 66:64:07:70:8a:49:61:24:99:c4:1b:c1:b4:ba:59:3b: ce:c7:4b:08:b0:6b:20:14:de:cd:0e:fe:6a:c1:3b:cc: cb:74:de:01:db:fb:36:e3:3f:ec:e2:fe:87:b1:91:ce: 24:20:91:85:fe:81:75:fe:65:03:cc:af:4c:75:41:c1: ea:34:30:fe:aa:5d:0f:16:c1:3b:8f:d8:2e:d4:68:49: 1c:77:4e:ec:56:5c:cd:7a:12:36:cf:de:dd:b3:df:53: 9c:45:61:10:0e:20:d1:db:2b:ef:d1:3f:d0:c3:4e:13: c6:73:e1:a4:58:5b:80:a0:b0:44:10:5f:20:eb:54:63: 72:11:60:67:c7:b0:09:72:9f:72:49:9e:8d:8c:08:ba: 9f:a3:50:1b:5b:03:71:7c:e0:77:c0:32:5d:5d:bb:54: 8b:d4:eb:34:88:48:01:60:72:ec:6e:46:fb:52:f9:63: d9:50:a3:fd:e2:90:e6:4a:ac:36:1f:a5:74:83:a9:b2: 5b:b8:cb:9a:65:e9:4b:b7:81:4a:ec:34:9c:31:16:8a Fingerprint (SHA-256): 01:83:3D:1C:10:9F:D1:30:66:B6:0B:7A:2C:E1:D0:EB:06:00:35:FA:5C:CF:A8:8D:21:8B:A1:E5:49:7C:0B:30 Fingerprint (SHA1): 14:81:9D:3E:03:0F:36:12:03:5B:B1:87:4D:D7:1E:CE:21:28:C4:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3206: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3207: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121224 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3208: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3209: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3210: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121225 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3211: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3212: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #3213: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3214: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 510121226 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3215: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3216: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #3217: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3218: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 510121227 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3219: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3220: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3221: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3222: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 510121228 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3223: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3224: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 510121229 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3225: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3226: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #3227: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3228: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3229: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 510121230 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3230: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3231: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3232: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3233: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 510121231 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3234: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3235: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3236: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3237: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510121232 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3238: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3239: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3240: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3241: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 510121233 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3242: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3243: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3244: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121224 (0x1e67d508) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 12:14:18 2017 Not After : Tue May 10 12:14:18 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:fc:89:44:3a:ca:f3:ab:b6:83:4c:9d:c0:c2:cb:c6: 62:0c:e5:fa:3f:e3:90:0f:fc:f3:65:e7:54:fc:7f:0e: 77:11:18:4e:02:58:45:5f:e1:2a:0c:d3:7b:5c:82:0b: 9b:8c:d0:40:1b:f7:33:3b:e2:f2:1b:f3:a5:33:80:d6: bc:90:3d:3c:02:fb:49:07:a2:a8:05:2f:99:75:ed:d6: 76:d7:ef:29:93:74:b3:96:12:06:6f:b9:0b:d6:08:ac: 19:3e:ea:42:a6:29:5c:3c:70:b7:3b:22:9d:47:1d:09: fc:09:0e:3e:85:e3:24:60:d4:d0:d9:4d:fb:58:26:88: 23:98:21:e2:0c:84:e8:48:b7:cd:54:fa:90:f7:05:44: b9:03:17:ee:dd:32:7e:52:fb:82:8f:de:84:f3:b9:4d: e7:87:f5:3e:f2:98:09:7d:0c:39:dc:d5:9c:fd:c5:af: 16:b9:ba:42:82:5b:a8:14:2a:19:2c:5f:cf:6b:85:fd: 5f:86:b0:e3:53:d1:3e:13:27:86:83:4d:41:da:f2:f1: 53:b4:84:38:fe:b3:3b:73:fb:85:fa:6e:fb:22:d5:f1: e9:12:ec:c8:0c:23:db:fb:dc:02:b7:68:56:18:1c:4a: 05:9e:00:b3:a7:d2:dc:64:66:84:21:a3:f6:36:c3:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:ef:50:f3:ea:2f:4a:57:dc:f9:96:84:57:9c:54:6f: 1e:a8:7d:90:6a:40:16:a1:cb:39:ba:a5:66:c7:eb:dd: 71:64:a3:ef:e0:2c:d9:aa:11:c4:f6:44:75:9e:6f:14: 95:a7:9a:33:ba:b2:01:4b:53:7c:d4:65:7d:1b:b5:fe: c9:24:87:b3:ce:ad:1f:a7:dc:0d:ee:03:77:bf:c1:a5: a8:a0:e4:5e:57:4b:68:84:d2:64:96:9d:b4:0f:e8:c8: 0e:c4:f1:b1:c2:01:fb:12:ef:ef:9b:4c:db:87:74:17: 45:05:4f:c1:b4:9c:b5:df:f7:b9:bb:e6:27:f6:51:71: 3c:65:bc:58:c1:61:85:6e:05:4a:01:86:6b:ac:37:81: 1f:9f:2a:a0:1a:45:5a:ca:77:7f:ba:a3:76:2b:d1:05: c8:37:10:67:31:90:52:33:67:4f:68:3e:8e:67:f0:30: 27:1b:66:f2:c9:b9:c0:80:d8:63:43:b3:7e:d1:5a:0c: 34:e9:4c:1a:70:ed:5c:40:92:87:8e:f7:98:e3:53:9a: 46:ca:67:1f:51:d9:b2:f6:dc:e0:b6:29:ac:74:e1:82: d3:4c:8e:2a:7b:51:b9:03:8f:e5:80:03:4e:58:65:8d: 5d:64:14:d2:ea:3e:01:93:02:90:7b:92:7c:41:60:c5 Fingerprint (SHA-256): FD:36:C2:DC:E3:4D:3E:25:D3:EF:79:DF:BF:78:24:C3:6E:E8:FE:3E:E7:9F:EB:13:61:15:3E:25:45:39:FF:53 Fingerprint (SHA1): 73:9D:34:F5:6A:E6:2D:D4:3B:58:46:6F:8F:8F:2F:5A:01:55:96:DD Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #3245: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3246: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3247: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3248: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3249: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3250: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3251: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3252: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3253: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121225 (0x1e67d509) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:14:19 2017 Not After : Tue May 10 12:14:19 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ea:ec:a1:f2:5f:76:cc:8e:f1:d7:67:c7:90:ec:6e: b4:b1:f4:17:36:a8:c9:dd:c9:2e:49:9b:e3:93:78:07: f2:82:ed:97:e2:e0:b3:26:b7:74:bd:58:f7:40:5d:16: ad:56:35:98:dd:86:a3:87:ae:a4:68:d7:8b:d7:6d:6f: 7d:d7:24:2f:05:a8:79:3e:5c:b9:17:aa:ea:52:bb:a6: 10:bb:2a:aa:54:44:74:dc:34:76:19:d0:85:b5:c4:5a: 69:4e:08:04:1a:d2:24:cf:a8:98:95:b7:64:6f:9a:4f: 07:b3:30:8e:af:aa:e3:fc:4d:80:b7:8f:bf:e5:36:b4: c6:d1:22:9b:21:11:0b:91:f0:ca:5f:cc:18:f2:ec:8c: ee:1d:80:3a:bc:69:5c:4f:13:8e:e0:e7:0f:c0:b2:0f: d4:77:98:c1:54:d3:a3:23:58:c8:8e:6b:a2:f2:50:f2: ef:81:cf:00:b7:bb:2a:a6:88:0c:b7:92:9c:ca:44:96: c3:db:d1:2c:1e:58:a7:38:f1:46:3d:ac:ea:19:ab:ee: a2:a8:ad:e0:82:81:08:bc:89:38:73:4f:72:c2:91:8b: 6b:20:b7:d5:b6:53:76:30:04:f5:75:33:9b:02:71:81: 09:b8:01:b2:c3:8b:d7:52:3a:ed:f1:64:79:9d:cb:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 70:98:89:8c:ff:57:af:bd:1b:e4:46:ce:35:fc:50:ac: 2b:4d:25:69:5d:d4:69:ac:eb:38:01:38:e3:9c:3c:df: dc:84:36:b4:9a:23:fe:0a:09:3d:9e:57:45:83:db:5f: 9e:c8:1c:4b:04:c3:85:c4:7a:76:ee:ff:4c:36:d2:9f: 34:91:b2:72:2c:4b:ea:7a:f7:2b:40:59:36:2c:8a:b2: b6:55:dd:2a:6b:aa:46:8a:de:79:04:a7:15:0f:29:ae: e5:b4:74:30:86:2c:a7:dc:d9:d2:f2:33:56:e2:d5:95: 12:dd:a5:7f:12:51:6d:00:0b:c6:4e:22:ac:00:64:e2: bd:d5:99:a9:cd:51:8b:57:45:c6:b4:e3:ac:8d:b2:ee: db:5f:e0:a9:73:ed:78:9e:70:b6:9b:7d:5c:9a:63:bf: 28:4e:94:6d:ae:e3:ad:ab:ce:32:19:e0:5a:a5:6f:d7: ea:93:06:ac:38:ae:1c:8e:5a:33:87:06:2a:3e:42:08: 85:1b:c1:17:92:e3:f2:f8:ed:97:b9:b1:cc:a8:4d:aa: f7:37:29:24:ac:e5:56:d0:00:c6:2e:2b:99:70:63:58: 39:de:b8:c2:f0:c7:31:ab:89:ec:a4:86:5f:e8:a8:05: 36:64:bc:cc:d4:a1:ae:0e:a1:f6:83:17:08:40:b1:dd Fingerprint (SHA-256): 20:A3:DC:BE:73:E9:CF:52:05:21:E3:F6:8D:24:18:67:F2:89:3E:D2:B0:A5:98:A5:FB:FD:A7:CE:0B:88:D9:E7 Fingerprint (SHA1): 2E:48:9B:E1:AE:60:C1:EF:5B:A8:0E:6B:4B:C1:BB:76:63:3D:69:56 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #3254: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3255: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3256: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3257: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3258: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3259: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3260: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #3261: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #3262: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #3263: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #3264: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #3265: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #3266: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #3267: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #3268: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #3269: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #3270: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #3271: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3272: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121234 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3273: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3274: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3275: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3276: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510121235 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3277: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3278: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3279: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3280: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510121236 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3281: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3282: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3283: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3284: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 510121237 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3285: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3286: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3287: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3288: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 510121238 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3289: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3290: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #3291: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3292: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 510121239 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3293: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3294: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #3295: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3296: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 510121240 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3297: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3298: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #3299: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3300: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 510121241 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3301: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3302: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #3303: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3304: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 510121242 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3305: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3306: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3307: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121234 (0x1e67d512) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:14:33 2017 Not After : Tue May 10 12:14:33 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 75:1d:e5:c7:a1:34:2c:09:81:77:78:6e:ab:41:b9:24: 46:6a:3e:e9:d5:57:d0:f8:48:2e:ec:7b:ce:33:db:44: b9:8f:89:f1:05:7c:d0:f3:be:3e:2b:76:d3:01:8f:66: 1f:de:75:b6:80:ab:a7:a2:04:40:a7:cf:6f:c9:62:63: cb:ca:5f:31:17:0d:db:70:ce:f1:c6:bc:42:0d:4d:08: 69:3b:91:9d:e9:73:9e:31:6f:e8:1c:e7:a3:3d:f0:d9: 67:2f:04:d5:9c:d6:88:91:7c:aa:3d:0b:ee:f6:be:59: 61:00:5c:d5:df:04:0c:d8:07:ce:f0:53:3a:39:b8:f5: 4a:c9:5c:28:64:52:1c:0c:f3:98:8b:4a:9b:48:0f:36: 53:e0:dd:b6:89:fa:6f:71:f2:0b:4c:fe:59:ee:d6:28: 83:ab:a3:06:c2:e2:82:aa:bb:61:4e:9a:68:3c:d2:e0: fb:a1:e0:81:8c:ea:46:bf:28:54:0c:7c:69:9b:b0:a9: 42:fc:9f:a2:a5:2c:a4:24:55:3b:15:a3:bc:81:0a:3b: e5:75:2b:d0:e7:38:e0:72:a4:cc:b2:43:79:67:49:b4: 8c:e7:62:b0:bf:c2:e0:7e:41:fd:bf:9a:09:d1:29:5e: 7d:54:a9:f6:d0:89:f9:28:be:0a:47:24:eb:cc:ad:de Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1d:00:9a:11:10:d6:d4:a1:9b:50:1b:d1:fb: 3b:20:66:42:37:b6:00:a3:6d:03:b0:53:ae:18:fa:51: 9f:02:1c:06:c9:db:29:4f:41:5b:53:9a:b2:4c:43:13: 24:5f:64:44:64:24:1a:d5:da:5a:25:9d:ad:f7:e6 Fingerprint (SHA-256): E1:81:F1:B6:B8:B3:E2:F7:FD:96:06:81:ED:01:7A:CA:CD:AC:8E:16:88:60:10:D8:2C:E0:10:9F:CB:03:55:36 Fingerprint (SHA1): CF:7F:5D:9E:C2:B0:E2:5B:B7:BF:75:59:18:0E:7F:BF:D8:04:A8:8F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3308: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121234 (0x1e67d512) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:14:33 2017 Not After : Tue May 10 12:14:33 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 75:1d:e5:c7:a1:34:2c:09:81:77:78:6e:ab:41:b9:24: 46:6a:3e:e9:d5:57:d0:f8:48:2e:ec:7b:ce:33:db:44: b9:8f:89:f1:05:7c:d0:f3:be:3e:2b:76:d3:01:8f:66: 1f:de:75:b6:80:ab:a7:a2:04:40:a7:cf:6f:c9:62:63: cb:ca:5f:31:17:0d:db:70:ce:f1:c6:bc:42:0d:4d:08: 69:3b:91:9d:e9:73:9e:31:6f:e8:1c:e7:a3:3d:f0:d9: 67:2f:04:d5:9c:d6:88:91:7c:aa:3d:0b:ee:f6:be:59: 61:00:5c:d5:df:04:0c:d8:07:ce:f0:53:3a:39:b8:f5: 4a:c9:5c:28:64:52:1c:0c:f3:98:8b:4a:9b:48:0f:36: 53:e0:dd:b6:89:fa:6f:71:f2:0b:4c:fe:59:ee:d6:28: 83:ab:a3:06:c2:e2:82:aa:bb:61:4e:9a:68:3c:d2:e0: fb:a1:e0:81:8c:ea:46:bf:28:54:0c:7c:69:9b:b0:a9: 42:fc:9f:a2:a5:2c:a4:24:55:3b:15:a3:bc:81:0a:3b: e5:75:2b:d0:e7:38:e0:72:a4:cc:b2:43:79:67:49:b4: 8c:e7:62:b0:bf:c2:e0:7e:41:fd:bf:9a:09:d1:29:5e: 7d:54:a9:f6:d0:89:f9:28:be:0a:47:24:eb:cc:ad:de Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1d:00:9a:11:10:d6:d4:a1:9b:50:1b:d1:fb: 3b:20:66:42:37:b6:00:a3:6d:03:b0:53:ae:18:fa:51: 9f:02:1c:06:c9:db:29:4f:41:5b:53:9a:b2:4c:43:13: 24:5f:64:44:64:24:1a:d5:da:5a:25:9d:ad:f7:e6 Fingerprint (SHA-256): E1:81:F1:B6:B8:B3:E2:F7:FD:96:06:81:ED:01:7A:CA:CD:AC:8E:16:88:60:10:D8:2C:E0:10:9F:CB:03:55:36 Fingerprint (SHA1): CF:7F:5D:9E:C2:B0:E2:5B:B7:BF:75:59:18:0E:7F:BF:D8:04:A8:8F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3309: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121234 (0x1e67d512) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:14:33 2017 Not After : Tue May 10 12:14:33 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 75:1d:e5:c7:a1:34:2c:09:81:77:78:6e:ab:41:b9:24: 46:6a:3e:e9:d5:57:d0:f8:48:2e:ec:7b:ce:33:db:44: b9:8f:89:f1:05:7c:d0:f3:be:3e:2b:76:d3:01:8f:66: 1f:de:75:b6:80:ab:a7:a2:04:40:a7:cf:6f:c9:62:63: cb:ca:5f:31:17:0d:db:70:ce:f1:c6:bc:42:0d:4d:08: 69:3b:91:9d:e9:73:9e:31:6f:e8:1c:e7:a3:3d:f0:d9: 67:2f:04:d5:9c:d6:88:91:7c:aa:3d:0b:ee:f6:be:59: 61:00:5c:d5:df:04:0c:d8:07:ce:f0:53:3a:39:b8:f5: 4a:c9:5c:28:64:52:1c:0c:f3:98:8b:4a:9b:48:0f:36: 53:e0:dd:b6:89:fa:6f:71:f2:0b:4c:fe:59:ee:d6:28: 83:ab:a3:06:c2:e2:82:aa:bb:61:4e:9a:68:3c:d2:e0: fb:a1:e0:81:8c:ea:46:bf:28:54:0c:7c:69:9b:b0:a9: 42:fc:9f:a2:a5:2c:a4:24:55:3b:15:a3:bc:81:0a:3b: e5:75:2b:d0:e7:38:e0:72:a4:cc:b2:43:79:67:49:b4: 8c:e7:62:b0:bf:c2:e0:7e:41:fd:bf:9a:09:d1:29:5e: 7d:54:a9:f6:d0:89:f9:28:be:0a:47:24:eb:cc:ad:de Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1d:00:9a:11:10:d6:d4:a1:9b:50:1b:d1:fb: 3b:20:66:42:37:b6:00:a3:6d:03:b0:53:ae:18:fa:51: 9f:02:1c:06:c9:db:29:4f:41:5b:53:9a:b2:4c:43:13: 24:5f:64:44:64:24:1a:d5:da:5a:25:9d:ad:f7:e6 Fingerprint (SHA-256): E1:81:F1:B6:B8:B3:E2:F7:FD:96:06:81:ED:01:7A:CA:CD:AC:8E:16:88:60:10:D8:2C:E0:10:9F:CB:03:55:36 Fingerprint (SHA1): CF:7F:5D:9E:C2:B0:E2:5B:B7:BF:75:59:18:0E:7F:BF:D8:04:A8:8F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #3310: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121234 (0x1e67d512) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:14:33 2017 Not After : Tue May 10 12:14:33 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 75:1d:e5:c7:a1:34:2c:09:81:77:78:6e:ab:41:b9:24: 46:6a:3e:e9:d5:57:d0:f8:48:2e:ec:7b:ce:33:db:44: b9:8f:89:f1:05:7c:d0:f3:be:3e:2b:76:d3:01:8f:66: 1f:de:75:b6:80:ab:a7:a2:04:40:a7:cf:6f:c9:62:63: cb:ca:5f:31:17:0d:db:70:ce:f1:c6:bc:42:0d:4d:08: 69:3b:91:9d:e9:73:9e:31:6f:e8:1c:e7:a3:3d:f0:d9: 67:2f:04:d5:9c:d6:88:91:7c:aa:3d:0b:ee:f6:be:59: 61:00:5c:d5:df:04:0c:d8:07:ce:f0:53:3a:39:b8:f5: 4a:c9:5c:28:64:52:1c:0c:f3:98:8b:4a:9b:48:0f:36: 53:e0:dd:b6:89:fa:6f:71:f2:0b:4c:fe:59:ee:d6:28: 83:ab:a3:06:c2:e2:82:aa:bb:61:4e:9a:68:3c:d2:e0: fb:a1:e0:81:8c:ea:46:bf:28:54:0c:7c:69:9b:b0:a9: 42:fc:9f:a2:a5:2c:a4:24:55:3b:15:a3:bc:81:0a:3b: e5:75:2b:d0:e7:38:e0:72:a4:cc:b2:43:79:67:49:b4: 8c:e7:62:b0:bf:c2:e0:7e:41:fd:bf:9a:09:d1:29:5e: 7d:54:a9:f6:d0:89:f9:28:be:0a:47:24:eb:cc:ad:de Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1d:00:9a:11:10:d6:d4:a1:9b:50:1b:d1:fb: 3b:20:66:42:37:b6:00:a3:6d:03:b0:53:ae:18:fa:51: 9f:02:1c:06:c9:db:29:4f:41:5b:53:9a:b2:4c:43:13: 24:5f:64:44:64:24:1a:d5:da:5a:25:9d:ad:f7:e6 Fingerprint (SHA-256): E1:81:F1:B6:B8:B3:E2:F7:FD:96:06:81:ED:01:7A:CA:CD:AC:8E:16:88:60:10:D8:2C:E0:10:9F:CB:03:55:36 Fingerprint (SHA1): CF:7F:5D:9E:C2:B0:E2:5B:B7:BF:75:59:18:0E:7F:BF:D8:04:A8:8F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #3311: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3312: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3313: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3314: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #3315: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3316: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3317: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3318: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3319: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3320: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3321: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3322: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #3323: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3324: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3325: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3326: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #3327: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3328: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3329: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3330: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3331: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3332: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3333: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3334: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #3335: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3336: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3337: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3338: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20170510121455Z nextupdate=20180510121455Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed May 10 12:14:55 2017 Next Update: Thu May 10 12:14:55 2018 CRL Extensions: chains.sh: #3339: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510121455Z nextupdate=20180510121455Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 12:14:55 2017 Next Update: Thu May 10 12:14:55 2018 CRL Extensions: chains.sh: #3340: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170510121455Z nextupdate=20180510121455Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed May 10 12:14:55 2017 Next Update: Thu May 10 12:14:55 2018 CRL Extensions: chains.sh: #3341: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20170510121455Z nextupdate=20180510121455Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed May 10 12:14:55 2017 Next Update: Thu May 10 12:14:55 2018 CRL Extensions: chains.sh: #3342: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170510121456Z addcert 14 20170510121456Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed May 10 12:14:56 2017 Next Update: Thu May 10 12:14:55 2018 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Wed May 10 12:14:56 2017 CRL Extensions: chains.sh: #3343: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510121457Z addcert 15 20170510121457Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 12:14:57 2017 Next Update: Thu May 10 12:14:55 2018 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Wed May 10 12:14:57 2017 CRL Extensions: chains.sh: #3344: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3345: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3346: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #3347: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #3348: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #3349: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #3350: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #3351: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #3352: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #3353: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:14:45 2017 Not After : Tue May 10 12:14:45 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:43:44:a9:e5:5f:fb:67:ad:62:24:3a:ba:04:76:56: d2:6a:37:f5:6f:c6:e4:a3:cc:e5:12:e1:5f:d4:f4:3b: 2a:ca:ac:ef:4f:9c:ee:6f:b7:a3:c5:c6:d9:aa:a9:27: 75:d8:7a:92:5d:7a:4f:93:7d:e9:5d:f3:7f:3c:af:2f: b2:11:66:20:46:66:b2:f4:9e:e1:6b:80:62:8e:f5:56: 31:e5:f3:3f:25:14:e5:78:4a:17:18:a3:d8:f1:19:03: a6:cb:6e:e2:f1:af:d9:ba:78:19:10:fc:10:44:85:5a: ba:e3:25:0c:fa:e8:a5:bf:c1:33:74:b3:aa:c2:ee:fd: 36:ac:75:c2:0b:65:81:28:57:cf:8a:bf:34:99:10:11: dc:f4:c0:6b:64:89:43:c5:e4:00:9a:76:a8:df:25:60: 84:9c:ba:c2:78:d7:6a:91:b1:39:be:a2:22:58:ed:82: 84:4d:93:bb:e9:0e:c7:45:87:8d:6d:7d:26:48:53:3f: ca:7d:4b:9d:50:31:f8:d2:24:14:41:62:09:dd:04:78: eb:3a:6c:fb:43:1d:5d:d4:ad:93:f3:8b:47:e1:38:0b: 55:a6:7c:22:06:f5:64:86:af:37:48:76:e3:ad:d9:08: 80:40:d6:b5:6d:9c:e4:16:17:54:86:d0:41:7c:03:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:a1:2f:38:df:ea:4f:66:7d:2e:fe:96:ba:ae:25:33: fb:3e:9a:53:f2:5f:c9:fb:ce:e6:19:91:33:66:1b:5e: 63:8d:01:6c:19:b2:af:64:ac:6f:88:2e:e1:fd:8f:53: 06:a3:e5:b3:80:f4:f5:1e:36:f4:42:68:64:ef:dd:2a: bb:53:d5:a0:ee:71:de:18:76:ac:56:da:7d:59:01:c7: 8e:92:35:33:20:86:da:4c:cb:58:87:1d:59:33:75:b7: 70:5e:a9:d3:0a:54:43:6d:61:09:d2:46:9e:ee:0b:2c: 6e:ac:e9:56:e1:c2:0e:8c:89:5f:0d:6b:3b:e9:55:01: 81:40:a5:f5:82:e7:ea:c1:98:4a:5c:b4:18:36:b6:13: f3:90:43:9b:d0:ad:e9:60:0f:32:fe:b9:37:fd:67:4e: 26:77:df:c2:49:9f:e6:a3:7b:0c:f6:14:f0:bf:74:09: fc:c8:69:19:ab:d4:f6:ef:09:a6:3b:89:61:cf:18:2c: 0a:1f:6b:d6:a0:5a:9d:c3:c2:57:f4:f9:d9:16:d7:3a: b7:5d:7e:57:e4:a2:4f:ed:cf:18:b6:d6:43:2f:e1:ce: 18:8d:79:a9:ce:0b:7b:fd:2f:7d:cd:94:8a:9c:16:fe: 5f:4b:37:bb:95:80:6e:4a:74:4f:4c:cd:d6:0b:d2:59 Fingerprint (SHA-256): C2:FD:77:37:53:72:1B:29:5B:8A:0A:26:5A:87:9C:5E:55:95:57:8F:42:19:7F:45:1A:A4:38:90:7B:85:C0:CC Fingerprint (SHA1): B8:91:55:A6:AC:48:EA:65:A2:18:4B:B4:09:FB:0F:AF:17:C1:A5:2A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #3354: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3355: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:14:45 2017 Not After : Tue May 10 12:14:45 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:43:44:a9:e5:5f:fb:67:ad:62:24:3a:ba:04:76:56: d2:6a:37:f5:6f:c6:e4:a3:cc:e5:12:e1:5f:d4:f4:3b: 2a:ca:ac:ef:4f:9c:ee:6f:b7:a3:c5:c6:d9:aa:a9:27: 75:d8:7a:92:5d:7a:4f:93:7d:e9:5d:f3:7f:3c:af:2f: b2:11:66:20:46:66:b2:f4:9e:e1:6b:80:62:8e:f5:56: 31:e5:f3:3f:25:14:e5:78:4a:17:18:a3:d8:f1:19:03: a6:cb:6e:e2:f1:af:d9:ba:78:19:10:fc:10:44:85:5a: ba:e3:25:0c:fa:e8:a5:bf:c1:33:74:b3:aa:c2:ee:fd: 36:ac:75:c2:0b:65:81:28:57:cf:8a:bf:34:99:10:11: dc:f4:c0:6b:64:89:43:c5:e4:00:9a:76:a8:df:25:60: 84:9c:ba:c2:78:d7:6a:91:b1:39:be:a2:22:58:ed:82: 84:4d:93:bb:e9:0e:c7:45:87:8d:6d:7d:26:48:53:3f: ca:7d:4b:9d:50:31:f8:d2:24:14:41:62:09:dd:04:78: eb:3a:6c:fb:43:1d:5d:d4:ad:93:f3:8b:47:e1:38:0b: 55:a6:7c:22:06:f5:64:86:af:37:48:76:e3:ad:d9:08: 80:40:d6:b5:6d:9c:e4:16:17:54:86:d0:41:7c:03:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:a1:2f:38:df:ea:4f:66:7d:2e:fe:96:ba:ae:25:33: fb:3e:9a:53:f2:5f:c9:fb:ce:e6:19:91:33:66:1b:5e: 63:8d:01:6c:19:b2:af:64:ac:6f:88:2e:e1:fd:8f:53: 06:a3:e5:b3:80:f4:f5:1e:36:f4:42:68:64:ef:dd:2a: bb:53:d5:a0:ee:71:de:18:76:ac:56:da:7d:59:01:c7: 8e:92:35:33:20:86:da:4c:cb:58:87:1d:59:33:75:b7: 70:5e:a9:d3:0a:54:43:6d:61:09:d2:46:9e:ee:0b:2c: 6e:ac:e9:56:e1:c2:0e:8c:89:5f:0d:6b:3b:e9:55:01: 81:40:a5:f5:82:e7:ea:c1:98:4a:5c:b4:18:36:b6:13: f3:90:43:9b:d0:ad:e9:60:0f:32:fe:b9:37:fd:67:4e: 26:77:df:c2:49:9f:e6:a3:7b:0c:f6:14:f0:bf:74:09: fc:c8:69:19:ab:d4:f6:ef:09:a6:3b:89:61:cf:18:2c: 0a:1f:6b:d6:a0:5a:9d:c3:c2:57:f4:f9:d9:16:d7:3a: b7:5d:7e:57:e4:a2:4f:ed:cf:18:b6:d6:43:2f:e1:ce: 18:8d:79:a9:ce:0b:7b:fd:2f:7d:cd:94:8a:9c:16:fe: 5f:4b:37:bb:95:80:6e:4a:74:4f:4c:cd:d6:0b:d2:59 Fingerprint (SHA-256): C2:FD:77:37:53:72:1B:29:5B:8A:0A:26:5A:87:9C:5E:55:95:57:8F:42:19:7F:45:1A:A4:38:90:7B:85:C0:CC Fingerprint (SHA1): B8:91:55:A6:AC:48:EA:65:A2:18:4B:B4:09:FB:0F:AF:17:C1:A5:2A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #3356: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3357: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3358: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121243 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3359: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3360: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #3361: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3362: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 510121244 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3363: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3364: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3365: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510121134.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3366: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0Root-510121119.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3367: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3368: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #3369: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510121134.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3370: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 510121245 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3371: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3372: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3373: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510121134.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3374: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0Root-510121120.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3375: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3376: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #3377: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3378: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 510121246 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3379: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3380: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3381: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510121134.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3382: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0Root-510121121.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3383: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3384: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3385: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510121134.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3386: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0Root-510121122.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3387: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3388: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20170510121508Z nextupdate=20180510121509Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed May 10 12:15:08 2017 Next Update: Thu May 10 12:15:09 2018 CRL Extensions: chains.sh: #3389: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510121509Z nextupdate=20180510121509Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 12:15:09 2017 Next Update: Thu May 10 12:15:09 2018 CRL Extensions: chains.sh: #3390: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170510121509Z nextupdate=20180510121509Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed May 10 12:15:09 2017 Next Update: Thu May 10 12:15:09 2018 CRL Extensions: chains.sh: #3391: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20170510121509Z nextupdate=20180510121509Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed May 10 12:15:09 2017 Next Update: Thu May 10 12:15:09 2018 CRL Extensions: chains.sh: #3392: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510121510Z addcert 20 20170510121510Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 12:15:10 2017 Next Update: Thu May 10 12:15:09 2018 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed May 10 12:15:10 2017 CRL Extensions: chains.sh: #3393: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510121511Z addcert 40 20170510121511Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 12:15:11 2017 Next Update: Thu May 10 12:15:09 2018 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed May 10 12:15:10 2017 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Wed May 10 12:15:11 2017 CRL Extensions: chains.sh: #3394: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3395: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3396: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #3397: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121243 (0x1e67d51b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:14:59 2017 Not After : Tue May 10 12:14:59 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:70:07:c4:a2:fd:5d:40:40:74:69:96:38:61:ec:74: 45:09:fa:99:61:39:d4:9c:35:e1:b9:78:f0:31:93:17: 02:6d:f3:0a:fa:30:48:25:26:f8:18:4d:4d:27:05:fd: 9e:df:bd:92:4b:18:c7:8d:d5:f3:01:c3:d3:5a:ac:1e: 8f:88:f8:35:d1:ea:a8:24:a4:35:ec:96:39:fc:ad:ac: 1a:2c:a1:c2:04:42:f7:94:0f:64:17:92:43:ff:8e:02: f0:d1:af:1a:2c:e2:9f:67:fa:5d:2b:d0:73:98:ef:a0: f6:03:ca:58:4b:a2:08:e6:f5:8a:55:94:a5:7f:9c:b0: 80:a0:e2:09:d6:fa:da:a8:ef:b7:72:ed:63:01:00:38: fd:69:4a:15:2e:d7:01:cb:6c:18:e3:3c:c5:1f:9c:50: 0a:48:67:ac:d2:11:06:ea:6f:c8:fb:63:86:a0:4f:b0: 4a:2d:5e:8f:f5:21:2f:a0:f3:9a:df:90:91:b6:91:6a: 9d:c9:ec:1a:d0:5b:c5:17:c7:b5:fc:35:4c:f9:cc:01: 4c:b7:b8:89:60:0e:ec:cb:a4:ae:ce:05:d4:23:cf:bc: 9d:b0:fb:a7:89:4b:fc:eb:6b:bd:9f:64:0e:89:06:d6: 5c:93:47:87:4b:d0:c0:a0:57:c2:4e:d3:31:e8:77:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:5a:c5:78:1b:a0:0a:bb:a3:9f:bb:31:71:31:ee:e7: 7a:1f:a5:48:bd:e8:84:50:83:1f:b6:14:42:c8:88:7a: fd:90:78:d8:c1:53:0f:68:28:af:ac:0f:a5:52:96:4b: ef:06:bc:50:43:bb:12:41:f7:de:12:11:04:53:21:41: 6c:e3:c6:df:f7:0d:24:e8:07:e8:49:42:c7:0a:cd:cc: 3c:0e:3e:b3:e2:9f:bd:71:c0:9d:1a:e5:4d:96:42:49: a4:a2:fc:7a:d3:74:a9:22:a7:58:4d:76:54:ed:63:cf: da:b4:6b:ba:5d:6c:cb:41:2a:73:4d:b0:07:dd:06:4f: 38:a0:7f:d0:bb:b1:7b:36:42:65:76:15:c5:de:54:12: 05:8e:02:7f:b4:28:d9:b2:28:3d:30:c8:2c:a6:63:28: 00:22:a1:d3:00:1b:a8:cf:19:2f:a4:2d:62:c0:8a:02: b4:93:b1:4b:c4:09:6a:fc:5d:13:67:1f:c8:c2:81:ca: f6:c0:2b:18:a8:df:64:2e:29:f2:1b:32:32:cc:d5:63: 7d:57:16:de:d7:5f:0d:59:60:5e:1e:94:a2:1d:8e:7b: cc:99:18:6b:ce:ec:58:2d:76:0d:a5:24:6f:b4:4a:72: 51:22:1a:f0:29:4e:5c:b1:62:0d:fd:be:1e:a5:a7:5c Fingerprint (SHA-256): DD:E8:9E:8C:62:8A:0A:4A:50:36:55:F0:F2:E0:C2:BE:F5:41:BE:81:CC:14:73:2E:AB:5B:40:04:04:B9:E3:D0 Fingerprint (SHA1): AA:59:79:B6:EF:28:B1:6B:D2:AD:5A:A0:15:F0:C7:DF:51:AC:C9:B4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #3398: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3399: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121243 (0x1e67d51b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:14:59 2017 Not After : Tue May 10 12:14:59 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:70:07:c4:a2:fd:5d:40:40:74:69:96:38:61:ec:74: 45:09:fa:99:61:39:d4:9c:35:e1:b9:78:f0:31:93:17: 02:6d:f3:0a:fa:30:48:25:26:f8:18:4d:4d:27:05:fd: 9e:df:bd:92:4b:18:c7:8d:d5:f3:01:c3:d3:5a:ac:1e: 8f:88:f8:35:d1:ea:a8:24:a4:35:ec:96:39:fc:ad:ac: 1a:2c:a1:c2:04:42:f7:94:0f:64:17:92:43:ff:8e:02: f0:d1:af:1a:2c:e2:9f:67:fa:5d:2b:d0:73:98:ef:a0: f6:03:ca:58:4b:a2:08:e6:f5:8a:55:94:a5:7f:9c:b0: 80:a0:e2:09:d6:fa:da:a8:ef:b7:72:ed:63:01:00:38: fd:69:4a:15:2e:d7:01:cb:6c:18:e3:3c:c5:1f:9c:50: 0a:48:67:ac:d2:11:06:ea:6f:c8:fb:63:86:a0:4f:b0: 4a:2d:5e:8f:f5:21:2f:a0:f3:9a:df:90:91:b6:91:6a: 9d:c9:ec:1a:d0:5b:c5:17:c7:b5:fc:35:4c:f9:cc:01: 4c:b7:b8:89:60:0e:ec:cb:a4:ae:ce:05:d4:23:cf:bc: 9d:b0:fb:a7:89:4b:fc:eb:6b:bd:9f:64:0e:89:06:d6: 5c:93:47:87:4b:d0:c0:a0:57:c2:4e:d3:31:e8:77:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:5a:c5:78:1b:a0:0a:bb:a3:9f:bb:31:71:31:ee:e7: 7a:1f:a5:48:bd:e8:84:50:83:1f:b6:14:42:c8:88:7a: fd:90:78:d8:c1:53:0f:68:28:af:ac:0f:a5:52:96:4b: ef:06:bc:50:43:bb:12:41:f7:de:12:11:04:53:21:41: 6c:e3:c6:df:f7:0d:24:e8:07:e8:49:42:c7:0a:cd:cc: 3c:0e:3e:b3:e2:9f:bd:71:c0:9d:1a:e5:4d:96:42:49: a4:a2:fc:7a:d3:74:a9:22:a7:58:4d:76:54:ed:63:cf: da:b4:6b:ba:5d:6c:cb:41:2a:73:4d:b0:07:dd:06:4f: 38:a0:7f:d0:bb:b1:7b:36:42:65:76:15:c5:de:54:12: 05:8e:02:7f:b4:28:d9:b2:28:3d:30:c8:2c:a6:63:28: 00:22:a1:d3:00:1b:a8:cf:19:2f:a4:2d:62:c0:8a:02: b4:93:b1:4b:c4:09:6a:fc:5d:13:67:1f:c8:c2:81:ca: f6:c0:2b:18:a8:df:64:2e:29:f2:1b:32:32:cc:d5:63: 7d:57:16:de:d7:5f:0d:59:60:5e:1e:94:a2:1d:8e:7b: cc:99:18:6b:ce:ec:58:2d:76:0d:a5:24:6f:b4:4a:72: 51:22:1a:f0:29:4e:5c:b1:62:0d:fd:be:1e:a5:a7:5c Fingerprint (SHA-256): DD:E8:9E:8C:62:8A:0A:4A:50:36:55:F0:F2:E0:C2:BE:F5:41:BE:81:CC:14:73:2E:AB:5B:40:04:04:B9:E3:D0 Fingerprint (SHA1): AA:59:79:B6:EF:28:B1:6B:D2:AD:5A:A0:15:F0:C7:DF:51:AC:C9:B4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #3400: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3401: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #3402: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121247 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3403: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #3404: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3405: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3406: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 510121248 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3407: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3408: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3409: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3410: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510121249 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3411: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3412: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3413: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3414: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 510121250 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3415: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3416: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #3417: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121251 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3418: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #3419: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #3420: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3421: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 510121252 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3422: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3423: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3424: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3425: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 510121253 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3426: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3427: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #3428: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #3429: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #3430: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121247 (0x1e67d51f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:15:13 2017 Not After : Tue May 10 12:15:13 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:03:1c:27:10:68:c6:d1:fc:5c:18:e8:ff:1b:bf:10: da:47:63:10:d7:c1:1e:bb:93:dd:2c:d8:b4:04:49:64: c3:36:b8:76:3c:e0:45:bc:43:bc:e8:b8:42:57:c9:aa: 34:6d:cf:33:a9:65:b9:20:3f:91:32:eb:f8:b4:b4:cf: 1e:47:10:b6:e1:31:ce:30:91:55:d1:62:09:25:19:5e: c9:e3:e8:b7:ca:eb:ae:53:d3:11:e9:19:f7:cc:78:e2: 99:e0:1a:ea:42:80:dd:6e:6b:8e:48:8d:7d:3e:57:a2: 59:24:99:63:6e:06:f5:48:3d:43:d7:a9:5f:15:e1:78: 42:32:3c:a7:da:13:13:e4:f6:42:f2:8d:b4:2b:2d:df: 0f:c4:e3:72:ad:34:d9:2b:0f:24:a0:43:bd:5b:03:fb: 64:65:e5:60:27:c1:47:9e:51:4e:c3:3b:57:04:aa:86: 71:b1:f7:70:0f:17:a6:cf:c9:0c:20:62:46:1f:b9:af: 6e:43:56:3e:32:9e:fd:b7:5e:d4:08:ce:99:1f:f3:d7: 56:df:02:10:10:85:8e:ed:fb:32:55:cc:3a:f3:32:79: a7:ed:75:1a:34:16:a3:8a:c5:75:0e:95:77:f8:3b:59: c2:62:4d:f5:57:5e:7f:ab:c1:92:97:99:e6:72:c9:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:42:2b:c0:2c:45:2f:39:5c:f8:34:b1:32:b1:1e:45: 12:0d:2e:d3:21:b4:02:80:86:d8:3b:3c:61:c6:e6:83: 1d:98:52:c7:85:ea:5d:7e:0a:00:85:dc:fc:a7:19:f1: 31:2c:6b:13:1f:27:07:f5:8d:a6:9f:a3:58:47:e9:71: ff:73:9e:cd:3b:49:7e:b0:a8:77:63:25:d9:e8:f9:83: d9:ae:a0:56:1f:18:32:de:a7:ab:3e:50:54:3a:a6:1f: 6d:0f:42:df:39:d4:f5:f6:23:4f:d7:b9:78:5e:c6:03: e6:a8:c9:0b:5d:ea:8c:36:30:b7:58:16:7b:98:ef:f0: 89:85:42:c5:6a:12:56:1b:8a:7c:60:8c:6b:2e:86:e0: 59:b7:7d:3a:bd:ec:28:50:65:0e:21:c8:8d:2c:b9:cc: d5:39:8d:82:d4:85:86:aa:5b:be:94:e5:0b:18:84:bd: 0b:86:78:bd:64:3f:ed:10:68:a5:bc:44:96:eb:43:9c: 27:0d:59:b6:2e:8b:57:68:5b:e5:55:28:76:5c:6b:ee: be:46:ba:70:9e:51:99:21:2e:c7:a4:10:a6:69:c3:25: 94:d4:3d:dc:cd:26:e3:7e:9d:08:bd:c8:b7:29:eb:c7: de:3a:e8:d7:78:3c:de:36:af:9b:77:92:34:8f:b3:a8 Fingerprint (SHA-256): FD:42:4D:55:37:74:F9:85:A5:82:1F:5C:46:65:FA:EB:79:CF:48:E0:4A:99:B5:A9:91:07:99:B7:42:57:FF:F7 Fingerprint (SHA1): 16:F5:E8:87:C8:66:F3:35:E7:9C:D5:95:11:9B:A2:CB:73:6E:27:66 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3431: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121249 (0x1e67d521) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:15:15 2017 Not After : Tue May 10 12:15:15 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:59:da:d4:c7:01:4a:19:28:4e:b8:e1:91:1e:7c:5c: bb:e1:1a:31:ba:c1:54:72:1e:cb:22:2e:08:19:5d:e2: a9:82:e0:01:d8:dc:8b:3e:52:1f:af:42:24:f7:67:91: e1:4f:52:06:b5:eb:d2:14:67:51:48:fb:9c:49:fe:a6: 6a:d1:f8:a5:0a:89:26:41:79:cc:39:4e:86:3c:a1:e3: 48:a9:94:0c:79:ec:44:77:3b:1e:84:2c:01:b1:90:b1: f8:53:80:76:7f:c9:0a:93:44:b4:45:3c:ef:4d:ca:64: 30:30:4b:43:33:4e:0a:69:a1:9f:7b:4d:5f:de:64:b0: ea:d4:a8:3b:ff:55:4a:00:87:92:fe:f8:69:be:9c:f0: 7a:36:59:d4:32:32:2e:1c:30:f1:90:3c:f5:63:ea:f8: 89:67:87:fd:fe:36:94:c9:d1:97:eb:b1:72:e1:a9:32: 57:57:ca:05:92:e3:93:bd:4b:74:e4:b7:f9:e8:4c:e0: 5b:d9:f4:63:9b:99:96:ae:92:4b:91:19:cc:9a:cc:80: c0:7a:c9:d2:df:fe:e6:2a:a8:b1:5f:7f:f1:37:15:78: f3:9f:7f:c1:e6:5c:57:68:b6:d6:06:c4:ad:f6:d7:5d: 4a:7c:fe:ef:03:c0:ad:93:49:77:27:ce:50:38:c0:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:c4:72:b4:db:63:ff:07:3e:4f:cf:0b:81:fb:fa:fe: a2:c6:d2:06:75:9b:73:f5:73:01:0b:d0:32:fe:ef:03: be:d4:4e:fd:9d:ab:29:d1:4e:d5:1b:28:fe:fe:0d:a7: f6:c6:5b:22:12:65:ea:71:19:44:ed:4d:70:80:9c:f2: f5:1d:5b:10:a6:49:77:aa:81:9b:13:7c:5b:91:f8:ba: 53:b3:10:8d:ef:a7:83:3f:96:2f:4a:c9:59:bc:5f:db: cc:d9:60:cf:f8:ec:5c:48:32:4d:79:1e:18:a4:d6:7d: 7d:27:67:80:ab:cb:b8:33:da:95:a5:ad:de:4b:82:b9: ac:af:40:68:14:af:8b:4e:4a:1c:84:1d:71:9b:74:61: 1a:38:0d:a7:40:2a:1d:8b:0f:d0:05:27:b4:e9:15:94: bf:9d:e7:54:45:1b:69:cd:ee:51:d7:31:7b:55:78:ae: 78:a2:3e:c8:19:37:b1:ae:d4:55:1f:3c:a4:5f:a2:93: 6e:0b:74:be:32:a6:f4:cd:09:36:65:1d:2e:69:90:7d: b8:d4:90:de:bb:4b:37:36:66:ab:c9:f9:0b:32:4e:7d: d8:1c:96:5f:c7:93:04:a0:91:ad:33:47:ea:c8:c6:7a: d0:a9:09:1a:65:e9:6b:84:c3:33:e6:37:84:ec:7c:23 Fingerprint (SHA-256): 28:55:C0:6F:3C:3F:33:DB:BF:62:FA:7E:20:FB:CC:55:F8:EA:7A:55:B9:84:AE:B8:14:89:58:B7:1A:CF:2A:44 Fingerprint (SHA1): B7:25:B6:B2:1D:C0:93:78:77:C5:A5:6E:69:B4:AD:0F:09:06:B2:88 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #3432: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121247 (0x1e67d51f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:15:13 2017 Not After : Tue May 10 12:15:13 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:03:1c:27:10:68:c6:d1:fc:5c:18:e8:ff:1b:bf:10: da:47:63:10:d7:c1:1e:bb:93:dd:2c:d8:b4:04:49:64: c3:36:b8:76:3c:e0:45:bc:43:bc:e8:b8:42:57:c9:aa: 34:6d:cf:33:a9:65:b9:20:3f:91:32:eb:f8:b4:b4:cf: 1e:47:10:b6:e1:31:ce:30:91:55:d1:62:09:25:19:5e: c9:e3:e8:b7:ca:eb:ae:53:d3:11:e9:19:f7:cc:78:e2: 99:e0:1a:ea:42:80:dd:6e:6b:8e:48:8d:7d:3e:57:a2: 59:24:99:63:6e:06:f5:48:3d:43:d7:a9:5f:15:e1:78: 42:32:3c:a7:da:13:13:e4:f6:42:f2:8d:b4:2b:2d:df: 0f:c4:e3:72:ad:34:d9:2b:0f:24:a0:43:bd:5b:03:fb: 64:65:e5:60:27:c1:47:9e:51:4e:c3:3b:57:04:aa:86: 71:b1:f7:70:0f:17:a6:cf:c9:0c:20:62:46:1f:b9:af: 6e:43:56:3e:32:9e:fd:b7:5e:d4:08:ce:99:1f:f3:d7: 56:df:02:10:10:85:8e:ed:fb:32:55:cc:3a:f3:32:79: a7:ed:75:1a:34:16:a3:8a:c5:75:0e:95:77:f8:3b:59: c2:62:4d:f5:57:5e:7f:ab:c1:92:97:99:e6:72:c9:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:42:2b:c0:2c:45:2f:39:5c:f8:34:b1:32:b1:1e:45: 12:0d:2e:d3:21:b4:02:80:86:d8:3b:3c:61:c6:e6:83: 1d:98:52:c7:85:ea:5d:7e:0a:00:85:dc:fc:a7:19:f1: 31:2c:6b:13:1f:27:07:f5:8d:a6:9f:a3:58:47:e9:71: ff:73:9e:cd:3b:49:7e:b0:a8:77:63:25:d9:e8:f9:83: d9:ae:a0:56:1f:18:32:de:a7:ab:3e:50:54:3a:a6:1f: 6d:0f:42:df:39:d4:f5:f6:23:4f:d7:b9:78:5e:c6:03: e6:a8:c9:0b:5d:ea:8c:36:30:b7:58:16:7b:98:ef:f0: 89:85:42:c5:6a:12:56:1b:8a:7c:60:8c:6b:2e:86:e0: 59:b7:7d:3a:bd:ec:28:50:65:0e:21:c8:8d:2c:b9:cc: d5:39:8d:82:d4:85:86:aa:5b:be:94:e5:0b:18:84:bd: 0b:86:78:bd:64:3f:ed:10:68:a5:bc:44:96:eb:43:9c: 27:0d:59:b6:2e:8b:57:68:5b:e5:55:28:76:5c:6b:ee: be:46:ba:70:9e:51:99:21:2e:c7:a4:10:a6:69:c3:25: 94:d4:3d:dc:cd:26:e3:7e:9d:08:bd:c8:b7:29:eb:c7: de:3a:e8:d7:78:3c:de:36:af:9b:77:92:34:8f:b3:a8 Fingerprint (SHA-256): FD:42:4D:55:37:74:F9:85:A5:82:1F:5C:46:65:FA:EB:79:CF:48:E0:4A:99:B5:A9:91:07:99:B7:42:57:FF:F7 Fingerprint (SHA1): 16:F5:E8:87:C8:66:F3:35:E7:9C:D5:95:11:9B:A2:CB:73:6E:27:66 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3433: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #3434: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121247 (0x1e67d51f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:15:13 2017 Not After : Tue May 10 12:15:13 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:03:1c:27:10:68:c6:d1:fc:5c:18:e8:ff:1b:bf:10: da:47:63:10:d7:c1:1e:bb:93:dd:2c:d8:b4:04:49:64: c3:36:b8:76:3c:e0:45:bc:43:bc:e8:b8:42:57:c9:aa: 34:6d:cf:33:a9:65:b9:20:3f:91:32:eb:f8:b4:b4:cf: 1e:47:10:b6:e1:31:ce:30:91:55:d1:62:09:25:19:5e: c9:e3:e8:b7:ca:eb:ae:53:d3:11:e9:19:f7:cc:78:e2: 99:e0:1a:ea:42:80:dd:6e:6b:8e:48:8d:7d:3e:57:a2: 59:24:99:63:6e:06:f5:48:3d:43:d7:a9:5f:15:e1:78: 42:32:3c:a7:da:13:13:e4:f6:42:f2:8d:b4:2b:2d:df: 0f:c4:e3:72:ad:34:d9:2b:0f:24:a0:43:bd:5b:03:fb: 64:65:e5:60:27:c1:47:9e:51:4e:c3:3b:57:04:aa:86: 71:b1:f7:70:0f:17:a6:cf:c9:0c:20:62:46:1f:b9:af: 6e:43:56:3e:32:9e:fd:b7:5e:d4:08:ce:99:1f:f3:d7: 56:df:02:10:10:85:8e:ed:fb:32:55:cc:3a:f3:32:79: a7:ed:75:1a:34:16:a3:8a:c5:75:0e:95:77:f8:3b:59: c2:62:4d:f5:57:5e:7f:ab:c1:92:97:99:e6:72:c9:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:42:2b:c0:2c:45:2f:39:5c:f8:34:b1:32:b1:1e:45: 12:0d:2e:d3:21:b4:02:80:86:d8:3b:3c:61:c6:e6:83: 1d:98:52:c7:85:ea:5d:7e:0a:00:85:dc:fc:a7:19:f1: 31:2c:6b:13:1f:27:07:f5:8d:a6:9f:a3:58:47:e9:71: ff:73:9e:cd:3b:49:7e:b0:a8:77:63:25:d9:e8:f9:83: d9:ae:a0:56:1f:18:32:de:a7:ab:3e:50:54:3a:a6:1f: 6d:0f:42:df:39:d4:f5:f6:23:4f:d7:b9:78:5e:c6:03: e6:a8:c9:0b:5d:ea:8c:36:30:b7:58:16:7b:98:ef:f0: 89:85:42:c5:6a:12:56:1b:8a:7c:60:8c:6b:2e:86:e0: 59:b7:7d:3a:bd:ec:28:50:65:0e:21:c8:8d:2c:b9:cc: d5:39:8d:82:d4:85:86:aa:5b:be:94:e5:0b:18:84:bd: 0b:86:78:bd:64:3f:ed:10:68:a5:bc:44:96:eb:43:9c: 27:0d:59:b6:2e:8b:57:68:5b:e5:55:28:76:5c:6b:ee: be:46:ba:70:9e:51:99:21:2e:c7:a4:10:a6:69:c3:25: 94:d4:3d:dc:cd:26:e3:7e:9d:08:bd:c8:b7:29:eb:c7: de:3a:e8:d7:78:3c:de:36:af:9b:77:92:34:8f:b3:a8 Fingerprint (SHA-256): FD:42:4D:55:37:74:F9:85:A5:82:1F:5C:46:65:FA:EB:79:CF:48:E0:4A:99:B5:A9:91:07:99:B7:42:57:FF:F7 Fingerprint (SHA1): 16:F5:E8:87:C8:66:F3:35:E7:9C:D5:95:11:9B:A2:CB:73:6E:27:66 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3435: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121249 (0x1e67d521) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:15:15 2017 Not After : Tue May 10 12:15:15 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:59:da:d4:c7:01:4a:19:28:4e:b8:e1:91:1e:7c:5c: bb:e1:1a:31:ba:c1:54:72:1e:cb:22:2e:08:19:5d:e2: a9:82:e0:01:d8:dc:8b:3e:52:1f:af:42:24:f7:67:91: e1:4f:52:06:b5:eb:d2:14:67:51:48:fb:9c:49:fe:a6: 6a:d1:f8:a5:0a:89:26:41:79:cc:39:4e:86:3c:a1:e3: 48:a9:94:0c:79:ec:44:77:3b:1e:84:2c:01:b1:90:b1: f8:53:80:76:7f:c9:0a:93:44:b4:45:3c:ef:4d:ca:64: 30:30:4b:43:33:4e:0a:69:a1:9f:7b:4d:5f:de:64:b0: ea:d4:a8:3b:ff:55:4a:00:87:92:fe:f8:69:be:9c:f0: 7a:36:59:d4:32:32:2e:1c:30:f1:90:3c:f5:63:ea:f8: 89:67:87:fd:fe:36:94:c9:d1:97:eb:b1:72:e1:a9:32: 57:57:ca:05:92:e3:93:bd:4b:74:e4:b7:f9:e8:4c:e0: 5b:d9:f4:63:9b:99:96:ae:92:4b:91:19:cc:9a:cc:80: c0:7a:c9:d2:df:fe:e6:2a:a8:b1:5f:7f:f1:37:15:78: f3:9f:7f:c1:e6:5c:57:68:b6:d6:06:c4:ad:f6:d7:5d: 4a:7c:fe:ef:03:c0:ad:93:49:77:27:ce:50:38:c0:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:c4:72:b4:db:63:ff:07:3e:4f:cf:0b:81:fb:fa:fe: a2:c6:d2:06:75:9b:73:f5:73:01:0b:d0:32:fe:ef:03: be:d4:4e:fd:9d:ab:29:d1:4e:d5:1b:28:fe:fe:0d:a7: f6:c6:5b:22:12:65:ea:71:19:44:ed:4d:70:80:9c:f2: f5:1d:5b:10:a6:49:77:aa:81:9b:13:7c:5b:91:f8:ba: 53:b3:10:8d:ef:a7:83:3f:96:2f:4a:c9:59:bc:5f:db: cc:d9:60:cf:f8:ec:5c:48:32:4d:79:1e:18:a4:d6:7d: 7d:27:67:80:ab:cb:b8:33:da:95:a5:ad:de:4b:82:b9: ac:af:40:68:14:af:8b:4e:4a:1c:84:1d:71:9b:74:61: 1a:38:0d:a7:40:2a:1d:8b:0f:d0:05:27:b4:e9:15:94: bf:9d:e7:54:45:1b:69:cd:ee:51:d7:31:7b:55:78:ae: 78:a2:3e:c8:19:37:b1:ae:d4:55:1f:3c:a4:5f:a2:93: 6e:0b:74:be:32:a6:f4:cd:09:36:65:1d:2e:69:90:7d: b8:d4:90:de:bb:4b:37:36:66:ab:c9:f9:0b:32:4e:7d: d8:1c:96:5f:c7:93:04:a0:91:ad:33:47:ea:c8:c6:7a: d0:a9:09:1a:65:e9:6b:84:c3:33:e6:37:84:ec:7c:23 Fingerprint (SHA-256): 28:55:C0:6F:3C:3F:33:DB:BF:62:FA:7E:20:FB:CC:55:F8:EA:7A:55:B9:84:AE:B8:14:89:58:B7:1A:CF:2A:44 Fingerprint (SHA1): B7:25:B6:B2:1D:C0:93:78:77:C5:A5:6E:69:B4:AD:0F:09:06:B2:88 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #3436: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #3437: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #3438: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #3439: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121247 (0x1e67d51f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:15:13 2017 Not After : Tue May 10 12:15:13 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:03:1c:27:10:68:c6:d1:fc:5c:18:e8:ff:1b:bf:10: da:47:63:10:d7:c1:1e:bb:93:dd:2c:d8:b4:04:49:64: c3:36:b8:76:3c:e0:45:bc:43:bc:e8:b8:42:57:c9:aa: 34:6d:cf:33:a9:65:b9:20:3f:91:32:eb:f8:b4:b4:cf: 1e:47:10:b6:e1:31:ce:30:91:55:d1:62:09:25:19:5e: c9:e3:e8:b7:ca:eb:ae:53:d3:11:e9:19:f7:cc:78:e2: 99:e0:1a:ea:42:80:dd:6e:6b:8e:48:8d:7d:3e:57:a2: 59:24:99:63:6e:06:f5:48:3d:43:d7:a9:5f:15:e1:78: 42:32:3c:a7:da:13:13:e4:f6:42:f2:8d:b4:2b:2d:df: 0f:c4:e3:72:ad:34:d9:2b:0f:24:a0:43:bd:5b:03:fb: 64:65:e5:60:27:c1:47:9e:51:4e:c3:3b:57:04:aa:86: 71:b1:f7:70:0f:17:a6:cf:c9:0c:20:62:46:1f:b9:af: 6e:43:56:3e:32:9e:fd:b7:5e:d4:08:ce:99:1f:f3:d7: 56:df:02:10:10:85:8e:ed:fb:32:55:cc:3a:f3:32:79: a7:ed:75:1a:34:16:a3:8a:c5:75:0e:95:77:f8:3b:59: c2:62:4d:f5:57:5e:7f:ab:c1:92:97:99:e6:72:c9:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:42:2b:c0:2c:45:2f:39:5c:f8:34:b1:32:b1:1e:45: 12:0d:2e:d3:21:b4:02:80:86:d8:3b:3c:61:c6:e6:83: 1d:98:52:c7:85:ea:5d:7e:0a:00:85:dc:fc:a7:19:f1: 31:2c:6b:13:1f:27:07:f5:8d:a6:9f:a3:58:47:e9:71: ff:73:9e:cd:3b:49:7e:b0:a8:77:63:25:d9:e8:f9:83: d9:ae:a0:56:1f:18:32:de:a7:ab:3e:50:54:3a:a6:1f: 6d:0f:42:df:39:d4:f5:f6:23:4f:d7:b9:78:5e:c6:03: e6:a8:c9:0b:5d:ea:8c:36:30:b7:58:16:7b:98:ef:f0: 89:85:42:c5:6a:12:56:1b:8a:7c:60:8c:6b:2e:86:e0: 59:b7:7d:3a:bd:ec:28:50:65:0e:21:c8:8d:2c:b9:cc: d5:39:8d:82:d4:85:86:aa:5b:be:94:e5:0b:18:84:bd: 0b:86:78:bd:64:3f:ed:10:68:a5:bc:44:96:eb:43:9c: 27:0d:59:b6:2e:8b:57:68:5b:e5:55:28:76:5c:6b:ee: be:46:ba:70:9e:51:99:21:2e:c7:a4:10:a6:69:c3:25: 94:d4:3d:dc:cd:26:e3:7e:9d:08:bd:c8:b7:29:eb:c7: de:3a:e8:d7:78:3c:de:36:af:9b:77:92:34:8f:b3:a8 Fingerprint (SHA-256): FD:42:4D:55:37:74:F9:85:A5:82:1F:5C:46:65:FA:EB:79:CF:48:E0:4A:99:B5:A9:91:07:99:B7:42:57:FF:F7 Fingerprint (SHA1): 16:F5:E8:87:C8:66:F3:35:E7:9C:D5:95:11:9B:A2:CB:73:6E:27:66 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3440: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121251 (0x1e67d523) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed May 10 12:15:17 2017 Not After : Tue May 10 12:15:17 2067 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:21:39:63:47:39:ff:6f:6a:ba:52:ec:bb:09:a0:bb: 66:7c:7b:36:51:7c:70:3c:dd:18:af:8a:a6:9d:4c:53: 11:bc:dc:b5:32:7e:bf:7c:eb:6e:09:24:15:2e:9a:2e: cd:40:eb:d1:ab:35:df:b1:62:c7:0e:18:bb:79:29:69: 3e:3f:ee:5a:19:db:ec:fc:ee:6c:50:05:5d:da:a2:03: 7b:1b:14:37:98:c9:d5:29:6d:a4:81:af:d7:3e:c3:49: db:ac:78:21:ae:a0:cc:5e:57:c2:69:03:7d:d7:a9:d7: 66:74:94:d2:4f:87:ae:64:72:98:83:8a:62:62:48:f6: 3d:17:15:e2:6a:7f:9f:5b:cd:77:ae:7f:07:c1:5c:85: a3:dd:f4:f3:ea:9f:7e:74:c6:a7:47:8a:96:01:7a:7a: e5:fd:be:cd:51:57:03:06:86:f8:d0:11:e5:49:9c:15: 1d:e3:60:30:22:ea:7a:94:36:6e:6b:b6:26:2d:31:b6: 3b:c0:c4:72:a3:8d:f3:d3:2a:f8:c9:f4:8a:50:33:48: fc:5d:4c:7d:c2:f8:7b:cd:6a:6e:61:bf:25:ef:bc:3e: 5e:fd:84:1d:87:bf:f4:d7:c2:77:db:05:76:f6:b4:06: e8:45:e1:21:72:7d:7d:f1:d2:55:38:57:b9:7f:54:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:f5:fe:95:a8:84:b6:06:02:1c:34:95:07:0d:47:fc: 22:a6:b6:66:44:93:5e:83:40:1f:29:e9:58:c4:b5:dd: d5:5e:5d:4d:f6:77:38:61:5f:fb:bb:fd:2c:78:e8:f2: 62:8d:24:91:2f:4d:4c:32:0e:ca:4e:f9:14:6a:3e:df: 98:e3:d9:c4:2b:e1:86:d0:63:ff:68:96:ea:8d:58:27: 76:d3:a2:89:83:87:c3:cd:d5:0e:ea:73:88:26:01:ee: 93:1a:7b:87:d6:0d:9e:8b:9d:c4:30:de:a2:27:af:91: ee:61:3a:15:4b:a4:0a:62:80:9e:8c:fa:cd:13:f8:4b: 58:18:79:ab:e6:f2:b3:11:90:98:7b:75:89:1d:86:80: 72:54:b4:cb:14:06:1f:28:75:df:4f:ab:df:43:70:41: ff:75:fa:3d:05:e9:cd:45:66:09:bb:64:d8:a4:84:78: fe:57:d0:5f:1d:89:f6:f6:41:98:0c:f2:df:73:94:46: 3e:67:83:5b:3d:d0:d8:f9:42:e6:23:80:4f:75:e2:d1: c2:21:1a:db:b1:16:96:a0:2c:ac:da:14:0e:1e:ea:9f: 5b:00:75:5d:86:94:59:1f:32:a7:16:38:3c:dc:23:53: e1:b1:f7:01:58:15:4b:5a:2a:a9:b5:b5:a2:a1:2e:1e Fingerprint (SHA-256): 38:29:79:FC:8E:3A:AF:DD:01:55:B3:BF:CB:F3:AE:4D:87:2B:05:FF:C9:FC:6D:B3:EA:5D:3C:AF:DC:7E:3A:E2 Fingerprint (SHA1): 66:C3:11:21:81:E0:FF:8C:C6:4E:17:EA:63:D9:04:09:1B:0A:35:0E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #3441: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121247 (0x1e67d51f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:15:13 2017 Not After : Tue May 10 12:15:13 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:03:1c:27:10:68:c6:d1:fc:5c:18:e8:ff:1b:bf:10: da:47:63:10:d7:c1:1e:bb:93:dd:2c:d8:b4:04:49:64: c3:36:b8:76:3c:e0:45:bc:43:bc:e8:b8:42:57:c9:aa: 34:6d:cf:33:a9:65:b9:20:3f:91:32:eb:f8:b4:b4:cf: 1e:47:10:b6:e1:31:ce:30:91:55:d1:62:09:25:19:5e: c9:e3:e8:b7:ca:eb:ae:53:d3:11:e9:19:f7:cc:78:e2: 99:e0:1a:ea:42:80:dd:6e:6b:8e:48:8d:7d:3e:57:a2: 59:24:99:63:6e:06:f5:48:3d:43:d7:a9:5f:15:e1:78: 42:32:3c:a7:da:13:13:e4:f6:42:f2:8d:b4:2b:2d:df: 0f:c4:e3:72:ad:34:d9:2b:0f:24:a0:43:bd:5b:03:fb: 64:65:e5:60:27:c1:47:9e:51:4e:c3:3b:57:04:aa:86: 71:b1:f7:70:0f:17:a6:cf:c9:0c:20:62:46:1f:b9:af: 6e:43:56:3e:32:9e:fd:b7:5e:d4:08:ce:99:1f:f3:d7: 56:df:02:10:10:85:8e:ed:fb:32:55:cc:3a:f3:32:79: a7:ed:75:1a:34:16:a3:8a:c5:75:0e:95:77:f8:3b:59: c2:62:4d:f5:57:5e:7f:ab:c1:92:97:99:e6:72:c9:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:42:2b:c0:2c:45:2f:39:5c:f8:34:b1:32:b1:1e:45: 12:0d:2e:d3:21:b4:02:80:86:d8:3b:3c:61:c6:e6:83: 1d:98:52:c7:85:ea:5d:7e:0a:00:85:dc:fc:a7:19:f1: 31:2c:6b:13:1f:27:07:f5:8d:a6:9f:a3:58:47:e9:71: ff:73:9e:cd:3b:49:7e:b0:a8:77:63:25:d9:e8:f9:83: d9:ae:a0:56:1f:18:32:de:a7:ab:3e:50:54:3a:a6:1f: 6d:0f:42:df:39:d4:f5:f6:23:4f:d7:b9:78:5e:c6:03: e6:a8:c9:0b:5d:ea:8c:36:30:b7:58:16:7b:98:ef:f0: 89:85:42:c5:6a:12:56:1b:8a:7c:60:8c:6b:2e:86:e0: 59:b7:7d:3a:bd:ec:28:50:65:0e:21:c8:8d:2c:b9:cc: d5:39:8d:82:d4:85:86:aa:5b:be:94:e5:0b:18:84:bd: 0b:86:78:bd:64:3f:ed:10:68:a5:bc:44:96:eb:43:9c: 27:0d:59:b6:2e:8b:57:68:5b:e5:55:28:76:5c:6b:ee: be:46:ba:70:9e:51:99:21:2e:c7:a4:10:a6:69:c3:25: 94:d4:3d:dc:cd:26:e3:7e:9d:08:bd:c8:b7:29:eb:c7: de:3a:e8:d7:78:3c:de:36:af:9b:77:92:34:8f:b3:a8 Fingerprint (SHA-256): FD:42:4D:55:37:74:F9:85:A5:82:1F:5C:46:65:FA:EB:79:CF:48:E0:4A:99:B5:A9:91:07:99:B7:42:57:FF:F7 Fingerprint (SHA1): 16:F5:E8:87:C8:66:F3:35:E7:9C:D5:95:11:9B:A2:CB:73:6E:27:66 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3442: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #3443: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #3444: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #3445: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #3446: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #3447: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121252 (0x1e67d524) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed May 10 12:15:18 2017 Not After : Tue May 10 12:15:18 2022 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:50:12:71:8e:4d:44:a3:6a:f6:d7:e0:5b:58:e2:61: 4a:16:42:66:c6:d2:a0:23:ee:d3:d8:77:f5:8a:91:33: 4d:44:75:7f:d7:59:2c:6e:55:5c:b5:7a:72:89:aa:d4: 5b:0c:99:06:41:6d:a0:d4:3d:48:f9:a3:9f:b2:2b:14: 37:80:2d:50:01:2d:de:62:ef:1b:ea:98:26:f3:f0:ab: 1b:a4:4d:26:83:a2:be:7e:4c:65:db:5a:8a:04:97:f2: 8a:82:7e:9a:65:1e:03:06:b7:62:68:ce:62:a1:34:61: 9a:41:f1:ca:1b:ce:26:66:82:1b:1a:2a:60:d6:fd:48: 02:20:41:33:6c:99:46:8b:44:66:5f:f9:e9:95:c8:ef: a3:43:18:7f:ea:71:dd:be:fe:6a:50:ad:8b:12:bd:a2: c1:05:85:ae:e1:05:8a:b2:e9:7c:de:a3:7d:50:f0:b2: 1d:74:6c:52:91:e6:7b:26:e6:a6:15:17:39:94:f1:c1: 3b:70:7b:41:7e:47:28:e9:cd:df:3b:ac:8a:33:fe:2f: 7d:81:1a:6e:bb:55:a1:04:86:34:63:57:b2:df:92:13: fa:c6:af:d4:44:39:5d:d4:7d:8e:69:e1:14:f1:60:40: bd:9c:3a:16:10:75:f1:c1:d8:29:b8:46:ec:a9:03:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 80:03:f3:68:02:9c:24:e0:df:69:c1:09:0c:96:fb:27: c6:ec:5d:fc:cc:99:e0:43:7d:eb:9a:53:a9:e7:a2:59: 50:c6:d3:0a:ae:87:f3:81:68:f7:88:a4:ce:e5:ba:a0: e3:bb:e3:a9:62:bd:c6:b4:09:f9:ae:55:a5:d7:5d:05: 7f:0b:20:72:ff:ea:35:18:84:a1:70:d7:2e:49:c1:e6: 24:88:ee:13:83:ed:f9:f6:54:92:7c:a1:cc:49:96:5c: e9:cd:24:a6:34:0d:8b:ff:65:b5:b7:a3:03:83:64:c5: d5:ce:c9:d9:e3:a3:06:68:9c:41:28:21:02:d8:80:63: 7b:17:20:bf:af:ae:f4:20:34:f7:71:12:e2:c9:19:44: 1b:f7:55:ef:9f:36:b1:bb:2f:85:cd:e7:b4:7b:59:5c: 33:ca:aa:3c:ce:b8:ad:3b:98:be:96:5f:99:37:78:f9: 9d:de:90:55:22:d7:d6:05:da:2f:1a:26:34:0c:43:46: 43:3a:75:04:fb:13:c5:6f:7c:ab:0d:14:30:ae:cf:76: bb:a6:3e:42:f7:17:1c:8a:d5:58:0e:c5:62:03:ea:37: 4c:ed:7a:cf:db:41:2a:3e:38:77:11:6c:07:5f:92:9a: ec:f4:60:15:64:bd:a1:99:5a:66:ce:9c:19:69:10:32 Fingerprint (SHA-256): EF:1F:00:B5:E4:BC:9B:04:4F:96:97:17:C3:31:EE:4D:15:14:A0:62:FD:98:2D:17:87:74:6A:E6:11:C4:20:E1 Fingerprint (SHA1): 58:FB:D7:9E:6E:ED:A5:3D:7E:1A:4B:1B:52:C1:E5:80:7F:DD:BA:A4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #3448: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #3449: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #3450: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #3451: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #3452: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #3453: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3454: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #3455: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #3456: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3457: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #3458: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #3459: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #3460: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #3461: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3462: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #3463: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3464: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #3465: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3466: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #3467: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3468: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #3469: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3470: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #3471: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 9833 at Wed May 10 12:15:26 UTC 2017 kill -USR1 9833 httpserv: normal termination httpserv -b -p 9218 2>/dev/null; httpserv with PID 9833 killed at Wed May 10 12:15:26 UTC 2017 httpserv starting at Wed May 10 12:15:26 UTC 2017 httpserv -D -p 9218 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/aiahttp/http_pid.1556 & trying to connect to httpserv at Wed May 10 12:15:26 UTC 2017 tstclnt -p 9218 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9218 (address=::1) tstclnt: exiting with return code 0 kill -0 25227 >/dev/null 2>/dev/null httpserv with PID 25227 found at Wed May 10 12:15:26 UTC 2017 httpserv with PID 25227 started at Wed May 10 12:15:26 UTC 2017 chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3472: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121254 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3473: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3474: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3475: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121255 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3476: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3477: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3478: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3479: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 510121256 -7 Bridge@Army < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3480: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3481: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 510121257 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3482: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3483: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #3484: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3485: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3486: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 510121258 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3487: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3488: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3489: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #3490: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #3491: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121255 (0x1e67d527) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:15:29 2017 Not After : Tue May 10 12:15:29 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:44:d6:a1:b7:12:98:f9:28:ea:4a:2b:53:0b:ca:12: 10:75:1d:b9:80:2b:4a:07:94:3c:4d:4c:96:08:08:69: ec:0c:8d:44:ca:bd:75:5b:a0:6f:35:8c:37:b6:65:54: 73:0a:b1:62:dd:99:cc:81:15:df:47:9e:4b:d8:78:4c: 1f:84:36:e2:9d:d8:1e:71:61:a7:cc:58:45:7b:be:b8: 39:d5:86:82:d5:ac:2f:b9:4e:6f:a9:d3:15:a2:17:d3: b7:0c:87:15:23:d1:3c:b5:21:c7:a9:4e:5e:30:1d:77: 7a:b2:46:cc:24:e3:cf:07:2d:34:be:d2:55:06:4a:aa: b9:e5:58:1f:c2:95:e8:18:8e:cb:6a:58:04:e6:4f:f2: 67:5b:8b:cd:bc:3a:e8:12:8a:ff:d1:bc:5b:2c:1e:a1: f2:7a:de:bf:67:c5:86:2c:d0:c2:89:cd:47:9e:6c:e4: 66:ab:05:e3:9b:a5:17:45:50:24:ad:37:ab:0d:a4:f8: 4c:65:d4:35:8a:36:c4:42:5d:b8:b1:12:b5:ac:2d:b6: 38:14:46:23:bb:1c:fa:29:87:67:9b:ee:45:74:eb:db: c2:dd:fa:70:e9:84:c7:43:60:df:4b:0e:a6:bb:51:2f: 15:52:c3:9d:3d:8a:39:3a:b4:fd:c4:b1:70:95:10:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c9:49:2a:f4:57:42:f0:16:0d:10:73:56:b5:a7:93:c9: e9:8f:44:93:54:79:f5:a6:c9:f0:74:03:f5:0a:7f:38: a4:c9:ef:79:25:65:64:44:c3:71:dd:b5:ce:9d:88:3f: 12:10:6a:92:32:f5:70:19:6a:48:8f:28:14:6b:a0:42: ee:80:7c:d4:56:6b:6a:b9:93:8f:54:82:f0:19:26:5c: 26:91:9c:9e:b1:e4:14:a1:61:df:10:dd:20:7b:56:38: 1f:7a:b1:c0:37:a9:d3:a3:1e:30:b5:a9:52:eb:57:a9: 19:7f:4b:16:39:78:e6:6d:ce:cd:7c:36:85:38:b8:e1: 8a:98:06:5d:15:30:d1:a8:4c:92:e1:d6:72:29:06:58: a7:a8:24:c3:a2:61:94:36:65:3b:7c:50:87:75:06:de: 84:e9:25:c8:30:a7:7b:8a:6d:c5:7a:ff:5c:a8:40:fc: 02:eb:bf:4c:f0:6b:42:ac:30:a4:08:e5:92:bf:33:27: a0:49:74:02:3c:33:ff:f9:0e:6f:a0:a8:43:fb:4d:20: 8d:18:f4:8b:09:9a:76:3d:73:ab:a0:4e:0e:21:43:be: a8:dd:a5:17:8c:ef:a1:0c:bb:c6:b3:aa:9e:a7:4b:c6: 83:a4:4e:b7:41:bf:ea:d7:e8:4c:5c:fd:03:ef:27:7e Fingerprint (SHA-256): 12:77:2A:DD:8E:61:F7:A8:23:AD:C4:2C:FB:03:47:BD:37:03:C1:12:8F:10:21:7F:FB:24:6E:EF:09:3C:11:02 Fingerprint (SHA1): 53:30:86:C7:67:1B:C3:5D:A5:79:8E:8D:CE:77:67:9D:64:84:11:84 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3492: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121254 (0x1e67d526) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 12:15:29 2017 Not After : Tue May 10 12:15:29 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:4a:09:bd:11:c4:39:5c:37:10:4f:ae:6a:a4:ce:b2: 39:15:35:12:da:54:79:fa:a5:50:cf:78:e7:fd:58:9d: 7b:da:70:f4:87:64:c8:d2:1c:22:59:12:50:6b:e2:e7: d1:9d:3f:0c:bf:69:ad:ce:43:42:64:8b:01:1f:1f:9e: 29:03:29:23:d5:10:e3:b4:5c:08:93:2e:ba:2d:98:fd: 5d:20:b9:b4:e9:d9:e0:f6:4f:22:18:15:2c:0b:f9:c6: e8:d8:d0:7b:13:7a:58:45:c9:3d:5e:9c:dd:4d:96:b9: 75:89:09:af:99:37:df:ba:70:05:e7:4d:fb:6f:fa:49: 92:f1:3a:93:3a:2e:61:54:07:21:c2:f7:86:fa:b9:39: f3:61:ea:83:b7:78:dc:76:d7:7f:8d:95:cf:98:2d:ed: bd:44:7d:05:8a:ad:ba:2d:43:32:2c:b7:24:1f:bf:17: 76:0e:3d:10:41:65:52:19:6c:72:e7:dc:89:3e:5d:25: d3:48:77:0b:e5:34:5f:ab:ff:52:cf:7a:de:92:c7:5b: 3b:72:e8:b5:0c:dc:b1:db:44:4b:09:ae:29:0a:be:b6: f7:e5:88:39:0b:e1:4a:17:c4:9a:e1:23:f0:d4:db:5c: 61:90:38:32:58:f1:40:ba:8e:8b:f1:7d:ef:6d:34:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:f1:27:ad:4b:3a:31:57:6d:58:7a:b8:3d:42:cb:bf: ac:9f:0e:64:16:1b:8c:76:44:58:a8:56:f3:19:dd:3a: 7c:90:bd:d3:6f:07:80:0c:d3:9b:ec:73:b4:bd:f1:74: 7b:66:63:47:c8:10:28:03:d4:f3:16:2f:bc:d3:ea:bf: b2:aa:77:24:4e:96:07:d5:1e:b7:21:7f:28:c8:96:a3: c7:74:ba:44:d5:3b:65:72:a9:77:4c:92:e5:2e:c4:c7: 76:a2:bf:92:3d:1c:f4:fc:59:66:27:f9:6b:f0:55:ab: 95:ca:cd:3a:8a:2a:4c:5f:cc:12:66:98:8c:cb:d6:0d: 2b:fc:37:d6:1e:75:bb:5f:38:95:2a:b0:03:d6:80:00: c7:14:7b:2c:91:ad:f5:17:9a:61:7e:2e:25:90:2e:51: e8:35:33:f0:db:18:81:f3:39:3f:a9:3a:54:1c:20:73: b6:0f:e0:d5:f8:9c:af:7c:02:76:5e:01:00:2d:de:8e: d7:0e:57:7a:53:35:5f:b4:5f:7d:ea:20:26:ff:87:a0: 0d:ee:1b:71:f8:59:a0:f0:29:ac:07:e6:34:48:c2:76: 64:3d:b7:cd:e0:f3:51:e3:36:ff:2c:67:d2:e0:4f:7d: 75:92:b1:d8:a5:b8:da:50:09:5d:b4:8e:fe:18:9f:ef Fingerprint (SHA-256): A2:87:CD:87:77:20:21:A0:5E:C9:B2:00:08:BE:B5:05:47:C2:A0:30:E7:3D:E8:F4:E3:99:C6:ED:1B:D1:B5:44 Fingerprint (SHA1): 1C:FE:59:2D:FF:10:48:3E:88:1A:4E:32:D4:D8:BF:EB:A4:9C:A3:A2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3493: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #3494: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #3495: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #3496: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121254 (0x1e67d526) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 12:15:29 2017 Not After : Tue May 10 12:15:29 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:4a:09:bd:11:c4:39:5c:37:10:4f:ae:6a:a4:ce:b2: 39:15:35:12:da:54:79:fa:a5:50:cf:78:e7:fd:58:9d: 7b:da:70:f4:87:64:c8:d2:1c:22:59:12:50:6b:e2:e7: d1:9d:3f:0c:bf:69:ad:ce:43:42:64:8b:01:1f:1f:9e: 29:03:29:23:d5:10:e3:b4:5c:08:93:2e:ba:2d:98:fd: 5d:20:b9:b4:e9:d9:e0:f6:4f:22:18:15:2c:0b:f9:c6: e8:d8:d0:7b:13:7a:58:45:c9:3d:5e:9c:dd:4d:96:b9: 75:89:09:af:99:37:df:ba:70:05:e7:4d:fb:6f:fa:49: 92:f1:3a:93:3a:2e:61:54:07:21:c2:f7:86:fa:b9:39: f3:61:ea:83:b7:78:dc:76:d7:7f:8d:95:cf:98:2d:ed: bd:44:7d:05:8a:ad:ba:2d:43:32:2c:b7:24:1f:bf:17: 76:0e:3d:10:41:65:52:19:6c:72:e7:dc:89:3e:5d:25: d3:48:77:0b:e5:34:5f:ab:ff:52:cf:7a:de:92:c7:5b: 3b:72:e8:b5:0c:dc:b1:db:44:4b:09:ae:29:0a:be:b6: f7:e5:88:39:0b:e1:4a:17:c4:9a:e1:23:f0:d4:db:5c: 61:90:38:32:58:f1:40:ba:8e:8b:f1:7d:ef:6d:34:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:f1:27:ad:4b:3a:31:57:6d:58:7a:b8:3d:42:cb:bf: ac:9f:0e:64:16:1b:8c:76:44:58:a8:56:f3:19:dd:3a: 7c:90:bd:d3:6f:07:80:0c:d3:9b:ec:73:b4:bd:f1:74: 7b:66:63:47:c8:10:28:03:d4:f3:16:2f:bc:d3:ea:bf: b2:aa:77:24:4e:96:07:d5:1e:b7:21:7f:28:c8:96:a3: c7:74:ba:44:d5:3b:65:72:a9:77:4c:92:e5:2e:c4:c7: 76:a2:bf:92:3d:1c:f4:fc:59:66:27:f9:6b:f0:55:ab: 95:ca:cd:3a:8a:2a:4c:5f:cc:12:66:98:8c:cb:d6:0d: 2b:fc:37:d6:1e:75:bb:5f:38:95:2a:b0:03:d6:80:00: c7:14:7b:2c:91:ad:f5:17:9a:61:7e:2e:25:90:2e:51: e8:35:33:f0:db:18:81:f3:39:3f:a9:3a:54:1c:20:73: b6:0f:e0:d5:f8:9c:af:7c:02:76:5e:01:00:2d:de:8e: d7:0e:57:7a:53:35:5f:b4:5f:7d:ea:20:26:ff:87:a0: 0d:ee:1b:71:f8:59:a0:f0:29:ac:07:e6:34:48:c2:76: 64:3d:b7:cd:e0:f3:51:e3:36:ff:2c:67:d2:e0:4f:7d: 75:92:b1:d8:a5:b8:da:50:09:5d:b4:8e:fe:18:9f:ef Fingerprint (SHA-256): A2:87:CD:87:77:20:21:A0:5E:C9:B2:00:08:BE:B5:05:47:C2:A0:30:E7:3D:E8:F4:E3:99:C6:ED:1B:D1:B5:44 Fingerprint (SHA1): 1C:FE:59:2D:FF:10:48:3E:88:1A:4E:32:D4:D8:BF:EB:A4:9C:A3:A2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3497: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121255 (0x1e67d527) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:15:29 2017 Not After : Tue May 10 12:15:29 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:44:d6:a1:b7:12:98:f9:28:ea:4a:2b:53:0b:ca:12: 10:75:1d:b9:80:2b:4a:07:94:3c:4d:4c:96:08:08:69: ec:0c:8d:44:ca:bd:75:5b:a0:6f:35:8c:37:b6:65:54: 73:0a:b1:62:dd:99:cc:81:15:df:47:9e:4b:d8:78:4c: 1f:84:36:e2:9d:d8:1e:71:61:a7:cc:58:45:7b:be:b8: 39:d5:86:82:d5:ac:2f:b9:4e:6f:a9:d3:15:a2:17:d3: b7:0c:87:15:23:d1:3c:b5:21:c7:a9:4e:5e:30:1d:77: 7a:b2:46:cc:24:e3:cf:07:2d:34:be:d2:55:06:4a:aa: b9:e5:58:1f:c2:95:e8:18:8e:cb:6a:58:04:e6:4f:f2: 67:5b:8b:cd:bc:3a:e8:12:8a:ff:d1:bc:5b:2c:1e:a1: f2:7a:de:bf:67:c5:86:2c:d0:c2:89:cd:47:9e:6c:e4: 66:ab:05:e3:9b:a5:17:45:50:24:ad:37:ab:0d:a4:f8: 4c:65:d4:35:8a:36:c4:42:5d:b8:b1:12:b5:ac:2d:b6: 38:14:46:23:bb:1c:fa:29:87:67:9b:ee:45:74:eb:db: c2:dd:fa:70:e9:84:c7:43:60:df:4b:0e:a6:bb:51:2f: 15:52:c3:9d:3d:8a:39:3a:b4:fd:c4:b1:70:95:10:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c9:49:2a:f4:57:42:f0:16:0d:10:73:56:b5:a7:93:c9: e9:8f:44:93:54:79:f5:a6:c9:f0:74:03:f5:0a:7f:38: a4:c9:ef:79:25:65:64:44:c3:71:dd:b5:ce:9d:88:3f: 12:10:6a:92:32:f5:70:19:6a:48:8f:28:14:6b:a0:42: ee:80:7c:d4:56:6b:6a:b9:93:8f:54:82:f0:19:26:5c: 26:91:9c:9e:b1:e4:14:a1:61:df:10:dd:20:7b:56:38: 1f:7a:b1:c0:37:a9:d3:a3:1e:30:b5:a9:52:eb:57:a9: 19:7f:4b:16:39:78:e6:6d:ce:cd:7c:36:85:38:b8:e1: 8a:98:06:5d:15:30:d1:a8:4c:92:e1:d6:72:29:06:58: a7:a8:24:c3:a2:61:94:36:65:3b:7c:50:87:75:06:de: 84:e9:25:c8:30:a7:7b:8a:6d:c5:7a:ff:5c:a8:40:fc: 02:eb:bf:4c:f0:6b:42:ac:30:a4:08:e5:92:bf:33:27: a0:49:74:02:3c:33:ff:f9:0e:6f:a0:a8:43:fb:4d:20: 8d:18:f4:8b:09:9a:76:3d:73:ab:a0:4e:0e:21:43:be: a8:dd:a5:17:8c:ef:a1:0c:bb:c6:b3:aa:9e:a7:4b:c6: 83:a4:4e:b7:41:bf:ea:d7:e8:4c:5c:fd:03:ef:27:7e Fingerprint (SHA-256): 12:77:2A:DD:8E:61:F7:A8:23:AD:C4:2C:FB:03:47:BD:37:03:C1:12:8F:10:21:7F:FB:24:6E:EF:09:3C:11:02 Fingerprint (SHA1): 53:30:86:C7:67:1B:C3:5D:A5:79:8E:8D:CE:77:67:9D:64:84:11:84 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3498: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #3499: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #3500: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #3501: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #3502: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #3503: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121255 (0x1e67d527) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:15:29 2017 Not After : Tue May 10 12:15:29 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:44:d6:a1:b7:12:98:f9:28:ea:4a:2b:53:0b:ca:12: 10:75:1d:b9:80:2b:4a:07:94:3c:4d:4c:96:08:08:69: ec:0c:8d:44:ca:bd:75:5b:a0:6f:35:8c:37:b6:65:54: 73:0a:b1:62:dd:99:cc:81:15:df:47:9e:4b:d8:78:4c: 1f:84:36:e2:9d:d8:1e:71:61:a7:cc:58:45:7b:be:b8: 39:d5:86:82:d5:ac:2f:b9:4e:6f:a9:d3:15:a2:17:d3: b7:0c:87:15:23:d1:3c:b5:21:c7:a9:4e:5e:30:1d:77: 7a:b2:46:cc:24:e3:cf:07:2d:34:be:d2:55:06:4a:aa: b9:e5:58:1f:c2:95:e8:18:8e:cb:6a:58:04:e6:4f:f2: 67:5b:8b:cd:bc:3a:e8:12:8a:ff:d1:bc:5b:2c:1e:a1: f2:7a:de:bf:67:c5:86:2c:d0:c2:89:cd:47:9e:6c:e4: 66:ab:05:e3:9b:a5:17:45:50:24:ad:37:ab:0d:a4:f8: 4c:65:d4:35:8a:36:c4:42:5d:b8:b1:12:b5:ac:2d:b6: 38:14:46:23:bb:1c:fa:29:87:67:9b:ee:45:74:eb:db: c2:dd:fa:70:e9:84:c7:43:60:df:4b:0e:a6:bb:51:2f: 15:52:c3:9d:3d:8a:39:3a:b4:fd:c4:b1:70:95:10:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c9:49:2a:f4:57:42:f0:16:0d:10:73:56:b5:a7:93:c9: e9:8f:44:93:54:79:f5:a6:c9:f0:74:03:f5:0a:7f:38: a4:c9:ef:79:25:65:64:44:c3:71:dd:b5:ce:9d:88:3f: 12:10:6a:92:32:f5:70:19:6a:48:8f:28:14:6b:a0:42: ee:80:7c:d4:56:6b:6a:b9:93:8f:54:82:f0:19:26:5c: 26:91:9c:9e:b1:e4:14:a1:61:df:10:dd:20:7b:56:38: 1f:7a:b1:c0:37:a9:d3:a3:1e:30:b5:a9:52:eb:57:a9: 19:7f:4b:16:39:78:e6:6d:ce:cd:7c:36:85:38:b8:e1: 8a:98:06:5d:15:30:d1:a8:4c:92:e1:d6:72:29:06:58: a7:a8:24:c3:a2:61:94:36:65:3b:7c:50:87:75:06:de: 84:e9:25:c8:30:a7:7b:8a:6d:c5:7a:ff:5c:a8:40:fc: 02:eb:bf:4c:f0:6b:42:ac:30:a4:08:e5:92:bf:33:27: a0:49:74:02:3c:33:ff:f9:0e:6f:a0:a8:43:fb:4d:20: 8d:18:f4:8b:09:9a:76:3d:73:ab:a0:4e:0e:21:43:be: a8:dd:a5:17:8c:ef:a1:0c:bb:c6:b3:aa:9e:a7:4b:c6: 83:a4:4e:b7:41:bf:ea:d7:e8:4c:5c:fd:03:ef:27:7e Fingerprint (SHA-256): 12:77:2A:DD:8E:61:F7:A8:23:AD:C4:2C:FB:03:47:BD:37:03:C1:12:8F:10:21:7F:FB:24:6E:EF:09:3C:11:02 Fingerprint (SHA1): 53:30:86:C7:67:1B:C3:5D:A5:79:8E:8D:CE:77:67:9D:64:84:11:84 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3504: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121255 (0x1e67d527) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:15:29 2017 Not After : Tue May 10 12:15:29 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:44:d6:a1:b7:12:98:f9:28:ea:4a:2b:53:0b:ca:12: 10:75:1d:b9:80:2b:4a:07:94:3c:4d:4c:96:08:08:69: ec:0c:8d:44:ca:bd:75:5b:a0:6f:35:8c:37:b6:65:54: 73:0a:b1:62:dd:99:cc:81:15:df:47:9e:4b:d8:78:4c: 1f:84:36:e2:9d:d8:1e:71:61:a7:cc:58:45:7b:be:b8: 39:d5:86:82:d5:ac:2f:b9:4e:6f:a9:d3:15:a2:17:d3: b7:0c:87:15:23:d1:3c:b5:21:c7:a9:4e:5e:30:1d:77: 7a:b2:46:cc:24:e3:cf:07:2d:34:be:d2:55:06:4a:aa: b9:e5:58:1f:c2:95:e8:18:8e:cb:6a:58:04:e6:4f:f2: 67:5b:8b:cd:bc:3a:e8:12:8a:ff:d1:bc:5b:2c:1e:a1: f2:7a:de:bf:67:c5:86:2c:d0:c2:89:cd:47:9e:6c:e4: 66:ab:05:e3:9b:a5:17:45:50:24:ad:37:ab:0d:a4:f8: 4c:65:d4:35:8a:36:c4:42:5d:b8:b1:12:b5:ac:2d:b6: 38:14:46:23:bb:1c:fa:29:87:67:9b:ee:45:74:eb:db: c2:dd:fa:70:e9:84:c7:43:60:df:4b:0e:a6:bb:51:2f: 15:52:c3:9d:3d:8a:39:3a:b4:fd:c4:b1:70:95:10:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c9:49:2a:f4:57:42:f0:16:0d:10:73:56:b5:a7:93:c9: e9:8f:44:93:54:79:f5:a6:c9:f0:74:03:f5:0a:7f:38: a4:c9:ef:79:25:65:64:44:c3:71:dd:b5:ce:9d:88:3f: 12:10:6a:92:32:f5:70:19:6a:48:8f:28:14:6b:a0:42: ee:80:7c:d4:56:6b:6a:b9:93:8f:54:82:f0:19:26:5c: 26:91:9c:9e:b1:e4:14:a1:61:df:10:dd:20:7b:56:38: 1f:7a:b1:c0:37:a9:d3:a3:1e:30:b5:a9:52:eb:57:a9: 19:7f:4b:16:39:78:e6:6d:ce:cd:7c:36:85:38:b8:e1: 8a:98:06:5d:15:30:d1:a8:4c:92:e1:d6:72:29:06:58: a7:a8:24:c3:a2:61:94:36:65:3b:7c:50:87:75:06:de: 84:e9:25:c8:30:a7:7b:8a:6d:c5:7a:ff:5c:a8:40:fc: 02:eb:bf:4c:f0:6b:42:ac:30:a4:08:e5:92:bf:33:27: a0:49:74:02:3c:33:ff:f9:0e:6f:a0:a8:43:fb:4d:20: 8d:18:f4:8b:09:9a:76:3d:73:ab:a0:4e:0e:21:43:be: a8:dd:a5:17:8c:ef:a1:0c:bb:c6:b3:aa:9e:a7:4b:c6: 83:a4:4e:b7:41:bf:ea:d7:e8:4c:5c:fd:03:ef:27:7e Fingerprint (SHA-256): 12:77:2A:DD:8E:61:F7:A8:23:AD:C4:2C:FB:03:47:BD:37:03:C1:12:8F:10:21:7F:FB:24:6E:EF:09:3C:11:02 Fingerprint (SHA1): 53:30:86:C7:67:1B:C3:5D:A5:79:8E:8D:CE:77:67:9D:64:84:11:84 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3505: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #3506: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #3507: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #3508: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #3509: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #3510: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121254 (0x1e67d526) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 12:15:29 2017 Not After : Tue May 10 12:15:29 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:4a:09:bd:11:c4:39:5c:37:10:4f:ae:6a:a4:ce:b2: 39:15:35:12:da:54:79:fa:a5:50:cf:78:e7:fd:58:9d: 7b:da:70:f4:87:64:c8:d2:1c:22:59:12:50:6b:e2:e7: d1:9d:3f:0c:bf:69:ad:ce:43:42:64:8b:01:1f:1f:9e: 29:03:29:23:d5:10:e3:b4:5c:08:93:2e:ba:2d:98:fd: 5d:20:b9:b4:e9:d9:e0:f6:4f:22:18:15:2c:0b:f9:c6: e8:d8:d0:7b:13:7a:58:45:c9:3d:5e:9c:dd:4d:96:b9: 75:89:09:af:99:37:df:ba:70:05:e7:4d:fb:6f:fa:49: 92:f1:3a:93:3a:2e:61:54:07:21:c2:f7:86:fa:b9:39: f3:61:ea:83:b7:78:dc:76:d7:7f:8d:95:cf:98:2d:ed: bd:44:7d:05:8a:ad:ba:2d:43:32:2c:b7:24:1f:bf:17: 76:0e:3d:10:41:65:52:19:6c:72:e7:dc:89:3e:5d:25: d3:48:77:0b:e5:34:5f:ab:ff:52:cf:7a:de:92:c7:5b: 3b:72:e8:b5:0c:dc:b1:db:44:4b:09:ae:29:0a:be:b6: f7:e5:88:39:0b:e1:4a:17:c4:9a:e1:23:f0:d4:db:5c: 61:90:38:32:58:f1:40:ba:8e:8b:f1:7d:ef:6d:34:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:f1:27:ad:4b:3a:31:57:6d:58:7a:b8:3d:42:cb:bf: ac:9f:0e:64:16:1b:8c:76:44:58:a8:56:f3:19:dd:3a: 7c:90:bd:d3:6f:07:80:0c:d3:9b:ec:73:b4:bd:f1:74: 7b:66:63:47:c8:10:28:03:d4:f3:16:2f:bc:d3:ea:bf: b2:aa:77:24:4e:96:07:d5:1e:b7:21:7f:28:c8:96:a3: c7:74:ba:44:d5:3b:65:72:a9:77:4c:92:e5:2e:c4:c7: 76:a2:bf:92:3d:1c:f4:fc:59:66:27:f9:6b:f0:55:ab: 95:ca:cd:3a:8a:2a:4c:5f:cc:12:66:98:8c:cb:d6:0d: 2b:fc:37:d6:1e:75:bb:5f:38:95:2a:b0:03:d6:80:00: c7:14:7b:2c:91:ad:f5:17:9a:61:7e:2e:25:90:2e:51: e8:35:33:f0:db:18:81:f3:39:3f:a9:3a:54:1c:20:73: b6:0f:e0:d5:f8:9c:af:7c:02:76:5e:01:00:2d:de:8e: d7:0e:57:7a:53:35:5f:b4:5f:7d:ea:20:26:ff:87:a0: 0d:ee:1b:71:f8:59:a0:f0:29:ac:07:e6:34:48:c2:76: 64:3d:b7:cd:e0:f3:51:e3:36:ff:2c:67:d2:e0:4f:7d: 75:92:b1:d8:a5:b8:da:50:09:5d:b4:8e:fe:18:9f:ef Fingerprint (SHA-256): A2:87:CD:87:77:20:21:A0:5E:C9:B2:00:08:BE:B5:05:47:C2:A0:30:E7:3D:E8:F4:E3:99:C6:ED:1B:D1:B5:44 Fingerprint (SHA1): 1C:FE:59:2D:FF:10:48:3E:88:1A:4E:32:D4:D8:BF:EB:A4:9C:A3:A2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3511: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121254 (0x1e67d526) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 12:15:29 2017 Not After : Tue May 10 12:15:29 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:4a:09:bd:11:c4:39:5c:37:10:4f:ae:6a:a4:ce:b2: 39:15:35:12:da:54:79:fa:a5:50:cf:78:e7:fd:58:9d: 7b:da:70:f4:87:64:c8:d2:1c:22:59:12:50:6b:e2:e7: d1:9d:3f:0c:bf:69:ad:ce:43:42:64:8b:01:1f:1f:9e: 29:03:29:23:d5:10:e3:b4:5c:08:93:2e:ba:2d:98:fd: 5d:20:b9:b4:e9:d9:e0:f6:4f:22:18:15:2c:0b:f9:c6: e8:d8:d0:7b:13:7a:58:45:c9:3d:5e:9c:dd:4d:96:b9: 75:89:09:af:99:37:df:ba:70:05:e7:4d:fb:6f:fa:49: 92:f1:3a:93:3a:2e:61:54:07:21:c2:f7:86:fa:b9:39: f3:61:ea:83:b7:78:dc:76:d7:7f:8d:95:cf:98:2d:ed: bd:44:7d:05:8a:ad:ba:2d:43:32:2c:b7:24:1f:bf:17: 76:0e:3d:10:41:65:52:19:6c:72:e7:dc:89:3e:5d:25: d3:48:77:0b:e5:34:5f:ab:ff:52:cf:7a:de:92:c7:5b: 3b:72:e8:b5:0c:dc:b1:db:44:4b:09:ae:29:0a:be:b6: f7:e5:88:39:0b:e1:4a:17:c4:9a:e1:23:f0:d4:db:5c: 61:90:38:32:58:f1:40:ba:8e:8b:f1:7d:ef:6d:34:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:f1:27:ad:4b:3a:31:57:6d:58:7a:b8:3d:42:cb:bf: ac:9f:0e:64:16:1b:8c:76:44:58:a8:56:f3:19:dd:3a: 7c:90:bd:d3:6f:07:80:0c:d3:9b:ec:73:b4:bd:f1:74: 7b:66:63:47:c8:10:28:03:d4:f3:16:2f:bc:d3:ea:bf: b2:aa:77:24:4e:96:07:d5:1e:b7:21:7f:28:c8:96:a3: c7:74:ba:44:d5:3b:65:72:a9:77:4c:92:e5:2e:c4:c7: 76:a2:bf:92:3d:1c:f4:fc:59:66:27:f9:6b:f0:55:ab: 95:ca:cd:3a:8a:2a:4c:5f:cc:12:66:98:8c:cb:d6:0d: 2b:fc:37:d6:1e:75:bb:5f:38:95:2a:b0:03:d6:80:00: c7:14:7b:2c:91:ad:f5:17:9a:61:7e:2e:25:90:2e:51: e8:35:33:f0:db:18:81:f3:39:3f:a9:3a:54:1c:20:73: b6:0f:e0:d5:f8:9c:af:7c:02:76:5e:01:00:2d:de:8e: d7:0e:57:7a:53:35:5f:b4:5f:7d:ea:20:26:ff:87:a0: 0d:ee:1b:71:f8:59:a0:f0:29:ac:07:e6:34:48:c2:76: 64:3d:b7:cd:e0:f3:51:e3:36:ff:2c:67:d2:e0:4f:7d: 75:92:b1:d8:a5:b8:da:50:09:5d:b4:8e:fe:18:9f:ef Fingerprint (SHA-256): A2:87:CD:87:77:20:21:A0:5E:C9:B2:00:08:BE:B5:05:47:C2:A0:30:E7:3D:E8:F4:E3:99:C6:ED:1B:D1:B5:44 Fingerprint (SHA1): 1C:FE:59:2D:FF:10:48:3E:88:1A:4E:32:D4:D8:BF:EB:A4:9C:A3:A2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3512: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #3513: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121259 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3514: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #3515: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #3516: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121260 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3517: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #3518: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #3519: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121261 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3520: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #3521: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #3522: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121262 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3523: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #3524: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #3525: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121263 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3526: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #3527: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #3528: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121264 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3529: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #3530: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #3531: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121265 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3532: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #3533: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #3534: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121266 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3535: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #3536: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #3537: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121267 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3538: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #3539: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #3540: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3541: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 510121268 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3542: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3543: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 510121269 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3544: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3545: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 510121270 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3546: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3547: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #3548: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #3549: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3550: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 510121271 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3551: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3552: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 510121272 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3553: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3554: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 510121273 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3555: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3556: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #3557: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #3558: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3559: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 510121274 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3560: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3561: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 510121275 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3562: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3563: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 510121276 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3564: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3565: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #3566: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #3567: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3568: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 510121277 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3569: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3570: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 510121278 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3571: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3572: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 510121279 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3573: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3574: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #3575: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3576: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3577: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 510121280 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3578: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3579: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3580: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3581: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510121281 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3582: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3583: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121259 (0x1e67d52b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Wed May 10 12:15:37 2017 Not After : Tue May 10 12:15:37 2067 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:4c:e9:f7:65:23:7f:f4:5b:18:6a:7d:7a:62:c6:88: 46:f2:ad:69:c6:c3:0e:c9:27:23:29:19:5b:eb:41:25: b0:e5:83:36:a6:5f:07:66:7b:cc:b9:7c:e0:73:f4:72: e0:89:2b:cd:1c:ce:93:f0:20:5b:ea:3a:59:0a:37:43: 6b:ee:3b:ff:2c:a4:3c:8e:90:91:d3:be:18:58:1c:57: b8:b3:cd:b2:71:2c:d2:2f:8b:90:39:35:35:d2:48:95: 8f:62:9a:d8:25:55:7f:97:e3:3a:1a:df:f0:88:1b:7e: 3f:2c:05:e5:9e:d0:db:ae:a4:5f:ac:90:72:54:8e:d5: cc:87:19:48:b0:d1:ec:90:64:a4:fd:45:ad:f7:b7:f8: f0:a6:a8:68:2e:5b:6a:6a:ff:42:d0:95:30:16:af:35: dc:5d:db:fc:e1:f2:0a:7c:18:c8:f5:b2:fa:3d:38:d9: 87:95:a8:98:38:d4:30:2d:ad:c5:b0:6e:e0:e2:c9:71: 05:77:c4:7b:d1:d2:08:40:6c:05:d4:65:1c:ad:3f:81: ea:42:89:56:35:9e:23:23:c9:e5:b0:de:7f:4d:a1:ba: 59:5b:6c:33:14:82:07:c1:fa:05:bf:33:a3:9c:79:83: c4:1e:bf:bf:05:a2:03:2b:7f:ae:a6:d0:1c:3d:f5:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:a4:ee:ca:32:26:75:84:07:e9:dd:00:d4:bb:1c:90: 10:37:49:9d:25:f4:55:8d:07:eb:43:e9:3d:56:4e:8b: c5:8e:9f:e7:62:06:a8:28:41:c1:95:34:b4:74:b6:52: ef:7d:64:7c:3f:89:0c:b5:89:0a:5c:f3:7c:85:a8:f8: f9:56:c0:8b:7e:f2:d3:2a:f8:77:7f:3e:24:81:b1:fd: 8a:df:0e:ae:8b:30:9a:ab:cd:02:f3:3c:fb:99:38:33: 71:e0:51:df:50:fb:29:d1:17:ec:38:6b:8a:44:2b:1b: d9:8a:ba:44:c9:ae:33:76:64:de:00:05:20:09:bf:9f: 8f:d9:1c:ac:40:33:ad:79:30:8b:3c:1f:58:90:78:10: 73:c0:6c:17:10:ab:a8:df:6b:c0:92:f0:ed:b2:32:ec: dd:30:50:a6:4c:03:39:30:f9:2b:c4:1c:9c:d3:35:3e: 9d:97:ed:87:13:87:f6:a0:4d:c9:19:a6:7d:50:30:89: a0:f7:a1:18:22:39:84:a4:35:83:a3:39:d9:78:62:22: d1:4f:20:36:84:2d:32:1d:71:de:2b:99:1b:cf:a3:ff: 83:da:e4:cb:17:6f:de:c4:63:27:33:cb:2d:57:44:1c: 25:61:bc:07:44:0d:57:34:f5:f0:6b:6a:71:38:77:03 Fingerprint (SHA-256): 23:53:99:40:5F:03:53:F4:8D:EF:F0:A2:7D:D6:CB:F5:E7:32:38:B4:50:00:24:AA:92:A8:0D:F6:15:38:B5:96 Fingerprint (SHA1): 76:C2:17:75:05:15:77:EB:00:0E:A5:97:13:93:66:43:7C:DD:2F:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #3584: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121260 (0x1e67d52c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Wed May 10 12:15:38 2017 Not After : Tue May 10 12:15:38 2067 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:c8:00:5b:82:d8:b9:14:02:86:99:cc:f8:86:40:f5: 9d:64:70:aa:2c:6e:af:29:cd:d0:3a:d1:50:5f:62:36: ad:41:93:f1:77:4d:1f:81:bb:2b:43:6f:a6:0b:e8:22: 08:9f:b2:e6:c1:15:c5:29:09:a6:44:2c:c3:c9:f9:95: 79:33:1a:18:70:b1:ca:7a:93:bf:e6:bb:fd:84:f2:6e: 39:59:bc:8b:3a:15:c1:e7:c3:16:77:9a:6d:52:6d:3e: 76:e1:fc:ad:73:a1:a2:32:90:d4:b8:5e:08:58:43:ec: a6:95:2c:bf:2a:22:77:af:ea:a4:e7:a3:b7:45:d2:69: 3b:f2:54:ee:83:cf:5e:d2:54:a2:54:b0:a3:dd:5f:7f: df:77:55:6b:c9:06:88:0d:05:19:22:ae:2f:44:bc:35: 35:73:e2:f1:6d:34:cd:34:40:d2:b2:6c:fb:20:d9:c6: 00:4d:b6:23:10:5b:cd:84:a1:8e:a6:5f:d8:0d:71:54: 61:6e:0e:4e:1f:9f:9d:40:e6:f8:ce:67:24:ba:89:54: 16:2f:66:36:71:5c:ed:3f:74:d7:74:d6:26:ed:9c:27: fc:6a:57:53:f6:05:08:49:99:5c:04:2d:79:f1:45:9a: 3e:3f:ed:73:ca:c6:19:d9:6b:fa:cc:78:f4:8d:34:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:2f:f1:e6:32:f5:c9:49:16:00:3f:e2:57:a1:60:05: 48:f3:f0:d7:16:67:a7:be:5d:7c:88:a7:35:e4:9b:9c: 5f:ae:dd:fc:d3:7a:a7:a2:f3:c9:95:46:06:e1:18:72: 8a:5a:fb:c5:a1:e6:c1:89:9d:9f:ec:a6:dc:75:a2:14: 96:6a:1e:88:ab:f7:00:df:c3:09:f6:bb:f9:26:74:8a: 89:9e:27:04:86:b3:dd:a8:43:21:7f:36:89:b3:93:bb: 14:90:bb:0f:e9:e5:b4:a8:8c:fc:66:5a:6c:8e:e8:15: a8:62:6e:6c:34:97:b7:08:8a:9e:14:8a:85:64:62:1c: d5:9a:a5:88:4f:85:93:4a:7e:58:f9:c1:a1:ee:e0:c3: 97:66:4a:dd:d4:5d:32:d4:bc:0b:54:a7:f9:3d:aa:e0: 6c:dd:c2:7a:af:05:82:e4:c5:36:9c:10:b7:63:7c:82: 80:5a:f4:c1:7a:5c:31:5e:aa:8c:55:eb:08:26:5c:fb: 83:5e:c6:53:c0:86:a6:51:f7:96:b4:d5:81:5c:90:6c: 2b:42:00:bb:23:fc:85:a5:cd:4d:87:c6:74:d4:a1:82: ec:81:a0:95:9f:37:19:32:7f:d2:70:24:d7:66:3c:74: 59:2d:ec:03:3f:0f:15:c6:ca:99:f6:3a:01:8c:17:98 Fingerprint (SHA-256): 03:0D:09:12:E1:BD:17:DF:50:4A:BB:4F:B2:2E:B5:DE:28:E4:FA:77:E9:16:4B:55:E9:94:D7:C2:1E:90:5A:88 Fingerprint (SHA1): 82:5B:7C:4C:CE:9B:9A:67:CE:32:78:72:9E:AF:CD:76:EC:0B:68:37 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #3585: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121261 (0x1e67d52d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Wed May 10 12:15:39 2017 Not After : Tue May 10 12:15:39 2067 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:2c:cb:d9:cf:56:4e:41:34:d4:fb:d9:11:72:f2:9a: ad:63:49:78:82:57:31:6f:a7:79:f6:ff:08:67:1b:67: 58:2c:93:18:d0:38:b6:c8:37:67:fd:c6:22:78:bc:aa: 2e:86:e1:4f:a9:9c:d6:66:4f:ec:80:0c:94:20:1f:c2: 7b:b6:c6:92:a2:e2:df:7b:8c:f7:ec:d5:88:c1:0d:2c: cf:3d:20:a0:b8:2a:ef:cd:5f:d5:2a:d8:c8:85:56:fe: 94:74:42:cb:87:86:b1:0d:24:c0:33:d8:0f:5b:42:b1: 6e:2b:86:26:f7:fc:29:29:96:69:aa:f7:42:a4:87:3f: a8:8c:25:00:12:e4:76:4b:01:ce:0f:7e:98:42:9f:f2: 4e:4b:3a:e0:f3:00:90:dd:7a:13:44:77:23:47:fa:ff: c8:2e:66:5e:f6:f2:71:01:f4:ac:f3:14:de:a7:b1:ef: c3:22:b8:d1:45:96:47:f7:90:c9:ea:89:be:6e:09:09: 32:aa:bf:3d:44:f6:25:f1:d8:31:b9:8c:d3:f6:2d:55: 7a:1b:6e:cf:40:d6:16:3c:17:4c:bd:6e:9d:1a:1f:32: 5c:af:0d:a8:d4:91:f1:c4:5c:83:14:52:9d:f3:da:45: 16:e9:26:55:bd:82:06:ea:d8:6b:b8:2a:a9:88:8f:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b8:f6:ec:e9:b0:cc:33:98:97:2b:26:2f:6b:83:f5:07: b6:32:9e:5b:a8:e2:22:42:88:d0:f3:71:89:ac:1b:d2: fc:f6:ea:03:d0:3d:06:8d:79:38:29:87:3b:69:77:39: ab:bb:aa:59:ab:9c:41:39:17:45:ea:94:da:37:8f:28: dd:cd:13:de:e5:07:22:c1:7d:fa:f4:32:18:c1:cc:0c: f9:61:6c:15:74:85:0e:29:b8:89:59:4f:62:8f:34:f1: fb:85:51:24:16:91:cb:69:a1:99:f2:7f:89:ed:e6:b4: 17:8f:63:15:2e:86:65:22:11:8a:2b:90:4a:c5:2d:75: 93:26:5d:f0:31:fe:a8:66:a0:18:6c:e1:44:c2:fb:40: b6:4a:a2:8a:cc:74:66:ff:dc:76:99:94:3e:c5:a3:33: 16:75:5e:4d:11:33:44:a3:38:9a:75:6a:2a:2b:dd:23: ea:45:ec:44:3d:f5:5d:c8:97:de:ea:9d:41:5e:c3:1f: b8:10:1f:bf:5d:0d:6c:0c:c5:1d:d0:b1:1a:5f:8f:e9: 4c:31:77:44:51:df:b2:65:4d:1f:09:95:05:a3:9d:4a: b2:40:27:45:bd:c7:c6:53:71:a0:39:ab:e7:0a:53:92: 97:ba:b6:a8:a3:d8:a7:e8:57:4a:49:be:b8:55:52:23 Fingerprint (SHA-256): FD:EB:AC:C4:7F:90:99:3D:78:F0:F2:91:DB:5F:36:9A:D7:56:6C:4F:21:9E:35:A2:5F:89:CF:39:61:56:C4:6E Fingerprint (SHA1): 5D:6B:FA:75:BF:6A:58:7F:8E:6D:64:D4:44:86:EB:28:8A:B5:EC:2B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #3586: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121262 (0x1e67d52e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Wed May 10 12:15:40 2017 Not After : Tue May 10 12:15:40 2067 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:51:f8:96:d1:2b:75:71:9b:2b:9e:b7:1d:de:fd:92: 9f:a4:2e:26:63:7e:48:bd:d0:ac:0e:cd:b5:ba:38:3c: 37:fd:3a:a2:88:ac:40:0b:7d:49:bd:9a:bf:39:15:5e: a0:d9:44:b4:a2:cc:ec:f3:e2:05:18:e9:84:69:4e:d7: 00:ee:e3:07:50:c1:7a:c6:3e:be:0b:b4:8f:d6:e6:15: 3f:af:66:c4:b9:f1:2e:2b:e5:e9:9e:14:99:6a:46:36: 22:1d:76:d1:b7:e6:7f:56:46:a9:73:1e:84:fc:26:7f: 58:95:08:78:3a:76:c8:1c:00:e8:4a:67:bb:79:77:d9: 4b:43:e4:2d:e0:ec:1f:0d:cf:f0:c7:f4:4e:04:79:bd: 83:da:ae:08:74:de:9f:63:32:6f:f0:45:86:29:09:85: c0:7b:3f:0d:30:b6:41:6a:63:00:7c:61:4d:b7:2c:22: 2f:ee:b0:f5:f9:38:0b:02:f1:01:82:3f:f4:e3:dc:78: 1d:61:35:80:4d:16:8e:8e:09:81:55:5d:05:26:34:b8: 2e:6d:da:71:4a:0a:de:41:15:24:5b:b3:f8:0d:0e:f2: 34:99:b0:92:1f:51:d5:21:c2:52:a3:cd:92:c1:e8:21: 7d:25:a7:19:6b:5d:c1:08:50:ce:5a:4a:84:24:96:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:c4:cd:ae:d0:1a:1a:eb:39:e6:ac:b4:3e:a7:88:d1: f8:ea:ce:5b:cc:75:02:da:aa:af:c1:cc:d7:01:b1:9b: ba:cf:82:66:2e:20:2e:c8:1d:f7:06:61:b6:4f:a2:35: 49:a6:c6:6c:92:93:2a:72:a6:03:01:2f:ba:cd:fc:f5: b6:85:0b:3c:d1:e8:16:23:d4:c6:b8:39:b0:2d:fd:14: 77:86:a5:d2:b3:a2:a7:38:20:ba:a0:aa:49:64:72:93: 07:13:3e:b9:91:8a:7c:0b:b8:e4:30:2c:e3:ed:38:6c: ca:ea:8a:52:86:05:57:80:01:ca:09:2b:61:03:0c:8b: 53:4f:fc:c7:9d:a2:84:c6:63:af:87:ef:8a:3c:96:7b: 5c:13:cd:74:d5:3e:c5:db:bf:63:57:ae:87:27:f8:fe: 43:75:5f:a8:cb:d6:3e:64:e5:6d:22:63:4c:24:a9:b1: a6:a3:09:3b:49:3c:19:c2:01:86:35:95:3d:c5:9f:0b: cc:d3:14:9f:3d:54:ee:de:c1:48:c2:00:12:e9:1a:2f: ab:a0:c5:37:be:b9:d6:e0:4d:e5:bd:c0:1c:ae:1e:d1: 98:bd:d1:18:e7:5e:70:0a:a7:8a:98:b0:13:2a:b6:49: 4d:bd:e7:bd:a6:ae:04:2f:89:42:0b:03:4a:45:d3:a1 Fingerprint (SHA-256): 29:67:96:47:7B:3B:D1:17:BD:A0:0B:6C:BC:E7:AE:EE:22:7E:28:69:BC:81:5D:F5:1A:36:EF:05:02:D9:8A:B4 Fingerprint (SHA1): 72:34:30:09:70:57:4E:51:CE:8A:2B:1F:6A:A8:1E:37:EE:F0:F1:52 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #3587: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121263 (0x1e67d52f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Wed May 10 12:15:42 2017 Not After : Tue May 10 12:15:42 2067 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:1e:84:07:3d:4d:59:07:58:7d:3d:da:21:7a:43:7b: 0b:ed:ec:bb:7e:d2:1f:45:cf:7e:d1:e1:0d:1b:39:2c: 31:11:3c:54:f7:95:16:41:94:f3:dd:35:ed:3a:51:ad: 16:b2:30:6f:94:6f:4e:86:56:47:cf:1a:e0:7a:70:2d: 13:5a:ce:2a:2b:c2:6a:3d:85:ff:42:8e:49:b3:65:5f: a8:fc:98:21:eb:20:b9:dc:30:c0:4d:e5:01:9f:48:c2: 5f:5b:d2:1c:e6:30:d6:55:b8:b7:df:cc:0d:56:e2:35: 21:ee:c4:07:de:b5:16:fb:c1:0b:36:2f:f0:fd:fa:f6: 42:38:1a:81:f6:3f:01:0f:8d:ae:fd:f3:2b:e3:99:88: f3:69:21:87:88:a8:0c:e1:e6:e1:e1:ee:67:c7:ea:94: 86:0f:ee:14:a0:5a:de:cd:b0:78:11:b9:49:ef:c2:3a: 23:59:0b:a9:4e:a0:b2:9b:6a:03:88:61:43:6f:f5:0c: f9:e5:0b:1d:27:b8:2a:d4:bb:44:19:fe:73:ed:5b:b8: 31:cd:03:e6:a8:07:43:1d:35:70:8d:b9:68:aa:00:df: bd:c9:65:3e:4b:7a:e0:b6:e3:db:11:0c:67:0c:27:9e: be:8e:f7:59:d9:e4:67:8c:50:4f:bc:3f:f6:44:0b:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:41:f5:99:79:3d:04:45:1f:ac:51:52:1f:75:51:b4: 63:0d:52:5f:c0:bc:8e:58:84:9d:68:2e:b5:d3:7f:4c: 79:58:1a:58:1c:5e:34:fd:5c:a8:c6:2a:f4:f7:2c:c2: 0b:64:71:bb:f4:70:70:10:7b:7a:12:26:de:2c:bc:cd: 62:20:4f:c8:31:b1:a2:e5:48:ac:d7:16:02:de:5c:f3: 99:c6:5e:48:b5:6c:26:16:71:be:8f:ef:9a:b2:72:75: 3f:42:9d:20:1d:9a:e8:9d:53:49:50:02:cf:a9:4d:6e: a2:69:02:8b:c5:f5:d6:d6:a7:c9:1a:ba:5e:d8:1f:c0: a9:c9:9c:e5:cf:a0:79:04:8a:44:4b:31:13:71:f9:9c: cb:2f:d9:a6:d9:fa:23:ce:7b:d6:e8:69:db:32:01:3f: 43:c0:56:bb:0b:e2:d4:f9:42:39:ee:90:00:94:f0:e8: e0:89:f6:18:48:ee:a4:08:6b:81:eb:cd:6a:c8:50:15: 1f:10:2a:79:e7:25:89:08:1c:ef:30:e5:c0:5c:a0:28: dd:e9:bc:8f:92:fe:d9:26:e3:76:ef:5c:6d:29:76:4f: 03:13:0d:27:d1:06:4e:7a:fb:f7:6f:bc:18:6e:26:26: 46:ab:37:54:da:a9:38:3c:a7:c6:c9:27:ed:67:85:7a Fingerprint (SHA-256): D1:49:B0:9C:2B:B6:90:E2:4F:F8:96:D6:4D:4C:29:73:6E:B0:D8:F5:C4:58:53:3C:F9:2A:3C:1B:52:DF:34:7A Fingerprint (SHA1): 9F:60:9B:D0:B4:07:33:BC:10:8A:AA:15:01:03:24:DE:32:D9:47:8F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #3588: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121264 (0x1e67d530) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Wed May 10 12:15:43 2017 Not After : Tue May 10 12:15:43 2067 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:ea:8a:73:fb:98:e9:3f:13:8e:9a:a9:c2:91:f5:27: d7:8d:0f:a3:a9:33:40:80:ef:6e:3b:07:c4:f9:6b:bb: 57:07:94:5c:89:93:53:d6:ca:a4:d2:79:78:09:c2:2b: 0c:bd:d8:62:be:54:d3:78:1e:ed:ce:04:06:c4:68:a9: cd:81:00:78:32:53:f0:72:a9:58:99:3b:32:8b:d9:b4: e4:a0:54:a9:bb:ce:5a:d3:90:15:4c:1c:7b:04:7b:67: 3a:67:7d:fb:04:9a:83:5d:dd:95:a3:f0:8b:e7:0e:3d: d6:ee:f8:28:8d:a4:66:53:3e:b1:f4:34:94:5a:55:6e: 0f:ae:dc:d7:31:24:7d:5b:02:f7:31:f7:06:ad:1f:9f: 4a:1c:dc:e7:f9:83:ab:9b:cb:d1:b4:6e:3e:b7:a8:e1: 79:60:47:8d:4b:47:a4:21:4c:cb:11:1f:5b:f3:91:40: 05:ca:97:ba:82:87:cc:17:9d:70:fe:b9:cc:7b:81:2c: 41:da:86:b6:82:9e:f1:23:98:74:98:fd:eb:47:91:0c: 5c:02:cf:fd:8b:31:eb:37:a1:a3:69:67:b5:95:28:87: b4:42:8c:0f:85:d8:42:7e:94:30:52:cc:55:ea:b9:96: ea:49:2d:1f:81:79:ac:82:ec:e6:c1:c8:84:dc:2c:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:ba:59:7b:b5:3c:3b:51:78:c4:3d:d2:6b:6d:42:ca: c6:e1:21:9e:87:2f:af:3b:a3:02:55:d4:0d:ef:d7:fa: 35:31:ef:ac:5b:d4:70:09:09:e9:de:41:5d:38:d1:9d: 88:f4:96:56:15:af:8e:9e:fd:18:73:a9:06:c7:e2:d4: 64:1a:98:cb:f8:b0:93:7b:35:9d:e7:ce:24:68:8a:e7: 3f:ba:f8:e1:13:4b:13:d6:d7:eb:c7:ae:77:95:32:d3: cb:fd:25:73:a9:a0:05:b6:29:ac:6e:87:93:9d:36:76: ba:ff:fc:4f:96:30:a3:25:6e:f8:53:23:a7:ad:2f:89: d8:c3:21:ae:bb:da:d9:f7:ff:30:31:bf:3b:02:9f:10: 1e:35:36:cb:a9:fe:e0:6b:2b:f1:08:34:52:58:1b:5f: cd:ee:72:15:83:fb:99:3d:a3:aa:b6:70:ac:46:a1:9f: eb:c9:95:5e:87:f4:b1:2e:48:64:0b:d0:7e:ab:8f:1b: a2:f0:c7:cf:03:09:31:8f:b0:90:dc:46:0a:2d:aa:bc: 19:dc:39:90:95:27:78:e6:2e:34:ba:62:86:ae:f2:a3: 5f:48:24:10:70:e1:2e:cd:58:e3:09:d1:32:18:ef:3a: 93:ef:7f:2a:d3:d8:c5:59:a5:be:48:4f:08:72:6c:a5 Fingerprint (SHA-256): 01:ED:E5:EE:CF:F8:12:3A:7E:D2:B3:A4:1C:D9:1F:4F:55:0F:69:D5:4E:74:D4:D0:C6:F8:51:C7:74:CC:CA:33 Fingerprint (SHA1): 3A:AD:F3:24:FB:12:AC:AA:52:5F:8A:1C:27:6A:64:AE:7D:2F:9E:E1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #3589: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121265 (0x1e67d531) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Wed May 10 12:15:45 2017 Not After : Tue May 10 12:15:45 2067 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f3:5d:e6:31:0f:4a:ce:d6:b3:fa:05:ce:f9:a5:63:6f: 98:08:7e:4b:8a:bf:25:fa:41:f7:9f:a0:30:7c:2e:ef: 71:e9:1a:e7:61:7e:fe:08:ac:68:1f:fd:5e:46:2d:0e: 47:d7:fe:93:02:0f:a8:79:04:d8:f1:da:2a:91:af:5f: 7c:91:39:35:9c:2b:b2:bf:ca:ab:c2:3f:db:4c:66:2c: a0:4b:ba:60:a2:2f:ae:c4:af:64:3d:ee:63:c9:8c:01: 72:92:43:b7:3b:65:b9:4e:12:bd:94:fe:ab:a5:71:52: 8f:59:94:c2:81:8b:ab:da:4b:6b:f8:9a:61:d2:1b:b7: 2f:af:08:2e:87:b7:b2:af:e3:b4:1b:1f:a0:05:32:4e: ee:a9:74:df:53:b4:6c:16:88:68:a4:bf:9e:cc:fc:4d: d0:fa:02:d4:6d:60:e0:54:59:1c:0d:7b:27:f3:58:88: 97:d9:55:c7:3d:75:66:b1:95:0b:54:60:21:69:11:f7: d1:64:a3:1d:9b:bc:78:6a:b4:df:f8:99:ec:18:ee:f3: f7:d8:62:06:79:29:9d:7f:eb:d0:7e:63:3d:76:fe:23: 87:82:ea:d5:d1:48:0e:3e:42:22:99:d4:1b:90:ed:70: 70:f7:f3:f2:21:df:a9:02:a3:27:7b:38:05:07:d4:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 34:aa:10:ad:f5:78:2d:be:c5:3a:83:5a:4a:aa:8c:a0: 7f:d0:bd:93:a9:67:dc:70:2a:e9:34:83:3c:c6:55:49: d7:53:38:07:fa:1a:df:07:fa:21:64:e3:50:d1:e0:44: ca:5e:b9:0f:e6:01:e3:01:db:5a:bc:77:f9:9c:73:e8: f8:6c:c9:5d:93:33:c0:a0:78:43:fb:84:3c:4e:dc:cb: 26:be:45:5f:32:0b:dd:e7:00:45:4a:8c:a1:49:e1:c7: ae:e0:ce:ca:4c:e2:03:48:e4:d1:00:81:c5:9b:4e:3c: c8:ee:1f:32:de:7d:2a:c5:5c:93:53:ec:9e:9e:65:5c: 7a:12:cb:cb:81:d5:8c:3a:cc:61:16:5b:a2:f2:21:1e: 97:21:5a:26:17:82:cb:c4:9b:63:9e:38:f7:dc:11:a0: 83:62:77:ed:c6:f3:9c:a4:48:c5:a6:1a:ee:51:21:1b: cc:a2:4c:ea:d8:76:3a:71:3f:95:77:08:9f:37:ee:79: a7:29:e5:44:4b:e4:29:a5:c8:a4:5a:88:fd:00:55:00: 1b:ec:f9:77:c3:9b:e6:5e:a0:06:2d:91:c8:a2:45:9f: 6c:43:d6:57:ff:27:c3:1f:47:72:bc:4c:2d:bc:a6:fa: 25:0f:d9:5b:c3:c8:dd:42:e0:27:1f:4d:85:9b:27:a5 Fingerprint (SHA-256): EC:82:1F:7F:D7:AF:0D:87:74:2C:4D:56:EC:8E:96:63:FB:B7:F8:E5:7E:2C:1D:F5:E8:D9:BB:9A:1C:02:4C:B4 Fingerprint (SHA1): BB:55:F4:DF:EC:E6:CD:C7:C8:3A:AC:7C:77:85:BE:FD:76:DC:B8:2E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #3590: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121266 (0x1e67d532) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Wed May 10 12:15:46 2017 Not After : Tue May 10 12:15:46 2067 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:a8:ec:7a:04:2c:87:5c:62:5c:99:72:81:05:1c:7d: 58:30:19:59:4c:04:e6:3d:74:74:72:59:59:1a:6b:56: 38:c1:23:6d:80:b8:1d:bf:bb:3f:4d:98:98:92:dc:44: 73:5e:64:60:e5:86:32:54:19:01:c0:7d:ae:51:cd:ed: 7a:e8:c1:d9:dc:0c:8d:1c:2b:76:60:46:80:7f:8e:b5: ac:6f:6a:71:e8:b3:29:56:54:86:95:3d:6f:c5:68:11: 64:fa:06:f0:db:e3:77:47:5f:4b:56:0d:96:75:52:bd: a6:e8:30:d9:08:96:09:4c:6d:4d:d7:4a:14:cd:4b:62: 60:58:2f:6c:58:e1:2a:d4:a1:54:bc:85:b9:6a:4e:1e: 73:95:5f:ee:79:c2:ed:bc:7b:84:bc:a4:1d:73:8a:ef: 24:9a:be:8e:96:6b:58:45:0d:47:46:de:10:c0:c3:78: be:3a:a0:4d:87:60:71:ed:8b:84:68:7b:a4:34:87:bf: 1c:1f:25:6a:7f:56:71:79:df:b2:5c:74:21:aa:62:25: 19:9b:e4:09:08:ab:58:01:ba:f3:e2:d6:2e:0f:01:62: 40:3d:30:c4:e8:03:15:19:91:67:53:b8:72:00:c5:fb: c5:c9:24:43:8a:3d:45:b0:63:7b:68:e7:80:55:d2:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ad:97:bf:27:a9:17:0d:7c:b3:d3:3d:2e:ef:4b:6b:ad: db:0c:ac:ec:38:18:9b:9d:c7:49:50:65:a0:50:7f:21: 77:f5:6c:81:5a:8f:e1:3d:7b:4c:b8:37:1d:75:e1:9b: 6c:c1:9d:53:9f:f4:b5:b7:69:da:39:1f:ad:8d:0f:83: 9d:e0:a9:a1:b5:36:2f:93:8f:9f:fa:f9:57:9d:a2:a3: e9:a4:b4:67:38:12:b6:ea:1e:26:2c:a5:09:0d:2d:4c: 42:64:a7:2a:57:bf:79:5e:ef:af:31:d0:9b:42:54:a6: f3:1c:9f:61:86:03:a3:a6:64:d8:a9:0c:8d:d5:09:3f: 72:ff:b4:12:30:7c:8e:55:e8:0b:1a:4c:58:44:ec:00: 19:ae:b0:30:27:a8:30:fd:6a:ef:4d:06:26:4d:6c:2e: ee:8b:c9:0f:53:e7:a0:fc:24:82:e4:34:c4:88:06:ce: 90:63:ad:08:47:4d:99:7b:be:eb:be:6c:3f:b2:76:9d: 8f:da:e7:95:6e:2b:57:33:5f:c1:63:c6:08:53:d6:ed: 79:41:07:b5:79:09:20:e9:b3:72:49:4d:c6:ee:52:81: a0:8e:2a:8d:11:e1:a8:c4:3e:f6:d8:b8:08:59:10:3f: 59:b4:e0:fe:40:17:ab:02:17:c4:99:5e:c9:01:e0:dd Fingerprint (SHA-256): D9:34:83:F3:20:74:17:1B:5A:4E:8C:C5:5C:B1:EE:00:90:43:59:19:6F:E1:14:B8:AB:E5:DA:22:A5:36:3A:16 Fingerprint (SHA1): 0A:CE:ED:2D:E6:A9:AA:AE:83:8C:BD:D2:54:6E:17:0D:7F:57:B5:08 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #3591: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121267 (0x1e67d533) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Wed May 10 12:15:47 2017 Not After : Tue May 10 12:15:47 2067 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:26:8a:5b:ee:e1:ef:55:27:6e:45:45:ba:ee:12:3a: a6:da:bb:61:f3:be:10:53:f1:3e:b6:3b:af:22:f6:16: dd:73:bf:bb:f7:90:fa:e4:fe:d2:c9:e0:0a:20:0c:17: 5e:37:f7:28:a3:02:3b:f4:19:1e:0b:41:64:8a:19:64: dd:76:4a:f5:5b:1a:97:a4:cd:b5:5c:b1:61:6b:9a:a3: b3:03:fd:6f:36:53:21:e1:48:18:f6:7f:23:2f:13:c1: dd:29:98:4e:63:28:1d:55:8f:5d:49:c4:29:a2:5d:ff: 3e:79:11:22:22:23:8d:20:b4:9a:d3:e6:ac:87:54:c5: 9c:ab:81:ac:4f:68:73:d6:15:7d:bb:7f:81:f9:d5:33: d6:91:44:c8:7b:f5:6b:16:ab:79:3f:0a:9b:33:e2:1a: 26:e1:c2:d3:f1:42:09:d3:52:a7:dd:6f:7c:bb:26:dd: 36:3b:12:92:d3:d3:30:9f:d3:21:ce:25:37:33:87:57: 26:ac:bf:5b:30:9c:0d:c9:8f:fd:c5:0a:e3:8b:15:20: d9:6a:ca:df:b0:d1:36:02:d9:39:cd:f1:12:34:ab:fd: f1:c0:fe:97:c5:40:e8:4f:8d:e5:51:73:98:c3:54:3b: 6f:28:f0:90:02:ed:9f:1c:d2:28:59:f3:e1:50:03:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:fe:2c:64:30:24:3c:4c:f3:1b:a8:8e:2c:86:91:9f: 2c:6e:ad:87:1a:0e:78:83:00:e5:bd:8e:7d:29:88:52: de:10:9f:36:0e:8b:b2:d5:a4:7f:8a:e6:42:53:45:a2: 1c:c1:dd:44:3d:5e:12:4e:8f:56:ee:e4:4f:a3:60:64: a5:ef:1a:8b:2f:98:9a:93:4e:31:64:58:86:d3:04:d7: f6:a3:25:ab:d5:28:74:b6:9b:be:6a:ad:0a:8c:78:e3: d0:96:f5:4b:a8:dd:09:92:a4:98:c7:52:66:35:d3:f5: ab:fd:ec:22:48:22:d9:69:a4:05:64:f7:b8:e6:b8:16: 57:fd:a3:ef:43:55:be:75:45:d4:e4:1e:d4:81:5d:8a: 58:1d:e3:6a:91:18:ae:93:18:aa:eb:b5:0e:c7:46:73: 28:6a:fd:02:93:10:0c:d1:17:aa:b4:b5:02:78:23:f4: 3f:0a:5d:94:c9:3c:8e:a3:30:05:4e:a6:6a:51:8f:17: 1f:d2:d4:9f:07:d2:9d:11:35:4d:09:88:25:62:0d:3d: f2:66:9e:42:d7:e2:34:26:49:dc:be:d9:41:61:dd:6f: 71:5a:a4:d2:73:51:09:d2:e2:dd:73:ea:98:8e:f2:b7: ef:b3:38:ea:5c:96:cc:21:ac:4f:c1:22:9a:46:35:76 Fingerprint (SHA-256): 3A:37:9D:42:34:BA:C4:62:B0:8E:D9:FD:47:B4:C9:09:16:16:CF:C1:C6:0C:3B:3B:E5:01:15:07:7A:23:0A:6A Fingerprint (SHA1): 8B:FA:D8:EB:92:30:3D:14:0F:B8:A2:AF:BE:12:BC:DD:13:5B:8C:37 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #3592: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3593: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121282 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3594: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3595: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3596: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3597: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510121283 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3598: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3599: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3600: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3601: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510121284 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3602: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3603: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3604: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3605: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 510121285 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3606: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3607: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3608: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121282 (0x1e67d542) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:16:00 2017 Not After : Tue May 10 12:16:00 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:e9:fc:4d:fd:ea:a1:99:9a:8f:95:b1:8c:eb:71:7c: 87:03:62:d4:46:df:1c:d5:15:71:d9:94:5c:aa:2f:44: 9f:20:46:b6:c7:4d:16:30:c8:22:22:1e:54:7d:88:1e: 6c:13:73:6b:7c:5c:c8:49:39:95:74:f9:69:0c:54:0f: 18:56:8d:5d:7f:0a:19:70:2a:75:b6:94:d9:00:14:99: a9:9f:ab:6d:a4:0e:ac:35:de:10:88:c3:7f:f6:0b:e3: 09:6d:3b:f0:76:9d:23:83:ef:7a:2c:ce:16:89:7c:aa: 49:1c:f6:33:42:5d:a7:7c:0d:43:7a:e8:67:61:f6:ac: 7b:1c:88:19:15:fd:21:98:a2:74:77:bd:42:1f:74:37: da:29:16:f4:fa:75:9b:a6:5d:bd:10:1b:da:78:c8:8e: 07:a2:49:6c:24:c5:da:29:12:d1:2d:7f:56:2c:f4:5e: e1:9b:0c:25:be:11:80:81:ec:45:af:6c:5e:da:a2:42: 03:77:1a:04:96:66:37:65:de:11:3e:17:70:e5:a5:a3: aa:a2:55:3f:56:d7:b4:09:f3:ba:27:21:f1:3a:b4:ee: 40:a6:e6:54:06:db:50:12:4f:f7:60:e4:a9:46:7a:b3: e6:65:34:17:79:ad:74:b2:52:d6:59:dc:b5:33:a8:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:98:c2:b0:30:f6:32:06:7f:bb:09:0e:03:ad:e0:50: 6a:71:91:f5:2a:23:a9:5b:c8:fd:f0:ef:17:a9:df:98: f1:15:d4:72:ff:51:62:79:d8:c8:a9:45:a2:75:37:e9: 58:dc:f4:c7:40:c6:ca:63:44:3e:4e:d1:4d:b0:e2:2c: 1c:0a:74:e5:86:c6:e6:c2:9f:62:c8:93:ab:65:b9:9b: 5a:60:95:aa:6b:a9:df:20:bd:5b:9f:f3:04:82:5a:d9: f7:2b:6d:ec:57:d9:fe:03:1e:df:95:52:ce:c7:b9:59: 09:fe:2f:1d:69:3a:0e:c6:82:21:23:7b:f1:e1:51:69: 05:66:fa:fa:5d:85:2e:9e:0c:33:f7:99:bd:67:93:aa: d8:d6:c4:bb:88:75:b2:22:44:0d:1a:8b:bc:48:b3:cb: 38:d7:30:68:14:92:58:39:4b:be:ff:45:66:a8:39:d0: e9:26:5f:8c:88:14:3f:90:b9:3c:f1:f1:ca:29:29:fe: b3:31:b8:6c:c6:a6:77:52:dd:84:51:45:35:2f:64:a9: fb:93:f9:c4:3b:61:31:3c:3f:ba:ff:3f:46:ab:f6:73: 47:00:1b:da:90:65:ce:18:43:aa:e6:91:00:6c:91:7d: 5f:9c:f6:28:18:4f:85:e7:91:7b:aa:bc:ad:4a:77:6f Fingerprint (SHA-256): B3:8E:34:D7:E4:37:4E:99:0A:CE:7C:22:51:F4:9D:00:B2:44:7B:C7:DE:05:5C:2B:29:99:20:E1:AA:02:D4:53 Fingerprint (SHA1): D5:0E:1E:AF:FD:D3:BA:B4:D6:A8:79:8D:99:1F:34:CD:51:EC:09:46 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3609: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3610: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121283 (0x1e67d543) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:16:02 2017 Not After : Tue May 10 12:16:02 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:b6:6f:a7:ef:3e:ce:c0:a4:d7:5b:52:06:6a:27:79: 5f:81:2f:1c:f9:5a:bf:d9:d6:9c:c5:2e:1e:1d:31:95: 1b:88:1e:1d:2f:31:92:b9:30:28:27:1a:79:6a:9d:61: 69:6c:19:b1:fb:bb:97:3f:d9:99:e6:40:cb:1d:10:e7: 24:77:80:8d:96:ee:83:a6:64:c5:90:cf:7e:42:39:cf: e8:08:e0:47:b0:7a:9a:ef:9c:78:b0:ef:29:77:d1:a1: ec:ff:e3:6f:5b:97:97:3e:4f:20:8c:71:85:c5:83:58: d7:27:d3:f4:9f:d1:2c:3d:98:ad:5b:81:ad:7e:a9:91: 05:c2:e6:67:a7:6c:08:81:aa:6b:53:73:b8:74:59:51: 6f:01:12:f9:7d:73:46:0b:10:a8:a3:46:a1:5a:b8:d4: 14:06:5c:e9:ce:ac:6a:68:cd:2e:f0:c7:1d:7e:51:0a: 04:cb:a5:04:f4:fc:a6:e6:de:a5:95:5a:43:67:e1:63: 27:2b:7e:60:44:68:8f:55:15:fe:8d:33:c7:e9:a6:e8: 48:8a:5f:d1:c1:54:9a:77:15:f7:8a:9b:3e:31:aa:e6: 2d:b5:55:51:35:2e:18:7e:94:66:ea:ae:00:c2:e1:2e: e6:5d:8a:a2:60:3e:75:b3:d6:93:6d:10:ea:fe:b2:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:b9:08:10:f6:15:c7:b0:9d:bd:1b:2e:1e:93:0e:3e: 5e:fa:e1:8b:28:61:f3:cf:3b:6d:d6:58:d1:c2:2c:20: 9b:85:a8:5a:ba:b9:8b:ee:7e:e9:c9:5e:e3:69:f5:50: 04:09:79:d7:de:4c:17:9a:05:38:a7:d0:36:c1:a9:99: d0:5c:68:df:6a:89:d3:d2:80:7c:9c:20:c1:91:55:1d: 06:34:7c:93:72:0f:a5:26:ea:0d:1c:e0:d6:71:a7:03: 98:54:e2:75:fe:6f:67:84:aa:e8:be:0f:bd:5c:1f:7b: 0b:9f:b2:43:01:bf:63:d0:42:5c:06:e8:e3:3c:f9:de: bd:00:cd:2c:1e:9b:e5:3d:6b:55:d2:42:92:b6:20:29: 37:f8:cb:43:17:83:d0:2e:d4:cd:21:70:bc:2a:7e:df: 22:49:9c:0d:73:44:a3:e4:8a:46:dd:17:3f:20:e5:cb: 33:b4:5a:16:cb:e8:dd:9e:2a:0c:42:f0:dd:83:fa:77: 36:ee:b6:b8:d8:56:4f:7d:29:93:be:3d:9e:d7:26:70: 7c:97:16:2d:1d:10:49:e5:26:db:17:d8:12:7c:33:49: 29:de:0f:86:ab:e7:cb:87:19:30:fd:d3:dc:bd:89:0d: dd:99:50:04:85:dd:f7:ec:49:09:52:94:7e:7a:ba:f0 Fingerprint (SHA-256): C2:35:6F:E3:40:56:19:4A:86:A2:79:BB:7E:B4:27:27:B9:81:AD:A8:0A:1B:3A:34:34:87:24:CA:3C:33:72:23 Fingerprint (SHA1): 9B:1B:A4:35:1F:99:20:94:6D:42:9E:C4:07:55:5B:E4:D2:99:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3611: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3612: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121284 (0x1e67d544) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:16:03 2017 Not After : Tue May 10 12:16:03 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:9b:d5:60:64:db:43:f2:e5:10:e5:10:80:ad:91:ca: 70:5e:c7:a2:95:25:47:84:4b:3b:3a:e1:60:09:2d:32: 24:3f:c0:77:2d:f9:97:44:82:42:62:7e:27:f5:ee:36: 01:de:2f:06:db:f1:d0:eb:c6:90:bd:f2:ed:99:7f:68: 49:c6:0a:11:b6:82:33:01:19:37:b9:96:ee:d4:32:bc: c9:c9:da:ff:44:87:51:da:ec:0a:31:fd:4e:54:aa:08: 7e:b5:fc:4a:c1:bc:60:ae:93:72:1d:b1:18:77:cd:ac: c0:02:87:c9:71:1c:42:13:63:d1:ba:d2:2f:86:38:8a: 57:1f:08:ed:74:33:02:f4:66:3e:b7:df:cc:b0:e1:9f: 96:fe:14:47:1d:a3:de:f3:15:4e:e2:87:b4:c8:ad:6b: bc:e7:80:13:08:3e:1b:52:83:1f:41:ad:bd:c9:e4:35: b7:27:96:f8:4a:9c:5d:da:41:9d:db:4d:61:18:11:54: 6c:26:86:a8:1e:49:31:7a:36:31:e9:73:50:36:85:de: c8:36:67:85:1d:4b:90:a1:7a:a9:d6:42:3c:fc:90:51: 5b:ad:a7:56:a4:47:a3:c9:59:3b:19:8b:38:d3:bb:aa: 58:f3:47:b3:29:1b:48:6d:1f:32:3a:c7:61:86:5b:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:3c:f4:9d:49:54:d4:0b:5e:1a:b1:3b:03:66:fa:eb: 33:ff:d1:51:56:eb:66:70:fc:39:43:3f:7f:13:6e:82: 0a:99:ad:b4:f0:33:f6:88:6d:ab:41:b6:46:76:88:69: 82:52:e8:18:2b:e5:7f:83:35:f4:8b:da:a9:8a:8e:23: d0:21:15:84:ab:56:f7:39:d2:2a:91:14:2a:69:80:e2: 54:2a:8a:c4:22:6a:4d:f5:40:3f:e5:92:8e:ab:ce:e9: 9f:30:e8:b8:50:92:91:2d:87:f2:0b:3b:11:dd:c5:b9: 1a:45:59:39:73:68:9b:6f:5c:0c:9d:1a:6b:86:4a:fd: 90:37:c1:46:de:55:c5:dc:08:19:d5:9e:ab:5c:0a:08: 01:c3:09:c2:bb:fa:ed:52:1f:f2:c7:c1:3f:26:db:f7: 84:20:eb:37:42:35:9c:d7:03:a6:7c:49:62:46:b5:0a: 0d:7a:c6:39:cc:17:59:eb:b0:fb:12:77:22:2f:74:fa: bf:be:b6:1f:a6:8c:1d:c0:0e:23:5b:29:3c:b8:6c:fc: 01:eb:69:6e:0f:c7:d3:12:d2:6e:fd:b1:e4:a9:cc:0c: e2:64:13:aa:94:4c:3b:de:1a:98:19:b7:29:10:4c:82: 81:b5:61:ac:f0:c1:3c:b5:40:34:f2:02:62:5d:08:40 Fingerprint (SHA-256): 5F:CF:AF:F3:45:F3:1D:90:95:79:7A:AD:48:E0:1A:9B:45:49:6B:97:36:A4:E4:E7:84:A9:2C:BD:67:69:82:4F Fingerprint (SHA1): 53:FC:8A:2F:14:2D:38:51:58:29:B0:8C:D8:96:15:4E:93:1A:E9:A2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #3613: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3614: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3615: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3616: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3617: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121282 (0x1e67d542) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:16:00 2017 Not After : Tue May 10 12:16:00 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:e9:fc:4d:fd:ea:a1:99:9a:8f:95:b1:8c:eb:71:7c: 87:03:62:d4:46:df:1c:d5:15:71:d9:94:5c:aa:2f:44: 9f:20:46:b6:c7:4d:16:30:c8:22:22:1e:54:7d:88:1e: 6c:13:73:6b:7c:5c:c8:49:39:95:74:f9:69:0c:54:0f: 18:56:8d:5d:7f:0a:19:70:2a:75:b6:94:d9:00:14:99: a9:9f:ab:6d:a4:0e:ac:35:de:10:88:c3:7f:f6:0b:e3: 09:6d:3b:f0:76:9d:23:83:ef:7a:2c:ce:16:89:7c:aa: 49:1c:f6:33:42:5d:a7:7c:0d:43:7a:e8:67:61:f6:ac: 7b:1c:88:19:15:fd:21:98:a2:74:77:bd:42:1f:74:37: da:29:16:f4:fa:75:9b:a6:5d:bd:10:1b:da:78:c8:8e: 07:a2:49:6c:24:c5:da:29:12:d1:2d:7f:56:2c:f4:5e: e1:9b:0c:25:be:11:80:81:ec:45:af:6c:5e:da:a2:42: 03:77:1a:04:96:66:37:65:de:11:3e:17:70:e5:a5:a3: aa:a2:55:3f:56:d7:b4:09:f3:ba:27:21:f1:3a:b4:ee: 40:a6:e6:54:06:db:50:12:4f:f7:60:e4:a9:46:7a:b3: e6:65:34:17:79:ad:74:b2:52:d6:59:dc:b5:33:a8:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:98:c2:b0:30:f6:32:06:7f:bb:09:0e:03:ad:e0:50: 6a:71:91:f5:2a:23:a9:5b:c8:fd:f0:ef:17:a9:df:98: f1:15:d4:72:ff:51:62:79:d8:c8:a9:45:a2:75:37:e9: 58:dc:f4:c7:40:c6:ca:63:44:3e:4e:d1:4d:b0:e2:2c: 1c:0a:74:e5:86:c6:e6:c2:9f:62:c8:93:ab:65:b9:9b: 5a:60:95:aa:6b:a9:df:20:bd:5b:9f:f3:04:82:5a:d9: f7:2b:6d:ec:57:d9:fe:03:1e:df:95:52:ce:c7:b9:59: 09:fe:2f:1d:69:3a:0e:c6:82:21:23:7b:f1:e1:51:69: 05:66:fa:fa:5d:85:2e:9e:0c:33:f7:99:bd:67:93:aa: d8:d6:c4:bb:88:75:b2:22:44:0d:1a:8b:bc:48:b3:cb: 38:d7:30:68:14:92:58:39:4b:be:ff:45:66:a8:39:d0: e9:26:5f:8c:88:14:3f:90:b9:3c:f1:f1:ca:29:29:fe: b3:31:b8:6c:c6:a6:77:52:dd:84:51:45:35:2f:64:a9: fb:93:f9:c4:3b:61:31:3c:3f:ba:ff:3f:46:ab:f6:73: 47:00:1b:da:90:65:ce:18:43:aa:e6:91:00:6c:91:7d: 5f:9c:f6:28:18:4f:85:e7:91:7b:aa:bc:ad:4a:77:6f Fingerprint (SHA-256): B3:8E:34:D7:E4:37:4E:99:0A:CE:7C:22:51:F4:9D:00:B2:44:7B:C7:DE:05:5C:2B:29:99:20:E1:AA:02:D4:53 Fingerprint (SHA1): D5:0E:1E:AF:FD:D3:BA:B4:D6:A8:79:8D:99:1F:34:CD:51:EC:09:46 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3618: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3619: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121283 (0x1e67d543) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:16:02 2017 Not After : Tue May 10 12:16:02 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:b6:6f:a7:ef:3e:ce:c0:a4:d7:5b:52:06:6a:27:79: 5f:81:2f:1c:f9:5a:bf:d9:d6:9c:c5:2e:1e:1d:31:95: 1b:88:1e:1d:2f:31:92:b9:30:28:27:1a:79:6a:9d:61: 69:6c:19:b1:fb:bb:97:3f:d9:99:e6:40:cb:1d:10:e7: 24:77:80:8d:96:ee:83:a6:64:c5:90:cf:7e:42:39:cf: e8:08:e0:47:b0:7a:9a:ef:9c:78:b0:ef:29:77:d1:a1: ec:ff:e3:6f:5b:97:97:3e:4f:20:8c:71:85:c5:83:58: d7:27:d3:f4:9f:d1:2c:3d:98:ad:5b:81:ad:7e:a9:91: 05:c2:e6:67:a7:6c:08:81:aa:6b:53:73:b8:74:59:51: 6f:01:12:f9:7d:73:46:0b:10:a8:a3:46:a1:5a:b8:d4: 14:06:5c:e9:ce:ac:6a:68:cd:2e:f0:c7:1d:7e:51:0a: 04:cb:a5:04:f4:fc:a6:e6:de:a5:95:5a:43:67:e1:63: 27:2b:7e:60:44:68:8f:55:15:fe:8d:33:c7:e9:a6:e8: 48:8a:5f:d1:c1:54:9a:77:15:f7:8a:9b:3e:31:aa:e6: 2d:b5:55:51:35:2e:18:7e:94:66:ea:ae:00:c2:e1:2e: e6:5d:8a:a2:60:3e:75:b3:d6:93:6d:10:ea:fe:b2:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:b9:08:10:f6:15:c7:b0:9d:bd:1b:2e:1e:93:0e:3e: 5e:fa:e1:8b:28:61:f3:cf:3b:6d:d6:58:d1:c2:2c:20: 9b:85:a8:5a:ba:b9:8b:ee:7e:e9:c9:5e:e3:69:f5:50: 04:09:79:d7:de:4c:17:9a:05:38:a7:d0:36:c1:a9:99: d0:5c:68:df:6a:89:d3:d2:80:7c:9c:20:c1:91:55:1d: 06:34:7c:93:72:0f:a5:26:ea:0d:1c:e0:d6:71:a7:03: 98:54:e2:75:fe:6f:67:84:aa:e8:be:0f:bd:5c:1f:7b: 0b:9f:b2:43:01:bf:63:d0:42:5c:06:e8:e3:3c:f9:de: bd:00:cd:2c:1e:9b:e5:3d:6b:55:d2:42:92:b6:20:29: 37:f8:cb:43:17:83:d0:2e:d4:cd:21:70:bc:2a:7e:df: 22:49:9c:0d:73:44:a3:e4:8a:46:dd:17:3f:20:e5:cb: 33:b4:5a:16:cb:e8:dd:9e:2a:0c:42:f0:dd:83:fa:77: 36:ee:b6:b8:d8:56:4f:7d:29:93:be:3d:9e:d7:26:70: 7c:97:16:2d:1d:10:49:e5:26:db:17:d8:12:7c:33:49: 29:de:0f:86:ab:e7:cb:87:19:30:fd:d3:dc:bd:89:0d: dd:99:50:04:85:dd:f7:ec:49:09:52:94:7e:7a:ba:f0 Fingerprint (SHA-256): C2:35:6F:E3:40:56:19:4A:86:A2:79:BB:7E:B4:27:27:B9:81:AD:A8:0A:1B:3A:34:34:87:24:CA:3C:33:72:23 Fingerprint (SHA1): 9B:1B:A4:35:1F:99:20:94:6D:42:9E:C4:07:55:5B:E4:D2:99:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3620: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3621: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121284 (0x1e67d544) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:16:03 2017 Not After : Tue May 10 12:16:03 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:9b:d5:60:64:db:43:f2:e5:10:e5:10:80:ad:91:ca: 70:5e:c7:a2:95:25:47:84:4b:3b:3a:e1:60:09:2d:32: 24:3f:c0:77:2d:f9:97:44:82:42:62:7e:27:f5:ee:36: 01:de:2f:06:db:f1:d0:eb:c6:90:bd:f2:ed:99:7f:68: 49:c6:0a:11:b6:82:33:01:19:37:b9:96:ee:d4:32:bc: c9:c9:da:ff:44:87:51:da:ec:0a:31:fd:4e:54:aa:08: 7e:b5:fc:4a:c1:bc:60:ae:93:72:1d:b1:18:77:cd:ac: c0:02:87:c9:71:1c:42:13:63:d1:ba:d2:2f:86:38:8a: 57:1f:08:ed:74:33:02:f4:66:3e:b7:df:cc:b0:e1:9f: 96:fe:14:47:1d:a3:de:f3:15:4e:e2:87:b4:c8:ad:6b: bc:e7:80:13:08:3e:1b:52:83:1f:41:ad:bd:c9:e4:35: b7:27:96:f8:4a:9c:5d:da:41:9d:db:4d:61:18:11:54: 6c:26:86:a8:1e:49:31:7a:36:31:e9:73:50:36:85:de: c8:36:67:85:1d:4b:90:a1:7a:a9:d6:42:3c:fc:90:51: 5b:ad:a7:56:a4:47:a3:c9:59:3b:19:8b:38:d3:bb:aa: 58:f3:47:b3:29:1b:48:6d:1f:32:3a:c7:61:86:5b:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:3c:f4:9d:49:54:d4:0b:5e:1a:b1:3b:03:66:fa:eb: 33:ff:d1:51:56:eb:66:70:fc:39:43:3f:7f:13:6e:82: 0a:99:ad:b4:f0:33:f6:88:6d:ab:41:b6:46:76:88:69: 82:52:e8:18:2b:e5:7f:83:35:f4:8b:da:a9:8a:8e:23: d0:21:15:84:ab:56:f7:39:d2:2a:91:14:2a:69:80:e2: 54:2a:8a:c4:22:6a:4d:f5:40:3f:e5:92:8e:ab:ce:e9: 9f:30:e8:b8:50:92:91:2d:87:f2:0b:3b:11:dd:c5:b9: 1a:45:59:39:73:68:9b:6f:5c:0c:9d:1a:6b:86:4a:fd: 90:37:c1:46:de:55:c5:dc:08:19:d5:9e:ab:5c:0a:08: 01:c3:09:c2:bb:fa:ed:52:1f:f2:c7:c1:3f:26:db:f7: 84:20:eb:37:42:35:9c:d7:03:a6:7c:49:62:46:b5:0a: 0d:7a:c6:39:cc:17:59:eb:b0:fb:12:77:22:2f:74:fa: bf:be:b6:1f:a6:8c:1d:c0:0e:23:5b:29:3c:b8:6c:fc: 01:eb:69:6e:0f:c7:d3:12:d2:6e:fd:b1:e4:a9:cc:0c: e2:64:13:aa:94:4c:3b:de:1a:98:19:b7:29:10:4c:82: 81:b5:61:ac:f0:c1:3c:b5:40:34:f2:02:62:5d:08:40 Fingerprint (SHA-256): 5F:CF:AF:F3:45:F3:1D:90:95:79:7A:AD:48:E0:1A:9B:45:49:6B:97:36:A4:E4:E7:84:A9:2C:BD:67:69:82:4F Fingerprint (SHA1): 53:FC:8A:2F:14:2D:38:51:58:29:B0:8C:D8:96:15:4E:93:1A:E9:A2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #3622: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3623: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3624: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121286 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3625: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3626: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3627: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3628: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510121287 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3629: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3630: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3631: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3632: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510121288 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3633: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3634: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #3635: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3636: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 510121289 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3637: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3638: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #3639: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3640: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 510121290 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3641: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3642: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3643: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121286 (0x1e67d546) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:16:07 2017 Not After : Tue May 10 12:16:07 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:73:d9:61:56:31:5d:f8:9b:cd:10:db:71:78:a2:c3: 28:c5:e0:a8:5e:19:b6:5c:d7:c0:a8:2e:d7:b5:2f:56: 9e:61:62:50:58:d5:c3:5e:1f:8c:cf:cc:f8:00:b6:94: ad:15:82:41:b5:9c:da:4e:54:66:ff:e5:76:a1:85:4a: 65:8d:36:d6:08:d8:76:27:00:9b:71:03:b5:6a:98:68: 22:fa:ec:8d:b5:67:a6:dd:9b:4a:5b:89:fc:04:ba:d2: 02:35:d5:6a:4c:9b:e2:fa:2f:0e:65:f1:a9:70:49:fb: 2d:ec:54:c5:9e:2c:a7:24:58:6a:4e:27:17:5c:10:e7: bc:3d:4e:74:f5:b3:d0:da:38:03:26:aa:16:b0:9d:1f: cf:5d:4d:6d:19:1b:3c:0c:dc:f0:89:2e:c7:e7:d4:f1: cd:f5:91:5f:0e:69:5c:65:3a:55:45:4b:90:c7:15:9b: 73:7c:0e:54:22:f8:2a:fd:64:2b:c3:dd:39:d8:9d:ab: a1:c2:38:a6:99:16:b6:0e:58:d1:5a:0f:7f:af:74:37: 48:89:58:58:b9:75:1f:5b:e0:a7:82:1c:38:57:c1:aa: 3e:ba:8b:f7:ee:b9:11:da:18:e7:c7:0d:76:8b:65:79: ef:5d:a8:36:3a:cd:f9:31:6d:b1:b5:35:2f:9b:3f:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:3e:18:ae:24:f3:c0:27:3f:a1:2c:c8:65:b2:b0:3b: 2d:b6:f1:63:b4:ff:d1:53:21:47:f8:fb:f3:76:1d:63: 7c:d8:5c:11:1a:4e:55:3f:62:9d:8f:52:e9:a2:31:48: d5:15:32:c6:cb:03:aa:a0:fb:ca:a0:c3:11:9d:2f:d9: d3:2a:bb:a6:ac:36:0d:e1:f4:f1:22:9b:1f:41:88:69: e6:04:11:0d:48:1b:d1:42:e9:ac:30:b5:54:09:bf:fb: 68:08:de:d8:53:93:67:a2:9c:95:6e:34:f6:96:cf:e9: 00:52:a2:e3:f6:0d:47:a2:4c:9a:f0:39:f8:a8:91:52: 6c:29:eb:98:d3:9b:05:0b:d0:30:cd:b4:73:e4:c9:48: b6:bd:25:3e:d3:0e:ad:12:43:d2:41:92:30:08:be:a1: 14:0f:9f:36:6e:23:aa:3a:09:91:07:ec:07:dc:f4:c6: 78:9e:46:54:4a:fb:76:cd:cb:4e:be:80:97:fd:3c:fb: 73:92:98:3e:06:8f:05:fa:7d:1a:38:98:c4:79:42:51: ab:a7:8e:47:68:d1:df:1d:e8:15:23:e2:44:6e:62:33: 87:17:1f:72:6b:a7:64:e4:58:26:bf:cd:fb:db:46:d1: a5:87:18:c4:b8:e5:cd:a8:a6:98:54:3f:78:92:2f:c1 Fingerprint (SHA-256): 28:71:40:79:EA:EF:A2:C8:58:01:F2:6D:EC:47:D8:74:A9:E3:7D:63:38:33:4A:DC:BD:AA:0C:34:BD:97:AF:5D Fingerprint (SHA1): 66:85:77:F2:55:39:07:6D:2A:4D:AA:C3:35:5F:B1:BC:37:DF:4F:D6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3644: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3645: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121287 (0x1e67d547) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:16:09 2017 Not After : Tue May 10 12:16:09 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:23:35:8c:d1:4f:dd:97:1d:13:66:99:15:e0:34:2a: c8:4a:e8:ae:19:c8:dd:00:3f:d4:68:fe:ee:3d:0a:c4: 0a:d4:80:8b:78:18:3f:b7:a5:7b:75:36:b3:54:ce:4c: 6a:91:bf:20:9c:b5:72:ab:58:8b:83:0d:ba:ea:39:1a: c0:83:4f:f5:a9:fe:c7:43:f2:94:c6:62:f7:57:c3:ad: b6:47:b8:ff:19:1d:64:9e:28:ff:cd:5e:83:b1:23:cd: 3a:39:63:65:12:f7:c4:a5:0b:e1:8d:06:dd:93:80:de: af:01:f6:f6:ee:6c:3c:8e:d2:98:2c:20:06:82:95:4b: 83:de:b2:d0:e6:b9:61:7a:eb:a1:f1:06:68:34:68:93: 1e:98:e4:66:e0:9a:82:e8:b8:5f:77:1f:dc:b2:70:1b: cd:9d:15:a1:f7:a3:e6:d5:16:29:0e:09:15:fb:c5:0d: a7:0c:05:a5:37:d5:cb:e7:9d:3c:bc:2b:6e:38:95:88: d5:8a:eb:af:f1:b1:6e:8b:9d:de:13:cd:fc:bd:d3:e7: af:19:d5:bf:c2:eb:8e:99:d1:6f:41:9c:d2:02:ed:cc: 48:31:d6:ed:2a:b1:ba:71:2f:8a:52:9b:95:da:7b:be: d5:35:49:ce:25:f6:0f:05:d3:db:6c:a4:63:be:b3:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:d3:5b:bd:2f:e6:25:9c:77:52:98:63:ad:1d:fc:f2: 23:20:0c:73:31:81:1a:ed:53:9b:2c:da:ae:5a:6f:3e: 42:e3:4e:5e:99:91:2a:e0:56:64:46:41:9c:59:0f:1b: a8:22:a7:bf:ce:85:be:ed:2b:f7:20:72:ef:d6:6a:d5: 6e:99:08:82:5f:bc:d3:dd:c2:5c:1a:e3:44:37:8b:b4: 53:9b:ff:27:e8:dc:b1:d4:7e:67:80:d4:f8:e0:b6:25: a3:b7:5e:ba:bf:27:04:5c:8c:12:3f:ce:42:29:4f:6d: 3f:f5:f7:7a:63:e2:ec:72:78:61:37:f5:fb:c9:9c:60: 98:41:7e:26:9b:78:4e:c5:96:d5:42:32:e9:3b:24:8f: e7:17:3b:9f:c8:5f:96:74:11:fa:36:74:0c:68:3e:17: 0a:68:d9:db:f7:9f:49:89:eb:1c:51:93:cf:e2:0f:94: c6:17:75:36:d7:9c:cd:61:65:7c:37:7f:03:64:38:d6: b4:a5:dc:ae:ad:d5:fb:4c:44:ed:31:f6:60:f0:00:62: 56:37:63:0e:65:9e:f7:45:1a:b0:02:1b:46:bd:c6:3e: 85:a3:e4:20:bb:39:36:62:c2:ae:f0:79:fb:1e:4a:f5: 2f:f8:cb:d9:8b:70:7a:7a:9a:46:c7:35:e2:87:86:36 Fingerprint (SHA-256): 01:96:E7:C3:02:92:AB:EE:24:F5:AE:CC:2F:31:86:BC:9D:D6:DD:23:F9:24:BE:23:55:61:5B:9F:D4:D9:F0:FC Fingerprint (SHA1): 05:2E:1E:60:60:D5:66:90:0C:C8:FB:16:A2:C0:17:79:A0:AB:E7:D6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3646: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3647: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121288 (0x1e67d548) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:16:10 2017 Not After : Tue May 10 12:16:10 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:e3:35:22:ef:50:dc:bd:87:1d:b8:88:49:ba:fb:dd: c4:07:46:ea:2a:a3:5e:6c:fb:fa:54:21:26:cb:ed:cb: 8a:dc:40:76:5e:1a:20:01:5f:4e:a9:75:d1:0b:a0:14: 80:4b:16:1a:db:2a:04:dd:b5:27:58:c3:8b:b8:62:5f: 94:38:79:c9:b5:7a:f0:71:20:6d:7d:b9:75:03:49:2a: 53:2d:55:15:43:1d:d6:4d:8e:c8:63:19:08:d1:3c:df: 38:3d:68:e9:eb:b4:df:e9:52:8e:8f:99:50:37:82:85: a9:98:15:0a:9a:e2:f4:a1:8a:11:08:e6:e6:97:19:13: b1:e0:33:55:86:d1:3a:66:4c:68:c2:11:5a:af:21:fc: ee:5b:4c:03:a9:8b:0f:01:98:9a:5d:6d:81:ea:e0:06: 2d:bf:85:06:4c:b0:00:e6:e7:fb:7a:e7:24:ed:0f:1f: af:3a:0e:73:b6:0a:55:b8:4e:63:7c:63:82:ce:22:62: cc:29:9e:24:86:34:6f:1a:25:b8:17:13:05:87:c1:13: 01:93:48:79:3a:8b:e4:50:be:cd:ed:ca:db:73:fb:b1: 95:78:13:4c:d5:6b:d7:95:b3:ba:8d:7a:28:ef:f9:06: 7f:3b:81:5d:a1:82:a2:b3:02:e5:29:3d:a0:4b:fa:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:c5:aa:71:c7:0f:73:7c:dd:b4:c7:0c:e1:65:36:11: ae:43:af:40:8b:4a:6c:40:76:2b:00:06:ad:4b:69:7b: 11:d6:08:83:c6:11:9d:87:fa:ad:4b:5a:e4:ad:c2:a1: 64:2d:42:9c:3c:d5:2d:c4:46:47:4d:0a:13:a3:7a:ea: 2f:cc:1b:e9:71:2a:25:73:89:61:db:e9:a2:83:27:17: 99:ae:7f:f9:c1:5c:22:f0:90:01:54:55:6b:5f:b7:90: 66:ba:16:77:45:50:00:c6:17:37:45:f8:98:79:45:32: 74:99:21:a5:dd:c2:aa:78:76:3e:4a:b3:c8:d3:f2:a3: 83:e2:d3:69:ae:bf:a8:ed:6e:fc:6e:b2:4b:99:99:8c: bb:73:65:4f:f7:57:cc:74:c0:e4:c8:5a:8d:b7:a6:cd: 87:7e:6a:c2:ec:3f:8a:e7:1b:6e:2f:21:99:53:3a:d6: cd:6b:18:a4:a6:25:9e:db:ad:65:69:9e:98:71:bb:08: ca:57:98:f0:2d:d7:ae:c8:69:81:48:8b:6f:09:1d:db: fc:ff:2b:85:0c:4e:d4:88:c8:06:cf:84:b2:ea:2c:4b: 7e:87:06:16:89:3d:f3:93:ea:17:22:51:bc:00:cf:b9: 81:d9:41:13:0c:40:27:30:f7:e0:f2:a1:bf:94:19:bc Fingerprint (SHA-256): 43:A5:5E:15:9E:11:6F:30:FF:7E:79:29:D2:B8:DA:D7:6C:1C:79:7F:42:14:2E:3B:5A:5E:7C:CF:7B:85:3E:FD Fingerprint (SHA1): 91:A5:B5:22:A9:34:11:B4:88:80:9E:53:18:BD:C7:70:41:86:7E:41 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #3648: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3649: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3650: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3651: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3652: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121286 (0x1e67d546) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:16:07 2017 Not After : Tue May 10 12:16:07 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:73:d9:61:56:31:5d:f8:9b:cd:10:db:71:78:a2:c3: 28:c5:e0:a8:5e:19:b6:5c:d7:c0:a8:2e:d7:b5:2f:56: 9e:61:62:50:58:d5:c3:5e:1f:8c:cf:cc:f8:00:b6:94: ad:15:82:41:b5:9c:da:4e:54:66:ff:e5:76:a1:85:4a: 65:8d:36:d6:08:d8:76:27:00:9b:71:03:b5:6a:98:68: 22:fa:ec:8d:b5:67:a6:dd:9b:4a:5b:89:fc:04:ba:d2: 02:35:d5:6a:4c:9b:e2:fa:2f:0e:65:f1:a9:70:49:fb: 2d:ec:54:c5:9e:2c:a7:24:58:6a:4e:27:17:5c:10:e7: bc:3d:4e:74:f5:b3:d0:da:38:03:26:aa:16:b0:9d:1f: cf:5d:4d:6d:19:1b:3c:0c:dc:f0:89:2e:c7:e7:d4:f1: cd:f5:91:5f:0e:69:5c:65:3a:55:45:4b:90:c7:15:9b: 73:7c:0e:54:22:f8:2a:fd:64:2b:c3:dd:39:d8:9d:ab: a1:c2:38:a6:99:16:b6:0e:58:d1:5a:0f:7f:af:74:37: 48:89:58:58:b9:75:1f:5b:e0:a7:82:1c:38:57:c1:aa: 3e:ba:8b:f7:ee:b9:11:da:18:e7:c7:0d:76:8b:65:79: ef:5d:a8:36:3a:cd:f9:31:6d:b1:b5:35:2f:9b:3f:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:3e:18:ae:24:f3:c0:27:3f:a1:2c:c8:65:b2:b0:3b: 2d:b6:f1:63:b4:ff:d1:53:21:47:f8:fb:f3:76:1d:63: 7c:d8:5c:11:1a:4e:55:3f:62:9d:8f:52:e9:a2:31:48: d5:15:32:c6:cb:03:aa:a0:fb:ca:a0:c3:11:9d:2f:d9: d3:2a:bb:a6:ac:36:0d:e1:f4:f1:22:9b:1f:41:88:69: e6:04:11:0d:48:1b:d1:42:e9:ac:30:b5:54:09:bf:fb: 68:08:de:d8:53:93:67:a2:9c:95:6e:34:f6:96:cf:e9: 00:52:a2:e3:f6:0d:47:a2:4c:9a:f0:39:f8:a8:91:52: 6c:29:eb:98:d3:9b:05:0b:d0:30:cd:b4:73:e4:c9:48: b6:bd:25:3e:d3:0e:ad:12:43:d2:41:92:30:08:be:a1: 14:0f:9f:36:6e:23:aa:3a:09:91:07:ec:07:dc:f4:c6: 78:9e:46:54:4a:fb:76:cd:cb:4e:be:80:97:fd:3c:fb: 73:92:98:3e:06:8f:05:fa:7d:1a:38:98:c4:79:42:51: ab:a7:8e:47:68:d1:df:1d:e8:15:23:e2:44:6e:62:33: 87:17:1f:72:6b:a7:64:e4:58:26:bf:cd:fb:db:46:d1: a5:87:18:c4:b8:e5:cd:a8:a6:98:54:3f:78:92:2f:c1 Fingerprint (SHA-256): 28:71:40:79:EA:EF:A2:C8:58:01:F2:6D:EC:47:D8:74:A9:E3:7D:63:38:33:4A:DC:BD:AA:0C:34:BD:97:AF:5D Fingerprint (SHA1): 66:85:77:F2:55:39:07:6D:2A:4D:AA:C3:35:5F:B1:BC:37:DF:4F:D6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3653: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3654: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121287 (0x1e67d547) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:16:09 2017 Not After : Tue May 10 12:16:09 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:23:35:8c:d1:4f:dd:97:1d:13:66:99:15:e0:34:2a: c8:4a:e8:ae:19:c8:dd:00:3f:d4:68:fe:ee:3d:0a:c4: 0a:d4:80:8b:78:18:3f:b7:a5:7b:75:36:b3:54:ce:4c: 6a:91:bf:20:9c:b5:72:ab:58:8b:83:0d:ba:ea:39:1a: c0:83:4f:f5:a9:fe:c7:43:f2:94:c6:62:f7:57:c3:ad: b6:47:b8:ff:19:1d:64:9e:28:ff:cd:5e:83:b1:23:cd: 3a:39:63:65:12:f7:c4:a5:0b:e1:8d:06:dd:93:80:de: af:01:f6:f6:ee:6c:3c:8e:d2:98:2c:20:06:82:95:4b: 83:de:b2:d0:e6:b9:61:7a:eb:a1:f1:06:68:34:68:93: 1e:98:e4:66:e0:9a:82:e8:b8:5f:77:1f:dc:b2:70:1b: cd:9d:15:a1:f7:a3:e6:d5:16:29:0e:09:15:fb:c5:0d: a7:0c:05:a5:37:d5:cb:e7:9d:3c:bc:2b:6e:38:95:88: d5:8a:eb:af:f1:b1:6e:8b:9d:de:13:cd:fc:bd:d3:e7: af:19:d5:bf:c2:eb:8e:99:d1:6f:41:9c:d2:02:ed:cc: 48:31:d6:ed:2a:b1:ba:71:2f:8a:52:9b:95:da:7b:be: d5:35:49:ce:25:f6:0f:05:d3:db:6c:a4:63:be:b3:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:d3:5b:bd:2f:e6:25:9c:77:52:98:63:ad:1d:fc:f2: 23:20:0c:73:31:81:1a:ed:53:9b:2c:da:ae:5a:6f:3e: 42:e3:4e:5e:99:91:2a:e0:56:64:46:41:9c:59:0f:1b: a8:22:a7:bf:ce:85:be:ed:2b:f7:20:72:ef:d6:6a:d5: 6e:99:08:82:5f:bc:d3:dd:c2:5c:1a:e3:44:37:8b:b4: 53:9b:ff:27:e8:dc:b1:d4:7e:67:80:d4:f8:e0:b6:25: a3:b7:5e:ba:bf:27:04:5c:8c:12:3f:ce:42:29:4f:6d: 3f:f5:f7:7a:63:e2:ec:72:78:61:37:f5:fb:c9:9c:60: 98:41:7e:26:9b:78:4e:c5:96:d5:42:32:e9:3b:24:8f: e7:17:3b:9f:c8:5f:96:74:11:fa:36:74:0c:68:3e:17: 0a:68:d9:db:f7:9f:49:89:eb:1c:51:93:cf:e2:0f:94: c6:17:75:36:d7:9c:cd:61:65:7c:37:7f:03:64:38:d6: b4:a5:dc:ae:ad:d5:fb:4c:44:ed:31:f6:60:f0:00:62: 56:37:63:0e:65:9e:f7:45:1a:b0:02:1b:46:bd:c6:3e: 85:a3:e4:20:bb:39:36:62:c2:ae:f0:79:fb:1e:4a:f5: 2f:f8:cb:d9:8b:70:7a:7a:9a:46:c7:35:e2:87:86:36 Fingerprint (SHA-256): 01:96:E7:C3:02:92:AB:EE:24:F5:AE:CC:2F:31:86:BC:9D:D6:DD:23:F9:24:BE:23:55:61:5B:9F:D4:D9:F0:FC Fingerprint (SHA1): 05:2E:1E:60:60:D5:66:90:0C:C8:FB:16:A2:C0:17:79:A0:AB:E7:D6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3655: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3656: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121288 (0x1e67d548) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:16:10 2017 Not After : Tue May 10 12:16:10 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:e3:35:22:ef:50:dc:bd:87:1d:b8:88:49:ba:fb:dd: c4:07:46:ea:2a:a3:5e:6c:fb:fa:54:21:26:cb:ed:cb: 8a:dc:40:76:5e:1a:20:01:5f:4e:a9:75:d1:0b:a0:14: 80:4b:16:1a:db:2a:04:dd:b5:27:58:c3:8b:b8:62:5f: 94:38:79:c9:b5:7a:f0:71:20:6d:7d:b9:75:03:49:2a: 53:2d:55:15:43:1d:d6:4d:8e:c8:63:19:08:d1:3c:df: 38:3d:68:e9:eb:b4:df:e9:52:8e:8f:99:50:37:82:85: a9:98:15:0a:9a:e2:f4:a1:8a:11:08:e6:e6:97:19:13: b1:e0:33:55:86:d1:3a:66:4c:68:c2:11:5a:af:21:fc: ee:5b:4c:03:a9:8b:0f:01:98:9a:5d:6d:81:ea:e0:06: 2d:bf:85:06:4c:b0:00:e6:e7:fb:7a:e7:24:ed:0f:1f: af:3a:0e:73:b6:0a:55:b8:4e:63:7c:63:82:ce:22:62: cc:29:9e:24:86:34:6f:1a:25:b8:17:13:05:87:c1:13: 01:93:48:79:3a:8b:e4:50:be:cd:ed:ca:db:73:fb:b1: 95:78:13:4c:d5:6b:d7:95:b3:ba:8d:7a:28:ef:f9:06: 7f:3b:81:5d:a1:82:a2:b3:02:e5:29:3d:a0:4b:fa:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:c5:aa:71:c7:0f:73:7c:dd:b4:c7:0c:e1:65:36:11: ae:43:af:40:8b:4a:6c:40:76:2b:00:06:ad:4b:69:7b: 11:d6:08:83:c6:11:9d:87:fa:ad:4b:5a:e4:ad:c2:a1: 64:2d:42:9c:3c:d5:2d:c4:46:47:4d:0a:13:a3:7a:ea: 2f:cc:1b:e9:71:2a:25:73:89:61:db:e9:a2:83:27:17: 99:ae:7f:f9:c1:5c:22:f0:90:01:54:55:6b:5f:b7:90: 66:ba:16:77:45:50:00:c6:17:37:45:f8:98:79:45:32: 74:99:21:a5:dd:c2:aa:78:76:3e:4a:b3:c8:d3:f2:a3: 83:e2:d3:69:ae:bf:a8:ed:6e:fc:6e:b2:4b:99:99:8c: bb:73:65:4f:f7:57:cc:74:c0:e4:c8:5a:8d:b7:a6:cd: 87:7e:6a:c2:ec:3f:8a:e7:1b:6e:2f:21:99:53:3a:d6: cd:6b:18:a4:a6:25:9e:db:ad:65:69:9e:98:71:bb:08: ca:57:98:f0:2d:d7:ae:c8:69:81:48:8b:6f:09:1d:db: fc:ff:2b:85:0c:4e:d4:88:c8:06:cf:84:b2:ea:2c:4b: 7e:87:06:16:89:3d:f3:93:ea:17:22:51:bc:00:cf:b9: 81:d9:41:13:0c:40:27:30:f7:e0:f2:a1:bf:94:19:bc Fingerprint (SHA-256): 43:A5:5E:15:9E:11:6F:30:FF:7E:79:29:D2:B8:DA:D7:6C:1C:79:7F:42:14:2E:3B:5A:5E:7C:CF:7B:85:3E:FD Fingerprint (SHA1): 91:A5:B5:22:A9:34:11:B4:88:80:9E:53:18:BD:C7:70:41:86:7E:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #3657: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3658: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121286 (0x1e67d546) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:16:07 2017 Not After : Tue May 10 12:16:07 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:73:d9:61:56:31:5d:f8:9b:cd:10:db:71:78:a2:c3: 28:c5:e0:a8:5e:19:b6:5c:d7:c0:a8:2e:d7:b5:2f:56: 9e:61:62:50:58:d5:c3:5e:1f:8c:cf:cc:f8:00:b6:94: ad:15:82:41:b5:9c:da:4e:54:66:ff:e5:76:a1:85:4a: 65:8d:36:d6:08:d8:76:27:00:9b:71:03:b5:6a:98:68: 22:fa:ec:8d:b5:67:a6:dd:9b:4a:5b:89:fc:04:ba:d2: 02:35:d5:6a:4c:9b:e2:fa:2f:0e:65:f1:a9:70:49:fb: 2d:ec:54:c5:9e:2c:a7:24:58:6a:4e:27:17:5c:10:e7: bc:3d:4e:74:f5:b3:d0:da:38:03:26:aa:16:b0:9d:1f: cf:5d:4d:6d:19:1b:3c:0c:dc:f0:89:2e:c7:e7:d4:f1: cd:f5:91:5f:0e:69:5c:65:3a:55:45:4b:90:c7:15:9b: 73:7c:0e:54:22:f8:2a:fd:64:2b:c3:dd:39:d8:9d:ab: a1:c2:38:a6:99:16:b6:0e:58:d1:5a:0f:7f:af:74:37: 48:89:58:58:b9:75:1f:5b:e0:a7:82:1c:38:57:c1:aa: 3e:ba:8b:f7:ee:b9:11:da:18:e7:c7:0d:76:8b:65:79: ef:5d:a8:36:3a:cd:f9:31:6d:b1:b5:35:2f:9b:3f:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:3e:18:ae:24:f3:c0:27:3f:a1:2c:c8:65:b2:b0:3b: 2d:b6:f1:63:b4:ff:d1:53:21:47:f8:fb:f3:76:1d:63: 7c:d8:5c:11:1a:4e:55:3f:62:9d:8f:52:e9:a2:31:48: d5:15:32:c6:cb:03:aa:a0:fb:ca:a0:c3:11:9d:2f:d9: d3:2a:bb:a6:ac:36:0d:e1:f4:f1:22:9b:1f:41:88:69: e6:04:11:0d:48:1b:d1:42:e9:ac:30:b5:54:09:bf:fb: 68:08:de:d8:53:93:67:a2:9c:95:6e:34:f6:96:cf:e9: 00:52:a2:e3:f6:0d:47:a2:4c:9a:f0:39:f8:a8:91:52: 6c:29:eb:98:d3:9b:05:0b:d0:30:cd:b4:73:e4:c9:48: b6:bd:25:3e:d3:0e:ad:12:43:d2:41:92:30:08:be:a1: 14:0f:9f:36:6e:23:aa:3a:09:91:07:ec:07:dc:f4:c6: 78:9e:46:54:4a:fb:76:cd:cb:4e:be:80:97:fd:3c:fb: 73:92:98:3e:06:8f:05:fa:7d:1a:38:98:c4:79:42:51: ab:a7:8e:47:68:d1:df:1d:e8:15:23:e2:44:6e:62:33: 87:17:1f:72:6b:a7:64:e4:58:26:bf:cd:fb:db:46:d1: a5:87:18:c4:b8:e5:cd:a8:a6:98:54:3f:78:92:2f:c1 Fingerprint (SHA-256): 28:71:40:79:EA:EF:A2:C8:58:01:F2:6D:EC:47:D8:74:A9:E3:7D:63:38:33:4A:DC:BD:AA:0C:34:BD:97:AF:5D Fingerprint (SHA1): 66:85:77:F2:55:39:07:6D:2A:4D:AA:C3:35:5F:B1:BC:37:DF:4F:D6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3659: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121286 (0x1e67d546) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:16:07 2017 Not After : Tue May 10 12:16:07 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:73:d9:61:56:31:5d:f8:9b:cd:10:db:71:78:a2:c3: 28:c5:e0:a8:5e:19:b6:5c:d7:c0:a8:2e:d7:b5:2f:56: 9e:61:62:50:58:d5:c3:5e:1f:8c:cf:cc:f8:00:b6:94: ad:15:82:41:b5:9c:da:4e:54:66:ff:e5:76:a1:85:4a: 65:8d:36:d6:08:d8:76:27:00:9b:71:03:b5:6a:98:68: 22:fa:ec:8d:b5:67:a6:dd:9b:4a:5b:89:fc:04:ba:d2: 02:35:d5:6a:4c:9b:e2:fa:2f:0e:65:f1:a9:70:49:fb: 2d:ec:54:c5:9e:2c:a7:24:58:6a:4e:27:17:5c:10:e7: bc:3d:4e:74:f5:b3:d0:da:38:03:26:aa:16:b0:9d:1f: cf:5d:4d:6d:19:1b:3c:0c:dc:f0:89:2e:c7:e7:d4:f1: cd:f5:91:5f:0e:69:5c:65:3a:55:45:4b:90:c7:15:9b: 73:7c:0e:54:22:f8:2a:fd:64:2b:c3:dd:39:d8:9d:ab: a1:c2:38:a6:99:16:b6:0e:58:d1:5a:0f:7f:af:74:37: 48:89:58:58:b9:75:1f:5b:e0:a7:82:1c:38:57:c1:aa: 3e:ba:8b:f7:ee:b9:11:da:18:e7:c7:0d:76:8b:65:79: ef:5d:a8:36:3a:cd:f9:31:6d:b1:b5:35:2f:9b:3f:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:3e:18:ae:24:f3:c0:27:3f:a1:2c:c8:65:b2:b0:3b: 2d:b6:f1:63:b4:ff:d1:53:21:47:f8:fb:f3:76:1d:63: 7c:d8:5c:11:1a:4e:55:3f:62:9d:8f:52:e9:a2:31:48: d5:15:32:c6:cb:03:aa:a0:fb:ca:a0:c3:11:9d:2f:d9: d3:2a:bb:a6:ac:36:0d:e1:f4:f1:22:9b:1f:41:88:69: e6:04:11:0d:48:1b:d1:42:e9:ac:30:b5:54:09:bf:fb: 68:08:de:d8:53:93:67:a2:9c:95:6e:34:f6:96:cf:e9: 00:52:a2:e3:f6:0d:47:a2:4c:9a:f0:39:f8:a8:91:52: 6c:29:eb:98:d3:9b:05:0b:d0:30:cd:b4:73:e4:c9:48: b6:bd:25:3e:d3:0e:ad:12:43:d2:41:92:30:08:be:a1: 14:0f:9f:36:6e:23:aa:3a:09:91:07:ec:07:dc:f4:c6: 78:9e:46:54:4a:fb:76:cd:cb:4e:be:80:97:fd:3c:fb: 73:92:98:3e:06:8f:05:fa:7d:1a:38:98:c4:79:42:51: ab:a7:8e:47:68:d1:df:1d:e8:15:23:e2:44:6e:62:33: 87:17:1f:72:6b:a7:64:e4:58:26:bf:cd:fb:db:46:d1: a5:87:18:c4:b8:e5:cd:a8:a6:98:54:3f:78:92:2f:c1 Fingerprint (SHA-256): 28:71:40:79:EA:EF:A2:C8:58:01:F2:6D:EC:47:D8:74:A9:E3:7D:63:38:33:4A:DC:BD:AA:0C:34:BD:97:AF:5D Fingerprint (SHA1): 66:85:77:F2:55:39:07:6D:2A:4D:AA:C3:35:5F:B1:BC:37:DF:4F:D6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3660: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121287 (0x1e67d547) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:16:09 2017 Not After : Tue May 10 12:16:09 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:23:35:8c:d1:4f:dd:97:1d:13:66:99:15:e0:34:2a: c8:4a:e8:ae:19:c8:dd:00:3f:d4:68:fe:ee:3d:0a:c4: 0a:d4:80:8b:78:18:3f:b7:a5:7b:75:36:b3:54:ce:4c: 6a:91:bf:20:9c:b5:72:ab:58:8b:83:0d:ba:ea:39:1a: c0:83:4f:f5:a9:fe:c7:43:f2:94:c6:62:f7:57:c3:ad: b6:47:b8:ff:19:1d:64:9e:28:ff:cd:5e:83:b1:23:cd: 3a:39:63:65:12:f7:c4:a5:0b:e1:8d:06:dd:93:80:de: af:01:f6:f6:ee:6c:3c:8e:d2:98:2c:20:06:82:95:4b: 83:de:b2:d0:e6:b9:61:7a:eb:a1:f1:06:68:34:68:93: 1e:98:e4:66:e0:9a:82:e8:b8:5f:77:1f:dc:b2:70:1b: cd:9d:15:a1:f7:a3:e6:d5:16:29:0e:09:15:fb:c5:0d: a7:0c:05:a5:37:d5:cb:e7:9d:3c:bc:2b:6e:38:95:88: d5:8a:eb:af:f1:b1:6e:8b:9d:de:13:cd:fc:bd:d3:e7: af:19:d5:bf:c2:eb:8e:99:d1:6f:41:9c:d2:02:ed:cc: 48:31:d6:ed:2a:b1:ba:71:2f:8a:52:9b:95:da:7b:be: d5:35:49:ce:25:f6:0f:05:d3:db:6c:a4:63:be:b3:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:d3:5b:bd:2f:e6:25:9c:77:52:98:63:ad:1d:fc:f2: 23:20:0c:73:31:81:1a:ed:53:9b:2c:da:ae:5a:6f:3e: 42:e3:4e:5e:99:91:2a:e0:56:64:46:41:9c:59:0f:1b: a8:22:a7:bf:ce:85:be:ed:2b:f7:20:72:ef:d6:6a:d5: 6e:99:08:82:5f:bc:d3:dd:c2:5c:1a:e3:44:37:8b:b4: 53:9b:ff:27:e8:dc:b1:d4:7e:67:80:d4:f8:e0:b6:25: a3:b7:5e:ba:bf:27:04:5c:8c:12:3f:ce:42:29:4f:6d: 3f:f5:f7:7a:63:e2:ec:72:78:61:37:f5:fb:c9:9c:60: 98:41:7e:26:9b:78:4e:c5:96:d5:42:32:e9:3b:24:8f: e7:17:3b:9f:c8:5f:96:74:11:fa:36:74:0c:68:3e:17: 0a:68:d9:db:f7:9f:49:89:eb:1c:51:93:cf:e2:0f:94: c6:17:75:36:d7:9c:cd:61:65:7c:37:7f:03:64:38:d6: b4:a5:dc:ae:ad:d5:fb:4c:44:ed:31:f6:60:f0:00:62: 56:37:63:0e:65:9e:f7:45:1a:b0:02:1b:46:bd:c6:3e: 85:a3:e4:20:bb:39:36:62:c2:ae:f0:79:fb:1e:4a:f5: 2f:f8:cb:d9:8b:70:7a:7a:9a:46:c7:35:e2:87:86:36 Fingerprint (SHA-256): 01:96:E7:C3:02:92:AB:EE:24:F5:AE:CC:2F:31:86:BC:9D:D6:DD:23:F9:24:BE:23:55:61:5B:9F:D4:D9:F0:FC Fingerprint (SHA1): 05:2E:1E:60:60:D5:66:90:0C:C8:FB:16:A2:C0:17:79:A0:AB:E7:D6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3661: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121287 (0x1e67d547) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:16:09 2017 Not After : Tue May 10 12:16:09 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:23:35:8c:d1:4f:dd:97:1d:13:66:99:15:e0:34:2a: c8:4a:e8:ae:19:c8:dd:00:3f:d4:68:fe:ee:3d:0a:c4: 0a:d4:80:8b:78:18:3f:b7:a5:7b:75:36:b3:54:ce:4c: 6a:91:bf:20:9c:b5:72:ab:58:8b:83:0d:ba:ea:39:1a: c0:83:4f:f5:a9:fe:c7:43:f2:94:c6:62:f7:57:c3:ad: b6:47:b8:ff:19:1d:64:9e:28:ff:cd:5e:83:b1:23:cd: 3a:39:63:65:12:f7:c4:a5:0b:e1:8d:06:dd:93:80:de: af:01:f6:f6:ee:6c:3c:8e:d2:98:2c:20:06:82:95:4b: 83:de:b2:d0:e6:b9:61:7a:eb:a1:f1:06:68:34:68:93: 1e:98:e4:66:e0:9a:82:e8:b8:5f:77:1f:dc:b2:70:1b: cd:9d:15:a1:f7:a3:e6:d5:16:29:0e:09:15:fb:c5:0d: a7:0c:05:a5:37:d5:cb:e7:9d:3c:bc:2b:6e:38:95:88: d5:8a:eb:af:f1:b1:6e:8b:9d:de:13:cd:fc:bd:d3:e7: af:19:d5:bf:c2:eb:8e:99:d1:6f:41:9c:d2:02:ed:cc: 48:31:d6:ed:2a:b1:ba:71:2f:8a:52:9b:95:da:7b:be: d5:35:49:ce:25:f6:0f:05:d3:db:6c:a4:63:be:b3:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:d3:5b:bd:2f:e6:25:9c:77:52:98:63:ad:1d:fc:f2: 23:20:0c:73:31:81:1a:ed:53:9b:2c:da:ae:5a:6f:3e: 42:e3:4e:5e:99:91:2a:e0:56:64:46:41:9c:59:0f:1b: a8:22:a7:bf:ce:85:be:ed:2b:f7:20:72:ef:d6:6a:d5: 6e:99:08:82:5f:bc:d3:dd:c2:5c:1a:e3:44:37:8b:b4: 53:9b:ff:27:e8:dc:b1:d4:7e:67:80:d4:f8:e0:b6:25: a3:b7:5e:ba:bf:27:04:5c:8c:12:3f:ce:42:29:4f:6d: 3f:f5:f7:7a:63:e2:ec:72:78:61:37:f5:fb:c9:9c:60: 98:41:7e:26:9b:78:4e:c5:96:d5:42:32:e9:3b:24:8f: e7:17:3b:9f:c8:5f:96:74:11:fa:36:74:0c:68:3e:17: 0a:68:d9:db:f7:9f:49:89:eb:1c:51:93:cf:e2:0f:94: c6:17:75:36:d7:9c:cd:61:65:7c:37:7f:03:64:38:d6: b4:a5:dc:ae:ad:d5:fb:4c:44:ed:31:f6:60:f0:00:62: 56:37:63:0e:65:9e:f7:45:1a:b0:02:1b:46:bd:c6:3e: 85:a3:e4:20:bb:39:36:62:c2:ae:f0:79:fb:1e:4a:f5: 2f:f8:cb:d9:8b:70:7a:7a:9a:46:c7:35:e2:87:86:36 Fingerprint (SHA-256): 01:96:E7:C3:02:92:AB:EE:24:F5:AE:CC:2F:31:86:BC:9D:D6:DD:23:F9:24:BE:23:55:61:5B:9F:D4:D9:F0:FC Fingerprint (SHA1): 05:2E:1E:60:60:D5:66:90:0C:C8:FB:16:A2:C0:17:79:A0:AB:E7:D6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3662: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121288 (0x1e67d548) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:16:10 2017 Not After : Tue May 10 12:16:10 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:e3:35:22:ef:50:dc:bd:87:1d:b8:88:49:ba:fb:dd: c4:07:46:ea:2a:a3:5e:6c:fb:fa:54:21:26:cb:ed:cb: 8a:dc:40:76:5e:1a:20:01:5f:4e:a9:75:d1:0b:a0:14: 80:4b:16:1a:db:2a:04:dd:b5:27:58:c3:8b:b8:62:5f: 94:38:79:c9:b5:7a:f0:71:20:6d:7d:b9:75:03:49:2a: 53:2d:55:15:43:1d:d6:4d:8e:c8:63:19:08:d1:3c:df: 38:3d:68:e9:eb:b4:df:e9:52:8e:8f:99:50:37:82:85: a9:98:15:0a:9a:e2:f4:a1:8a:11:08:e6:e6:97:19:13: b1:e0:33:55:86:d1:3a:66:4c:68:c2:11:5a:af:21:fc: ee:5b:4c:03:a9:8b:0f:01:98:9a:5d:6d:81:ea:e0:06: 2d:bf:85:06:4c:b0:00:e6:e7:fb:7a:e7:24:ed:0f:1f: af:3a:0e:73:b6:0a:55:b8:4e:63:7c:63:82:ce:22:62: cc:29:9e:24:86:34:6f:1a:25:b8:17:13:05:87:c1:13: 01:93:48:79:3a:8b:e4:50:be:cd:ed:ca:db:73:fb:b1: 95:78:13:4c:d5:6b:d7:95:b3:ba:8d:7a:28:ef:f9:06: 7f:3b:81:5d:a1:82:a2:b3:02:e5:29:3d:a0:4b:fa:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:c5:aa:71:c7:0f:73:7c:dd:b4:c7:0c:e1:65:36:11: ae:43:af:40:8b:4a:6c:40:76:2b:00:06:ad:4b:69:7b: 11:d6:08:83:c6:11:9d:87:fa:ad:4b:5a:e4:ad:c2:a1: 64:2d:42:9c:3c:d5:2d:c4:46:47:4d:0a:13:a3:7a:ea: 2f:cc:1b:e9:71:2a:25:73:89:61:db:e9:a2:83:27:17: 99:ae:7f:f9:c1:5c:22:f0:90:01:54:55:6b:5f:b7:90: 66:ba:16:77:45:50:00:c6:17:37:45:f8:98:79:45:32: 74:99:21:a5:dd:c2:aa:78:76:3e:4a:b3:c8:d3:f2:a3: 83:e2:d3:69:ae:bf:a8:ed:6e:fc:6e:b2:4b:99:99:8c: bb:73:65:4f:f7:57:cc:74:c0:e4:c8:5a:8d:b7:a6:cd: 87:7e:6a:c2:ec:3f:8a:e7:1b:6e:2f:21:99:53:3a:d6: cd:6b:18:a4:a6:25:9e:db:ad:65:69:9e:98:71:bb:08: ca:57:98:f0:2d:d7:ae:c8:69:81:48:8b:6f:09:1d:db: fc:ff:2b:85:0c:4e:d4:88:c8:06:cf:84:b2:ea:2c:4b: 7e:87:06:16:89:3d:f3:93:ea:17:22:51:bc:00:cf:b9: 81:d9:41:13:0c:40:27:30:f7:e0:f2:a1:bf:94:19:bc Fingerprint (SHA-256): 43:A5:5E:15:9E:11:6F:30:FF:7E:79:29:D2:B8:DA:D7:6C:1C:79:7F:42:14:2E:3B:5A:5E:7C:CF:7B:85:3E:FD Fingerprint (SHA1): 91:A5:B5:22:A9:34:11:B4:88:80:9E:53:18:BD:C7:70:41:86:7E:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #3663: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121288 (0x1e67d548) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:16:10 2017 Not After : Tue May 10 12:16:10 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:e3:35:22:ef:50:dc:bd:87:1d:b8:88:49:ba:fb:dd: c4:07:46:ea:2a:a3:5e:6c:fb:fa:54:21:26:cb:ed:cb: 8a:dc:40:76:5e:1a:20:01:5f:4e:a9:75:d1:0b:a0:14: 80:4b:16:1a:db:2a:04:dd:b5:27:58:c3:8b:b8:62:5f: 94:38:79:c9:b5:7a:f0:71:20:6d:7d:b9:75:03:49:2a: 53:2d:55:15:43:1d:d6:4d:8e:c8:63:19:08:d1:3c:df: 38:3d:68:e9:eb:b4:df:e9:52:8e:8f:99:50:37:82:85: a9:98:15:0a:9a:e2:f4:a1:8a:11:08:e6:e6:97:19:13: b1:e0:33:55:86:d1:3a:66:4c:68:c2:11:5a:af:21:fc: ee:5b:4c:03:a9:8b:0f:01:98:9a:5d:6d:81:ea:e0:06: 2d:bf:85:06:4c:b0:00:e6:e7:fb:7a:e7:24:ed:0f:1f: af:3a:0e:73:b6:0a:55:b8:4e:63:7c:63:82:ce:22:62: cc:29:9e:24:86:34:6f:1a:25:b8:17:13:05:87:c1:13: 01:93:48:79:3a:8b:e4:50:be:cd:ed:ca:db:73:fb:b1: 95:78:13:4c:d5:6b:d7:95:b3:ba:8d:7a:28:ef:f9:06: 7f:3b:81:5d:a1:82:a2:b3:02:e5:29:3d:a0:4b:fa:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:c5:aa:71:c7:0f:73:7c:dd:b4:c7:0c:e1:65:36:11: ae:43:af:40:8b:4a:6c:40:76:2b:00:06:ad:4b:69:7b: 11:d6:08:83:c6:11:9d:87:fa:ad:4b:5a:e4:ad:c2:a1: 64:2d:42:9c:3c:d5:2d:c4:46:47:4d:0a:13:a3:7a:ea: 2f:cc:1b:e9:71:2a:25:73:89:61:db:e9:a2:83:27:17: 99:ae:7f:f9:c1:5c:22:f0:90:01:54:55:6b:5f:b7:90: 66:ba:16:77:45:50:00:c6:17:37:45:f8:98:79:45:32: 74:99:21:a5:dd:c2:aa:78:76:3e:4a:b3:c8:d3:f2:a3: 83:e2:d3:69:ae:bf:a8:ed:6e:fc:6e:b2:4b:99:99:8c: bb:73:65:4f:f7:57:cc:74:c0:e4:c8:5a:8d:b7:a6:cd: 87:7e:6a:c2:ec:3f:8a:e7:1b:6e:2f:21:99:53:3a:d6: cd:6b:18:a4:a6:25:9e:db:ad:65:69:9e:98:71:bb:08: ca:57:98:f0:2d:d7:ae:c8:69:81:48:8b:6f:09:1d:db: fc:ff:2b:85:0c:4e:d4:88:c8:06:cf:84:b2:ea:2c:4b: 7e:87:06:16:89:3d:f3:93:ea:17:22:51:bc:00:cf:b9: 81:d9:41:13:0c:40:27:30:f7:e0:f2:a1:bf:94:19:bc Fingerprint (SHA-256): 43:A5:5E:15:9E:11:6F:30:FF:7E:79:29:D2:B8:DA:D7:6C:1C:79:7F:42:14:2E:3B:5A:5E:7C:CF:7B:85:3E:FD Fingerprint (SHA1): 91:A5:B5:22:A9:34:11:B4:88:80:9E:53:18:BD:C7:70:41:86:7E:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #3664: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #3665: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121291 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3666: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #3667: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3668: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3669: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 510121292 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3670: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3671: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3672: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3673: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510121293 --extCP --extIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3674: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3675: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #3676: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3677: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 510121294 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3678: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3679: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #3680: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3681: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 510121295 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3682: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3683: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #3684: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3685: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 510121296 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3686: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3687: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #3688: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3689: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 510121297 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3690: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3691: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3692: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #3693: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #3694: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3695: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #3696: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121291 (0x1e67d54b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:16:16 2017 Not After : Tue May 10 12:16:16 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:9e:ff:9f:15:59:5b:55:c0:38:b5:19:f4:67:75:8d: ee:02:d5:7c:0c:e7:f8:4f:16:86:03:c0:51:6b:54:1a: 43:22:a3:13:2d:a9:f7:e3:b9:68:f1:c5:d9:fd:2c:79: 96:c6:dc:ed:bd:72:ca:d0:82:32:7a:66:70:92:30:62: 19:4e:a1:80:a4:60:3f:bf:dd:3b:5d:b8:0e:8c:cd:d7: 33:eb:a7:2d:d3:8a:cf:dc:d9:15:1d:82:19:b0:0a:b2: 31:a3:5e:8f:ec:f9:e6:c3:ac:6a:e0:aa:41:16:27:9a: 3a:8e:36:4e:5f:ba:f7:c3:de:b5:3c:77:5e:08:6b:a9: 91:f3:0c:bb:4d:5e:8f:03:8a:2d:2d:46:e7:f5:dc:e1: 1a:2a:65:f8:9e:ca:25:d2:59:f8:2c:72:5e:00:cf:34: bd:d0:cf:1c:31:40:ad:c8:56:fb:40:3a:6a:4c:2a:d6: 4a:11:99:d0:30:71:c7:bb:46:8c:8d:9f:59:8d:fa:5e: 96:25:3a:be:6f:74:2c:28:79:e0:c2:b9:5c:30:37:22: 5e:1a:32:2c:30:1a:70:6b:1e:98:3d:20:28:d6:97:a5: 17:1c:9f:07:ac:11:76:3d:c8:9a:18:f7:fc:69:30:35: cc:ab:bd:98:74:45:e0:ec:59:58:e1:cd:3b:cb:f2:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:ec:2c:aa:27:76:6e:61:72:62:20:b9:d7:b9:b6:a2: 28:f5:5f:cf:82:90:d1:93:4b:e5:a9:5f:98:a4:55:14: ac:a1:e3:4b:b9:2f:b1:b0:cd:b8:92:ef:cc:57:60:99: e6:33:57:b6:a7:a8:96:0a:82:d1:fa:9b:fb:10:03:0e: 5f:93:e2:14:03:1b:96:c9:a7:e8:9a:3a:ee:ad:9d:c7: 1f:c5:18:b5:ef:fd:60:7b:e5:bd:a9:51:72:d1:c6:1b: 4e:a6:d2:8c:ae:92:60:b5:ae:a9:6f:dc:31:92:c7:75: 76:70:03:66:0e:6d:02:17:be:31:01:01:c4:83:11:30: 98:dd:0f:8c:d5:7f:0b:10:f0:0b:a2:6b:8e:22:5b:8a: 4a:d4:f2:a9:b2:0e:ed:bc:57:20:1b:23:f2:62:2e:75: 5c:6e:38:65:5f:17:df:bd:66:20:91:c8:f9:58:ec:74: 9e:9c:f4:62:3c:7a:ce:a8:8b:6a:8a:27:af:97:bd:5f: fc:ca:d0:63:2a:8c:9e:ed:50:05:ab:22:e5:dd:8a:3c: 2a:10:6c:80:c3:0a:b6:8a:c3:14:4c:64:53:6f:e9:cd: 2d:70:6a:f7:3d:b3:9b:56:f6:9c:1a:0e:08:2a:bb:58: 7c:de:42:f4:09:c2:8e:7a:0c:e6:1c:39:5c:54:fb:b4 Fingerprint (SHA-256): 66:91:EB:9C:64:9E:A8:48:8A:19:65:84:B4:9B:DA:42:32:54:E3:92:8D:E4:79:6E:7D:6A:15:C4:26:70:1C:4B Fingerprint (SHA1): 90:DB:84:1F:0E:5D:0C:94:DB:17:73:CC:69:99:FF:F8:92:BA:6E:AE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3697: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3698: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3699: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3700: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121291 (0x1e67d54b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:16:16 2017 Not After : Tue May 10 12:16:16 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:9e:ff:9f:15:59:5b:55:c0:38:b5:19:f4:67:75:8d: ee:02:d5:7c:0c:e7:f8:4f:16:86:03:c0:51:6b:54:1a: 43:22:a3:13:2d:a9:f7:e3:b9:68:f1:c5:d9:fd:2c:79: 96:c6:dc:ed:bd:72:ca:d0:82:32:7a:66:70:92:30:62: 19:4e:a1:80:a4:60:3f:bf:dd:3b:5d:b8:0e:8c:cd:d7: 33:eb:a7:2d:d3:8a:cf:dc:d9:15:1d:82:19:b0:0a:b2: 31:a3:5e:8f:ec:f9:e6:c3:ac:6a:e0:aa:41:16:27:9a: 3a:8e:36:4e:5f:ba:f7:c3:de:b5:3c:77:5e:08:6b:a9: 91:f3:0c:bb:4d:5e:8f:03:8a:2d:2d:46:e7:f5:dc:e1: 1a:2a:65:f8:9e:ca:25:d2:59:f8:2c:72:5e:00:cf:34: bd:d0:cf:1c:31:40:ad:c8:56:fb:40:3a:6a:4c:2a:d6: 4a:11:99:d0:30:71:c7:bb:46:8c:8d:9f:59:8d:fa:5e: 96:25:3a:be:6f:74:2c:28:79:e0:c2:b9:5c:30:37:22: 5e:1a:32:2c:30:1a:70:6b:1e:98:3d:20:28:d6:97:a5: 17:1c:9f:07:ac:11:76:3d:c8:9a:18:f7:fc:69:30:35: cc:ab:bd:98:74:45:e0:ec:59:58:e1:cd:3b:cb:f2:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:ec:2c:aa:27:76:6e:61:72:62:20:b9:d7:b9:b6:a2: 28:f5:5f:cf:82:90:d1:93:4b:e5:a9:5f:98:a4:55:14: ac:a1:e3:4b:b9:2f:b1:b0:cd:b8:92:ef:cc:57:60:99: e6:33:57:b6:a7:a8:96:0a:82:d1:fa:9b:fb:10:03:0e: 5f:93:e2:14:03:1b:96:c9:a7:e8:9a:3a:ee:ad:9d:c7: 1f:c5:18:b5:ef:fd:60:7b:e5:bd:a9:51:72:d1:c6:1b: 4e:a6:d2:8c:ae:92:60:b5:ae:a9:6f:dc:31:92:c7:75: 76:70:03:66:0e:6d:02:17:be:31:01:01:c4:83:11:30: 98:dd:0f:8c:d5:7f:0b:10:f0:0b:a2:6b:8e:22:5b:8a: 4a:d4:f2:a9:b2:0e:ed:bc:57:20:1b:23:f2:62:2e:75: 5c:6e:38:65:5f:17:df:bd:66:20:91:c8:f9:58:ec:74: 9e:9c:f4:62:3c:7a:ce:a8:8b:6a:8a:27:af:97:bd:5f: fc:ca:d0:63:2a:8c:9e:ed:50:05:ab:22:e5:dd:8a:3c: 2a:10:6c:80:c3:0a:b6:8a:c3:14:4c:64:53:6f:e9:cd: 2d:70:6a:f7:3d:b3:9b:56:f6:9c:1a:0e:08:2a:bb:58: 7c:de:42:f4:09:c2:8e:7a:0c:e6:1c:39:5c:54:fb:b4 Fingerprint (SHA-256): 66:91:EB:9C:64:9E:A8:48:8A:19:65:84:B4:9B:DA:42:32:54:E3:92:8D:E4:79:6E:7D:6A:15:C4:26:70:1C:4B Fingerprint (SHA1): 90:DB:84:1F:0E:5D:0C:94:DB:17:73:CC:69:99:FF:F8:92:BA:6E:AE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3701: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3702: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #3703: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121298 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3704: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #3705: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3706: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3707: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 510121299 --extCP --extIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3708: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3709: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #3710: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3711: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 510121300 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3712: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3713: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #3714: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3715: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 510121301 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3716: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3717: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3718: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3719: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 510121302 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3720: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3721: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #3722: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3723: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 510121303 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3724: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3725: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #3726: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3727: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 510121304 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3728: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3729: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3730: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3731: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 510121305 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3732: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3733: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #3734: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3735: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 510121306 --extCP --extIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3736: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3737: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #3738: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3739: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 510121307 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3740: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3741: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #3742: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3743: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 510121308 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3744: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3745: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #3746: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3747: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 510121309 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3748: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3749: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #3750: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3751: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 510121310 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3752: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3753: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #3754: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3755: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 510121311 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3756: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3757: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #3758: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3759: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 510121312 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3760: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3761: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #3762: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3763: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 510121313 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3764: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3765: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #3766: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3767: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 510121314 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3768: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3769: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #3770: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3771: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 510121315 --extCP --extIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3772: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3773: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #3774: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3775: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 510121316 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3776: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3777: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #3778: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3779: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 510121317 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3780: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3781: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #3782: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3783: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 510121318 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3784: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3785: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #3786: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3787: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 510121319 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3788: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3789: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #3790: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3791: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 510121320 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3792: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3793: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #3794: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3795: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 510121321 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3796: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3797: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #3798: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3799: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 510121322 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3800: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3801: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #3802: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3803: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 510121323 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3804: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3805: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #3806: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3807: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 510121324 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3808: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3809: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #3810: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3811: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 510121325 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3812: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3813: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #3814: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3815: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 510121326 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3816: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3817: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #3818: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3819: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 510121327 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3820: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3821: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3822: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121298 (0x1e67d552) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:16:27 2017 Not After : Tue May 10 12:16:27 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:15:1a:19:73:ad:af:c6:8b:f3:b6:f1:cb:bf:51:82: ba:03:0f:c8:d0:0d:a8:23:c9:35:81:e5:9e:2c:c0:08: 12:f1:1c:3b:87:bf:d1:b6:12:77:cd:da:5a:80:82:22: fd:83:e6:96:5c:f6:aa:06:94:88:60:2d:d0:d9:6d:0f: a9:fe:f5:5c:df:de:88:99:c4:9a:62:3c:ee:96:f7:22: a2:b6:bf:f9:7f:96:b6:a9:b1:37:cb:f9:53:92:6e:8b: 94:27:0d:50:93:ad:a9:5c:a0:2a:f6:5d:68:db:3d:3a: 70:ce:d0:54:b8:7c:2d:18:22:f0:23:a2:0b:66:a4:40: f5:a0:0b:94:f8:77:69:7e:49:7f:c5:b6:4f:2d:35:bd: bf:55:ae:1d:9d:fd:ea:8e:4d:37:dc:58:54:c5:d7:4f: d2:47:c5:35:7c:18:4e:42:ff:45:cf:fa:5f:70:7d:d8: 50:02:62:76:f6:45:3b:a1:9b:3e:71:5d:6c:d7:1c:ee: 15:8e:7d:39:ec:e1:7e:2c:99:46:04:d0:bf:b7:1c:86: ae:6b:01:0b:07:94:c4:d0:80:99:82:a9:42:89:92:3a: e7:87:8d:16:04:5c:5d:6d:cf:f8:ad:31:9a:bf:2c:64: f4:19:15:4b:fc:e4:19:2a:00:35:fb:ed:19:11:31:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:15:ae:4f:a4:2c:71:77:45:a0:bb:e0:75:6b:53:4f: 29:c4:c2:58:79:11:ff:93:93:4b:9d:75:b8:df:8f:60: 96:d3:41:31:56:bb:fc:dd:25:e9:62:9e:0e:14:d3:cc: 4c:94:50:a3:d3:42:25:21:28:2b:b1:57:8e:79:67:85: 36:1c:6f:0c:0c:7d:8d:33:72:5a:4f:e4:94:6b:d0:43: 47:d8:94:26:68:35:39:21:aa:e2:bf:b2:8d:75:1a:68: 64:31:7a:0d:0d:79:cc:8d:d3:46:1e:89:b1:42:e0:46: 91:6d:43:58:e1:94:de:df:52:c1:97:f8:5f:76:c1:90: 44:fe:85:3d:cd:bf:f8:ed:9b:21:07:67:a1:44:b8:ca: f9:f1:ab:28:1f:31:35:1d:cc:d5:b4:81:48:02:50:db: 01:67:3c:4e:11:92:c8:fb:e3:1e:9f:7c:d9:81:f0:4d: a1:47:a9:94:71:80:43:0d:d0:7d:dc:03:f9:42:d3:5f: 55:8d:b4:6e:e1:22:17:45:73:6a:76:cf:59:2b:e5:c3: 56:aa:55:a3:4d:96:36:8d:a0:45:c4:ea:0a:35:7c:5e: fe:bb:77:68:01:1b:a3:43:46:43:6c:7d:65:f6:b7:f6: 2a:96:9f:71:07:b6:c5:c4:98:a2:81:56:6a:31:fa:29 Fingerprint (SHA-256): 8A:1C:8B:D9:27:1D:45:FE:A2:54:A1:0F:AF:FA:A8:99:25:1F:D2:D4:A7:D9:C4:CC:58:03:8F:BF:12:1A:2D:31 Fingerprint (SHA1): 43:DA:EF:F5:E4:EB:26:70:64:84:6E:BD:E7:06:CF:B7:C8:EF:6A:1B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3823: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3824: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121298 (0x1e67d552) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:16:27 2017 Not After : Tue May 10 12:16:27 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:15:1a:19:73:ad:af:c6:8b:f3:b6:f1:cb:bf:51:82: ba:03:0f:c8:d0:0d:a8:23:c9:35:81:e5:9e:2c:c0:08: 12:f1:1c:3b:87:bf:d1:b6:12:77:cd:da:5a:80:82:22: fd:83:e6:96:5c:f6:aa:06:94:88:60:2d:d0:d9:6d:0f: a9:fe:f5:5c:df:de:88:99:c4:9a:62:3c:ee:96:f7:22: a2:b6:bf:f9:7f:96:b6:a9:b1:37:cb:f9:53:92:6e:8b: 94:27:0d:50:93:ad:a9:5c:a0:2a:f6:5d:68:db:3d:3a: 70:ce:d0:54:b8:7c:2d:18:22:f0:23:a2:0b:66:a4:40: f5:a0:0b:94:f8:77:69:7e:49:7f:c5:b6:4f:2d:35:bd: bf:55:ae:1d:9d:fd:ea:8e:4d:37:dc:58:54:c5:d7:4f: d2:47:c5:35:7c:18:4e:42:ff:45:cf:fa:5f:70:7d:d8: 50:02:62:76:f6:45:3b:a1:9b:3e:71:5d:6c:d7:1c:ee: 15:8e:7d:39:ec:e1:7e:2c:99:46:04:d0:bf:b7:1c:86: ae:6b:01:0b:07:94:c4:d0:80:99:82:a9:42:89:92:3a: e7:87:8d:16:04:5c:5d:6d:cf:f8:ad:31:9a:bf:2c:64: f4:19:15:4b:fc:e4:19:2a:00:35:fb:ed:19:11:31:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:15:ae:4f:a4:2c:71:77:45:a0:bb:e0:75:6b:53:4f: 29:c4:c2:58:79:11:ff:93:93:4b:9d:75:b8:df:8f:60: 96:d3:41:31:56:bb:fc:dd:25:e9:62:9e:0e:14:d3:cc: 4c:94:50:a3:d3:42:25:21:28:2b:b1:57:8e:79:67:85: 36:1c:6f:0c:0c:7d:8d:33:72:5a:4f:e4:94:6b:d0:43: 47:d8:94:26:68:35:39:21:aa:e2:bf:b2:8d:75:1a:68: 64:31:7a:0d:0d:79:cc:8d:d3:46:1e:89:b1:42:e0:46: 91:6d:43:58:e1:94:de:df:52:c1:97:f8:5f:76:c1:90: 44:fe:85:3d:cd:bf:f8:ed:9b:21:07:67:a1:44:b8:ca: f9:f1:ab:28:1f:31:35:1d:cc:d5:b4:81:48:02:50:db: 01:67:3c:4e:11:92:c8:fb:e3:1e:9f:7c:d9:81:f0:4d: a1:47:a9:94:71:80:43:0d:d0:7d:dc:03:f9:42:d3:5f: 55:8d:b4:6e:e1:22:17:45:73:6a:76:cf:59:2b:e5:c3: 56:aa:55:a3:4d:96:36:8d:a0:45:c4:ea:0a:35:7c:5e: fe:bb:77:68:01:1b:a3:43:46:43:6c:7d:65:f6:b7:f6: 2a:96:9f:71:07:b6:c5:c4:98:a2:81:56:6a:31:fa:29 Fingerprint (SHA-256): 8A:1C:8B:D9:27:1D:45:FE:A2:54:A1:0F:AF:FA:A8:99:25:1F:D2:D4:A7:D9:C4:CC:58:03:8F:BF:12:1A:2D:31 Fingerprint (SHA1): 43:DA:EF:F5:E4:EB:26:70:64:84:6E:BD:E7:06:CF:B7:C8:EF:6A:1B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3825: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3826: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3827: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3828: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121298 (0x1e67d552) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:16:27 2017 Not After : Tue May 10 12:16:27 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:15:1a:19:73:ad:af:c6:8b:f3:b6:f1:cb:bf:51:82: ba:03:0f:c8:d0:0d:a8:23:c9:35:81:e5:9e:2c:c0:08: 12:f1:1c:3b:87:bf:d1:b6:12:77:cd:da:5a:80:82:22: fd:83:e6:96:5c:f6:aa:06:94:88:60:2d:d0:d9:6d:0f: a9:fe:f5:5c:df:de:88:99:c4:9a:62:3c:ee:96:f7:22: a2:b6:bf:f9:7f:96:b6:a9:b1:37:cb:f9:53:92:6e:8b: 94:27:0d:50:93:ad:a9:5c:a0:2a:f6:5d:68:db:3d:3a: 70:ce:d0:54:b8:7c:2d:18:22:f0:23:a2:0b:66:a4:40: f5:a0:0b:94:f8:77:69:7e:49:7f:c5:b6:4f:2d:35:bd: bf:55:ae:1d:9d:fd:ea:8e:4d:37:dc:58:54:c5:d7:4f: d2:47:c5:35:7c:18:4e:42:ff:45:cf:fa:5f:70:7d:d8: 50:02:62:76:f6:45:3b:a1:9b:3e:71:5d:6c:d7:1c:ee: 15:8e:7d:39:ec:e1:7e:2c:99:46:04:d0:bf:b7:1c:86: ae:6b:01:0b:07:94:c4:d0:80:99:82:a9:42:89:92:3a: e7:87:8d:16:04:5c:5d:6d:cf:f8:ad:31:9a:bf:2c:64: f4:19:15:4b:fc:e4:19:2a:00:35:fb:ed:19:11:31:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:15:ae:4f:a4:2c:71:77:45:a0:bb:e0:75:6b:53:4f: 29:c4:c2:58:79:11:ff:93:93:4b:9d:75:b8:df:8f:60: 96:d3:41:31:56:bb:fc:dd:25:e9:62:9e:0e:14:d3:cc: 4c:94:50:a3:d3:42:25:21:28:2b:b1:57:8e:79:67:85: 36:1c:6f:0c:0c:7d:8d:33:72:5a:4f:e4:94:6b:d0:43: 47:d8:94:26:68:35:39:21:aa:e2:bf:b2:8d:75:1a:68: 64:31:7a:0d:0d:79:cc:8d:d3:46:1e:89:b1:42:e0:46: 91:6d:43:58:e1:94:de:df:52:c1:97:f8:5f:76:c1:90: 44:fe:85:3d:cd:bf:f8:ed:9b:21:07:67:a1:44:b8:ca: f9:f1:ab:28:1f:31:35:1d:cc:d5:b4:81:48:02:50:db: 01:67:3c:4e:11:92:c8:fb:e3:1e:9f:7c:d9:81:f0:4d: a1:47:a9:94:71:80:43:0d:d0:7d:dc:03:f9:42:d3:5f: 55:8d:b4:6e:e1:22:17:45:73:6a:76:cf:59:2b:e5:c3: 56:aa:55:a3:4d:96:36:8d:a0:45:c4:ea:0a:35:7c:5e: fe:bb:77:68:01:1b:a3:43:46:43:6c:7d:65:f6:b7:f6: 2a:96:9f:71:07:b6:c5:c4:98:a2:81:56:6a:31:fa:29 Fingerprint (SHA-256): 8A:1C:8B:D9:27:1D:45:FE:A2:54:A1:0F:AF:FA:A8:99:25:1F:D2:D4:A7:D9:C4:CC:58:03:8F:BF:12:1A:2D:31 Fingerprint (SHA1): 43:DA:EF:F5:E4:EB:26:70:64:84:6E:BD:E7:06:CF:B7:C8:EF:6A:1B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3829: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3830: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3831: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3832: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121298 (0x1e67d552) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:16:27 2017 Not After : Tue May 10 12:16:27 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:15:1a:19:73:ad:af:c6:8b:f3:b6:f1:cb:bf:51:82: ba:03:0f:c8:d0:0d:a8:23:c9:35:81:e5:9e:2c:c0:08: 12:f1:1c:3b:87:bf:d1:b6:12:77:cd:da:5a:80:82:22: fd:83:e6:96:5c:f6:aa:06:94:88:60:2d:d0:d9:6d:0f: a9:fe:f5:5c:df:de:88:99:c4:9a:62:3c:ee:96:f7:22: a2:b6:bf:f9:7f:96:b6:a9:b1:37:cb:f9:53:92:6e:8b: 94:27:0d:50:93:ad:a9:5c:a0:2a:f6:5d:68:db:3d:3a: 70:ce:d0:54:b8:7c:2d:18:22:f0:23:a2:0b:66:a4:40: f5:a0:0b:94:f8:77:69:7e:49:7f:c5:b6:4f:2d:35:bd: bf:55:ae:1d:9d:fd:ea:8e:4d:37:dc:58:54:c5:d7:4f: d2:47:c5:35:7c:18:4e:42:ff:45:cf:fa:5f:70:7d:d8: 50:02:62:76:f6:45:3b:a1:9b:3e:71:5d:6c:d7:1c:ee: 15:8e:7d:39:ec:e1:7e:2c:99:46:04:d0:bf:b7:1c:86: ae:6b:01:0b:07:94:c4:d0:80:99:82:a9:42:89:92:3a: e7:87:8d:16:04:5c:5d:6d:cf:f8:ad:31:9a:bf:2c:64: f4:19:15:4b:fc:e4:19:2a:00:35:fb:ed:19:11:31:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:15:ae:4f:a4:2c:71:77:45:a0:bb:e0:75:6b:53:4f: 29:c4:c2:58:79:11:ff:93:93:4b:9d:75:b8:df:8f:60: 96:d3:41:31:56:bb:fc:dd:25:e9:62:9e:0e:14:d3:cc: 4c:94:50:a3:d3:42:25:21:28:2b:b1:57:8e:79:67:85: 36:1c:6f:0c:0c:7d:8d:33:72:5a:4f:e4:94:6b:d0:43: 47:d8:94:26:68:35:39:21:aa:e2:bf:b2:8d:75:1a:68: 64:31:7a:0d:0d:79:cc:8d:d3:46:1e:89:b1:42:e0:46: 91:6d:43:58:e1:94:de:df:52:c1:97:f8:5f:76:c1:90: 44:fe:85:3d:cd:bf:f8:ed:9b:21:07:67:a1:44:b8:ca: f9:f1:ab:28:1f:31:35:1d:cc:d5:b4:81:48:02:50:db: 01:67:3c:4e:11:92:c8:fb:e3:1e:9f:7c:d9:81:f0:4d: a1:47:a9:94:71:80:43:0d:d0:7d:dc:03:f9:42:d3:5f: 55:8d:b4:6e:e1:22:17:45:73:6a:76:cf:59:2b:e5:c3: 56:aa:55:a3:4d:96:36:8d:a0:45:c4:ea:0a:35:7c:5e: fe:bb:77:68:01:1b:a3:43:46:43:6c:7d:65:f6:b7:f6: 2a:96:9f:71:07:b6:c5:c4:98:a2:81:56:6a:31:fa:29 Fingerprint (SHA-256): 8A:1C:8B:D9:27:1D:45:FE:A2:54:A1:0F:AF:FA:A8:99:25:1F:D2:D4:A7:D9:C4:CC:58:03:8F:BF:12:1A:2D:31 Fingerprint (SHA1): 43:DA:EF:F5:E4:EB:26:70:64:84:6E:BD:E7:06:CF:B7:C8:EF:6A:1B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3833: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121298 (0x1e67d552) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:16:27 2017 Not After : Tue May 10 12:16:27 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:15:1a:19:73:ad:af:c6:8b:f3:b6:f1:cb:bf:51:82: ba:03:0f:c8:d0:0d:a8:23:c9:35:81:e5:9e:2c:c0:08: 12:f1:1c:3b:87:bf:d1:b6:12:77:cd:da:5a:80:82:22: fd:83:e6:96:5c:f6:aa:06:94:88:60:2d:d0:d9:6d:0f: a9:fe:f5:5c:df:de:88:99:c4:9a:62:3c:ee:96:f7:22: a2:b6:bf:f9:7f:96:b6:a9:b1:37:cb:f9:53:92:6e:8b: 94:27:0d:50:93:ad:a9:5c:a0:2a:f6:5d:68:db:3d:3a: 70:ce:d0:54:b8:7c:2d:18:22:f0:23:a2:0b:66:a4:40: f5:a0:0b:94:f8:77:69:7e:49:7f:c5:b6:4f:2d:35:bd: bf:55:ae:1d:9d:fd:ea:8e:4d:37:dc:58:54:c5:d7:4f: d2:47:c5:35:7c:18:4e:42:ff:45:cf:fa:5f:70:7d:d8: 50:02:62:76:f6:45:3b:a1:9b:3e:71:5d:6c:d7:1c:ee: 15:8e:7d:39:ec:e1:7e:2c:99:46:04:d0:bf:b7:1c:86: ae:6b:01:0b:07:94:c4:d0:80:99:82:a9:42:89:92:3a: e7:87:8d:16:04:5c:5d:6d:cf:f8:ad:31:9a:bf:2c:64: f4:19:15:4b:fc:e4:19:2a:00:35:fb:ed:19:11:31:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:15:ae:4f:a4:2c:71:77:45:a0:bb:e0:75:6b:53:4f: 29:c4:c2:58:79:11:ff:93:93:4b:9d:75:b8:df:8f:60: 96:d3:41:31:56:bb:fc:dd:25:e9:62:9e:0e:14:d3:cc: 4c:94:50:a3:d3:42:25:21:28:2b:b1:57:8e:79:67:85: 36:1c:6f:0c:0c:7d:8d:33:72:5a:4f:e4:94:6b:d0:43: 47:d8:94:26:68:35:39:21:aa:e2:bf:b2:8d:75:1a:68: 64:31:7a:0d:0d:79:cc:8d:d3:46:1e:89:b1:42:e0:46: 91:6d:43:58:e1:94:de:df:52:c1:97:f8:5f:76:c1:90: 44:fe:85:3d:cd:bf:f8:ed:9b:21:07:67:a1:44:b8:ca: f9:f1:ab:28:1f:31:35:1d:cc:d5:b4:81:48:02:50:db: 01:67:3c:4e:11:92:c8:fb:e3:1e:9f:7c:d9:81:f0:4d: a1:47:a9:94:71:80:43:0d:d0:7d:dc:03:f9:42:d3:5f: 55:8d:b4:6e:e1:22:17:45:73:6a:76:cf:59:2b:e5:c3: 56:aa:55:a3:4d:96:36:8d:a0:45:c4:ea:0a:35:7c:5e: fe:bb:77:68:01:1b:a3:43:46:43:6c:7d:65:f6:b7:f6: 2a:96:9f:71:07:b6:c5:c4:98:a2:81:56:6a:31:fa:29 Fingerprint (SHA-256): 8A:1C:8B:D9:27:1D:45:FE:A2:54:A1:0F:AF:FA:A8:99:25:1F:D2:D4:A7:D9:C4:CC:58:03:8F:BF:12:1A:2D:31 Fingerprint (SHA1): 43:DA:EF:F5:E4:EB:26:70:64:84:6E:BD:E7:06:CF:B7:C8:EF:6A:1B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3834: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3835: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121298 (0x1e67d552) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:16:27 2017 Not After : Tue May 10 12:16:27 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:15:1a:19:73:ad:af:c6:8b:f3:b6:f1:cb:bf:51:82: ba:03:0f:c8:d0:0d:a8:23:c9:35:81:e5:9e:2c:c0:08: 12:f1:1c:3b:87:bf:d1:b6:12:77:cd:da:5a:80:82:22: fd:83:e6:96:5c:f6:aa:06:94:88:60:2d:d0:d9:6d:0f: a9:fe:f5:5c:df:de:88:99:c4:9a:62:3c:ee:96:f7:22: a2:b6:bf:f9:7f:96:b6:a9:b1:37:cb:f9:53:92:6e:8b: 94:27:0d:50:93:ad:a9:5c:a0:2a:f6:5d:68:db:3d:3a: 70:ce:d0:54:b8:7c:2d:18:22:f0:23:a2:0b:66:a4:40: f5:a0:0b:94:f8:77:69:7e:49:7f:c5:b6:4f:2d:35:bd: bf:55:ae:1d:9d:fd:ea:8e:4d:37:dc:58:54:c5:d7:4f: d2:47:c5:35:7c:18:4e:42:ff:45:cf:fa:5f:70:7d:d8: 50:02:62:76:f6:45:3b:a1:9b:3e:71:5d:6c:d7:1c:ee: 15:8e:7d:39:ec:e1:7e:2c:99:46:04:d0:bf:b7:1c:86: ae:6b:01:0b:07:94:c4:d0:80:99:82:a9:42:89:92:3a: e7:87:8d:16:04:5c:5d:6d:cf:f8:ad:31:9a:bf:2c:64: f4:19:15:4b:fc:e4:19:2a:00:35:fb:ed:19:11:31:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:15:ae:4f:a4:2c:71:77:45:a0:bb:e0:75:6b:53:4f: 29:c4:c2:58:79:11:ff:93:93:4b:9d:75:b8:df:8f:60: 96:d3:41:31:56:bb:fc:dd:25:e9:62:9e:0e:14:d3:cc: 4c:94:50:a3:d3:42:25:21:28:2b:b1:57:8e:79:67:85: 36:1c:6f:0c:0c:7d:8d:33:72:5a:4f:e4:94:6b:d0:43: 47:d8:94:26:68:35:39:21:aa:e2:bf:b2:8d:75:1a:68: 64:31:7a:0d:0d:79:cc:8d:d3:46:1e:89:b1:42:e0:46: 91:6d:43:58:e1:94:de:df:52:c1:97:f8:5f:76:c1:90: 44:fe:85:3d:cd:bf:f8:ed:9b:21:07:67:a1:44:b8:ca: f9:f1:ab:28:1f:31:35:1d:cc:d5:b4:81:48:02:50:db: 01:67:3c:4e:11:92:c8:fb:e3:1e:9f:7c:d9:81:f0:4d: a1:47:a9:94:71:80:43:0d:d0:7d:dc:03:f9:42:d3:5f: 55:8d:b4:6e:e1:22:17:45:73:6a:76:cf:59:2b:e5:c3: 56:aa:55:a3:4d:96:36:8d:a0:45:c4:ea:0a:35:7c:5e: fe:bb:77:68:01:1b:a3:43:46:43:6c:7d:65:f6:b7:f6: 2a:96:9f:71:07:b6:c5:c4:98:a2:81:56:6a:31:fa:29 Fingerprint (SHA-256): 8A:1C:8B:D9:27:1D:45:FE:A2:54:A1:0F:AF:FA:A8:99:25:1F:D2:D4:A7:D9:C4:CC:58:03:8F:BF:12:1A:2D:31 Fingerprint (SHA1): 43:DA:EF:F5:E4:EB:26:70:64:84:6E:BD:E7:06:CF:B7:C8:EF:6A:1B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3836: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3837: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3838: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3839: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121298 (0x1e67d552) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:16:27 2017 Not After : Tue May 10 12:16:27 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:15:1a:19:73:ad:af:c6:8b:f3:b6:f1:cb:bf:51:82: ba:03:0f:c8:d0:0d:a8:23:c9:35:81:e5:9e:2c:c0:08: 12:f1:1c:3b:87:bf:d1:b6:12:77:cd:da:5a:80:82:22: fd:83:e6:96:5c:f6:aa:06:94:88:60:2d:d0:d9:6d:0f: a9:fe:f5:5c:df:de:88:99:c4:9a:62:3c:ee:96:f7:22: a2:b6:bf:f9:7f:96:b6:a9:b1:37:cb:f9:53:92:6e:8b: 94:27:0d:50:93:ad:a9:5c:a0:2a:f6:5d:68:db:3d:3a: 70:ce:d0:54:b8:7c:2d:18:22:f0:23:a2:0b:66:a4:40: f5:a0:0b:94:f8:77:69:7e:49:7f:c5:b6:4f:2d:35:bd: bf:55:ae:1d:9d:fd:ea:8e:4d:37:dc:58:54:c5:d7:4f: d2:47:c5:35:7c:18:4e:42:ff:45:cf:fa:5f:70:7d:d8: 50:02:62:76:f6:45:3b:a1:9b:3e:71:5d:6c:d7:1c:ee: 15:8e:7d:39:ec:e1:7e:2c:99:46:04:d0:bf:b7:1c:86: ae:6b:01:0b:07:94:c4:d0:80:99:82:a9:42:89:92:3a: e7:87:8d:16:04:5c:5d:6d:cf:f8:ad:31:9a:bf:2c:64: f4:19:15:4b:fc:e4:19:2a:00:35:fb:ed:19:11:31:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:15:ae:4f:a4:2c:71:77:45:a0:bb:e0:75:6b:53:4f: 29:c4:c2:58:79:11:ff:93:93:4b:9d:75:b8:df:8f:60: 96:d3:41:31:56:bb:fc:dd:25:e9:62:9e:0e:14:d3:cc: 4c:94:50:a3:d3:42:25:21:28:2b:b1:57:8e:79:67:85: 36:1c:6f:0c:0c:7d:8d:33:72:5a:4f:e4:94:6b:d0:43: 47:d8:94:26:68:35:39:21:aa:e2:bf:b2:8d:75:1a:68: 64:31:7a:0d:0d:79:cc:8d:d3:46:1e:89:b1:42:e0:46: 91:6d:43:58:e1:94:de:df:52:c1:97:f8:5f:76:c1:90: 44:fe:85:3d:cd:bf:f8:ed:9b:21:07:67:a1:44:b8:ca: f9:f1:ab:28:1f:31:35:1d:cc:d5:b4:81:48:02:50:db: 01:67:3c:4e:11:92:c8:fb:e3:1e:9f:7c:d9:81:f0:4d: a1:47:a9:94:71:80:43:0d:d0:7d:dc:03:f9:42:d3:5f: 55:8d:b4:6e:e1:22:17:45:73:6a:76:cf:59:2b:e5:c3: 56:aa:55:a3:4d:96:36:8d:a0:45:c4:ea:0a:35:7c:5e: fe:bb:77:68:01:1b:a3:43:46:43:6c:7d:65:f6:b7:f6: 2a:96:9f:71:07:b6:c5:c4:98:a2:81:56:6a:31:fa:29 Fingerprint (SHA-256): 8A:1C:8B:D9:27:1D:45:FE:A2:54:A1:0F:AF:FA:A8:99:25:1F:D2:D4:A7:D9:C4:CC:58:03:8F:BF:12:1A:2D:31 Fingerprint (SHA1): 43:DA:EF:F5:E4:EB:26:70:64:84:6E:BD:E7:06:CF:B7:C8:EF:6A:1B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3840: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121298 (0x1e67d552) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:16:27 2017 Not After : Tue May 10 12:16:27 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:15:1a:19:73:ad:af:c6:8b:f3:b6:f1:cb:bf:51:82: ba:03:0f:c8:d0:0d:a8:23:c9:35:81:e5:9e:2c:c0:08: 12:f1:1c:3b:87:bf:d1:b6:12:77:cd:da:5a:80:82:22: fd:83:e6:96:5c:f6:aa:06:94:88:60:2d:d0:d9:6d:0f: a9:fe:f5:5c:df:de:88:99:c4:9a:62:3c:ee:96:f7:22: a2:b6:bf:f9:7f:96:b6:a9:b1:37:cb:f9:53:92:6e:8b: 94:27:0d:50:93:ad:a9:5c:a0:2a:f6:5d:68:db:3d:3a: 70:ce:d0:54:b8:7c:2d:18:22:f0:23:a2:0b:66:a4:40: f5:a0:0b:94:f8:77:69:7e:49:7f:c5:b6:4f:2d:35:bd: bf:55:ae:1d:9d:fd:ea:8e:4d:37:dc:58:54:c5:d7:4f: d2:47:c5:35:7c:18:4e:42:ff:45:cf:fa:5f:70:7d:d8: 50:02:62:76:f6:45:3b:a1:9b:3e:71:5d:6c:d7:1c:ee: 15:8e:7d:39:ec:e1:7e:2c:99:46:04:d0:bf:b7:1c:86: ae:6b:01:0b:07:94:c4:d0:80:99:82:a9:42:89:92:3a: e7:87:8d:16:04:5c:5d:6d:cf:f8:ad:31:9a:bf:2c:64: f4:19:15:4b:fc:e4:19:2a:00:35:fb:ed:19:11:31:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:15:ae:4f:a4:2c:71:77:45:a0:bb:e0:75:6b:53:4f: 29:c4:c2:58:79:11:ff:93:93:4b:9d:75:b8:df:8f:60: 96:d3:41:31:56:bb:fc:dd:25:e9:62:9e:0e:14:d3:cc: 4c:94:50:a3:d3:42:25:21:28:2b:b1:57:8e:79:67:85: 36:1c:6f:0c:0c:7d:8d:33:72:5a:4f:e4:94:6b:d0:43: 47:d8:94:26:68:35:39:21:aa:e2:bf:b2:8d:75:1a:68: 64:31:7a:0d:0d:79:cc:8d:d3:46:1e:89:b1:42:e0:46: 91:6d:43:58:e1:94:de:df:52:c1:97:f8:5f:76:c1:90: 44:fe:85:3d:cd:bf:f8:ed:9b:21:07:67:a1:44:b8:ca: f9:f1:ab:28:1f:31:35:1d:cc:d5:b4:81:48:02:50:db: 01:67:3c:4e:11:92:c8:fb:e3:1e:9f:7c:d9:81:f0:4d: a1:47:a9:94:71:80:43:0d:d0:7d:dc:03:f9:42:d3:5f: 55:8d:b4:6e:e1:22:17:45:73:6a:76:cf:59:2b:e5:c3: 56:aa:55:a3:4d:96:36:8d:a0:45:c4:ea:0a:35:7c:5e: fe:bb:77:68:01:1b:a3:43:46:43:6c:7d:65:f6:b7:f6: 2a:96:9f:71:07:b6:c5:c4:98:a2:81:56:6a:31:fa:29 Fingerprint (SHA-256): 8A:1C:8B:D9:27:1D:45:FE:A2:54:A1:0F:AF:FA:A8:99:25:1F:D2:D4:A7:D9:C4:CC:58:03:8F:BF:12:1A:2D:31 Fingerprint (SHA1): 43:DA:EF:F5:E4:EB:26:70:64:84:6E:BD:E7:06:CF:B7:C8:EF:6A:1B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3841: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121298 (0x1e67d552) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:16:27 2017 Not After : Tue May 10 12:16:27 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:15:1a:19:73:ad:af:c6:8b:f3:b6:f1:cb:bf:51:82: ba:03:0f:c8:d0:0d:a8:23:c9:35:81:e5:9e:2c:c0:08: 12:f1:1c:3b:87:bf:d1:b6:12:77:cd:da:5a:80:82:22: fd:83:e6:96:5c:f6:aa:06:94:88:60:2d:d0:d9:6d:0f: a9:fe:f5:5c:df:de:88:99:c4:9a:62:3c:ee:96:f7:22: a2:b6:bf:f9:7f:96:b6:a9:b1:37:cb:f9:53:92:6e:8b: 94:27:0d:50:93:ad:a9:5c:a0:2a:f6:5d:68:db:3d:3a: 70:ce:d0:54:b8:7c:2d:18:22:f0:23:a2:0b:66:a4:40: f5:a0:0b:94:f8:77:69:7e:49:7f:c5:b6:4f:2d:35:bd: bf:55:ae:1d:9d:fd:ea:8e:4d:37:dc:58:54:c5:d7:4f: d2:47:c5:35:7c:18:4e:42:ff:45:cf:fa:5f:70:7d:d8: 50:02:62:76:f6:45:3b:a1:9b:3e:71:5d:6c:d7:1c:ee: 15:8e:7d:39:ec:e1:7e:2c:99:46:04:d0:bf:b7:1c:86: ae:6b:01:0b:07:94:c4:d0:80:99:82:a9:42:89:92:3a: e7:87:8d:16:04:5c:5d:6d:cf:f8:ad:31:9a:bf:2c:64: f4:19:15:4b:fc:e4:19:2a:00:35:fb:ed:19:11:31:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:15:ae:4f:a4:2c:71:77:45:a0:bb:e0:75:6b:53:4f: 29:c4:c2:58:79:11:ff:93:93:4b:9d:75:b8:df:8f:60: 96:d3:41:31:56:bb:fc:dd:25:e9:62:9e:0e:14:d3:cc: 4c:94:50:a3:d3:42:25:21:28:2b:b1:57:8e:79:67:85: 36:1c:6f:0c:0c:7d:8d:33:72:5a:4f:e4:94:6b:d0:43: 47:d8:94:26:68:35:39:21:aa:e2:bf:b2:8d:75:1a:68: 64:31:7a:0d:0d:79:cc:8d:d3:46:1e:89:b1:42:e0:46: 91:6d:43:58:e1:94:de:df:52:c1:97:f8:5f:76:c1:90: 44:fe:85:3d:cd:bf:f8:ed:9b:21:07:67:a1:44:b8:ca: f9:f1:ab:28:1f:31:35:1d:cc:d5:b4:81:48:02:50:db: 01:67:3c:4e:11:92:c8:fb:e3:1e:9f:7c:d9:81:f0:4d: a1:47:a9:94:71:80:43:0d:d0:7d:dc:03:f9:42:d3:5f: 55:8d:b4:6e:e1:22:17:45:73:6a:76:cf:59:2b:e5:c3: 56:aa:55:a3:4d:96:36:8d:a0:45:c4:ea:0a:35:7c:5e: fe:bb:77:68:01:1b:a3:43:46:43:6c:7d:65:f6:b7:f6: 2a:96:9f:71:07:b6:c5:c4:98:a2:81:56:6a:31:fa:29 Fingerprint (SHA-256): 8A:1C:8B:D9:27:1D:45:FE:A2:54:A1:0F:AF:FA:A8:99:25:1F:D2:D4:A7:D9:C4:CC:58:03:8F:BF:12:1A:2D:31 Fingerprint (SHA1): 43:DA:EF:F5:E4:EB:26:70:64:84:6E:BD:E7:06:CF:B7:C8:EF:6A:1B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3842: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121298 (0x1e67d552) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:16:27 2017 Not After : Tue May 10 12:16:27 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:15:1a:19:73:ad:af:c6:8b:f3:b6:f1:cb:bf:51:82: ba:03:0f:c8:d0:0d:a8:23:c9:35:81:e5:9e:2c:c0:08: 12:f1:1c:3b:87:bf:d1:b6:12:77:cd:da:5a:80:82:22: fd:83:e6:96:5c:f6:aa:06:94:88:60:2d:d0:d9:6d:0f: a9:fe:f5:5c:df:de:88:99:c4:9a:62:3c:ee:96:f7:22: a2:b6:bf:f9:7f:96:b6:a9:b1:37:cb:f9:53:92:6e:8b: 94:27:0d:50:93:ad:a9:5c:a0:2a:f6:5d:68:db:3d:3a: 70:ce:d0:54:b8:7c:2d:18:22:f0:23:a2:0b:66:a4:40: f5:a0:0b:94:f8:77:69:7e:49:7f:c5:b6:4f:2d:35:bd: bf:55:ae:1d:9d:fd:ea:8e:4d:37:dc:58:54:c5:d7:4f: d2:47:c5:35:7c:18:4e:42:ff:45:cf:fa:5f:70:7d:d8: 50:02:62:76:f6:45:3b:a1:9b:3e:71:5d:6c:d7:1c:ee: 15:8e:7d:39:ec:e1:7e:2c:99:46:04:d0:bf:b7:1c:86: ae:6b:01:0b:07:94:c4:d0:80:99:82:a9:42:89:92:3a: e7:87:8d:16:04:5c:5d:6d:cf:f8:ad:31:9a:bf:2c:64: f4:19:15:4b:fc:e4:19:2a:00:35:fb:ed:19:11:31:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:15:ae:4f:a4:2c:71:77:45:a0:bb:e0:75:6b:53:4f: 29:c4:c2:58:79:11:ff:93:93:4b:9d:75:b8:df:8f:60: 96:d3:41:31:56:bb:fc:dd:25:e9:62:9e:0e:14:d3:cc: 4c:94:50:a3:d3:42:25:21:28:2b:b1:57:8e:79:67:85: 36:1c:6f:0c:0c:7d:8d:33:72:5a:4f:e4:94:6b:d0:43: 47:d8:94:26:68:35:39:21:aa:e2:bf:b2:8d:75:1a:68: 64:31:7a:0d:0d:79:cc:8d:d3:46:1e:89:b1:42:e0:46: 91:6d:43:58:e1:94:de:df:52:c1:97:f8:5f:76:c1:90: 44:fe:85:3d:cd:bf:f8:ed:9b:21:07:67:a1:44:b8:ca: f9:f1:ab:28:1f:31:35:1d:cc:d5:b4:81:48:02:50:db: 01:67:3c:4e:11:92:c8:fb:e3:1e:9f:7c:d9:81:f0:4d: a1:47:a9:94:71:80:43:0d:d0:7d:dc:03:f9:42:d3:5f: 55:8d:b4:6e:e1:22:17:45:73:6a:76:cf:59:2b:e5:c3: 56:aa:55:a3:4d:96:36:8d:a0:45:c4:ea:0a:35:7c:5e: fe:bb:77:68:01:1b:a3:43:46:43:6c:7d:65:f6:b7:f6: 2a:96:9f:71:07:b6:c5:c4:98:a2:81:56:6a:31:fa:29 Fingerprint (SHA-256): 8A:1C:8B:D9:27:1D:45:FE:A2:54:A1:0F:AF:FA:A8:99:25:1F:D2:D4:A7:D9:C4:CC:58:03:8F:BF:12:1A:2D:31 Fingerprint (SHA1): 43:DA:EF:F5:E4:EB:26:70:64:84:6E:BD:E7:06:CF:B7:C8:EF:6A:1B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3843: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121298 (0x1e67d552) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:16:27 2017 Not After : Tue May 10 12:16:27 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:15:1a:19:73:ad:af:c6:8b:f3:b6:f1:cb:bf:51:82: ba:03:0f:c8:d0:0d:a8:23:c9:35:81:e5:9e:2c:c0:08: 12:f1:1c:3b:87:bf:d1:b6:12:77:cd:da:5a:80:82:22: fd:83:e6:96:5c:f6:aa:06:94:88:60:2d:d0:d9:6d:0f: a9:fe:f5:5c:df:de:88:99:c4:9a:62:3c:ee:96:f7:22: a2:b6:bf:f9:7f:96:b6:a9:b1:37:cb:f9:53:92:6e:8b: 94:27:0d:50:93:ad:a9:5c:a0:2a:f6:5d:68:db:3d:3a: 70:ce:d0:54:b8:7c:2d:18:22:f0:23:a2:0b:66:a4:40: f5:a0:0b:94:f8:77:69:7e:49:7f:c5:b6:4f:2d:35:bd: bf:55:ae:1d:9d:fd:ea:8e:4d:37:dc:58:54:c5:d7:4f: d2:47:c5:35:7c:18:4e:42:ff:45:cf:fa:5f:70:7d:d8: 50:02:62:76:f6:45:3b:a1:9b:3e:71:5d:6c:d7:1c:ee: 15:8e:7d:39:ec:e1:7e:2c:99:46:04:d0:bf:b7:1c:86: ae:6b:01:0b:07:94:c4:d0:80:99:82:a9:42:89:92:3a: e7:87:8d:16:04:5c:5d:6d:cf:f8:ad:31:9a:bf:2c:64: f4:19:15:4b:fc:e4:19:2a:00:35:fb:ed:19:11:31:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:15:ae:4f:a4:2c:71:77:45:a0:bb:e0:75:6b:53:4f: 29:c4:c2:58:79:11:ff:93:93:4b:9d:75:b8:df:8f:60: 96:d3:41:31:56:bb:fc:dd:25:e9:62:9e:0e:14:d3:cc: 4c:94:50:a3:d3:42:25:21:28:2b:b1:57:8e:79:67:85: 36:1c:6f:0c:0c:7d:8d:33:72:5a:4f:e4:94:6b:d0:43: 47:d8:94:26:68:35:39:21:aa:e2:bf:b2:8d:75:1a:68: 64:31:7a:0d:0d:79:cc:8d:d3:46:1e:89:b1:42:e0:46: 91:6d:43:58:e1:94:de:df:52:c1:97:f8:5f:76:c1:90: 44:fe:85:3d:cd:bf:f8:ed:9b:21:07:67:a1:44:b8:ca: f9:f1:ab:28:1f:31:35:1d:cc:d5:b4:81:48:02:50:db: 01:67:3c:4e:11:92:c8:fb:e3:1e:9f:7c:d9:81:f0:4d: a1:47:a9:94:71:80:43:0d:d0:7d:dc:03:f9:42:d3:5f: 55:8d:b4:6e:e1:22:17:45:73:6a:76:cf:59:2b:e5:c3: 56:aa:55:a3:4d:96:36:8d:a0:45:c4:ea:0a:35:7c:5e: fe:bb:77:68:01:1b:a3:43:46:43:6c:7d:65:f6:b7:f6: 2a:96:9f:71:07:b6:c5:c4:98:a2:81:56:6a:31:fa:29 Fingerprint (SHA-256): 8A:1C:8B:D9:27:1D:45:FE:A2:54:A1:0F:AF:FA:A8:99:25:1F:D2:D4:A7:D9:C4:CC:58:03:8F:BF:12:1A:2D:31 Fingerprint (SHA1): 43:DA:EF:F5:E4:EB:26:70:64:84:6E:BD:E7:06:CF:B7:C8:EF:6A:1B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3844: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121298 (0x1e67d552) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:16:27 2017 Not After : Tue May 10 12:16:27 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:15:1a:19:73:ad:af:c6:8b:f3:b6:f1:cb:bf:51:82: ba:03:0f:c8:d0:0d:a8:23:c9:35:81:e5:9e:2c:c0:08: 12:f1:1c:3b:87:bf:d1:b6:12:77:cd:da:5a:80:82:22: fd:83:e6:96:5c:f6:aa:06:94:88:60:2d:d0:d9:6d:0f: a9:fe:f5:5c:df:de:88:99:c4:9a:62:3c:ee:96:f7:22: a2:b6:bf:f9:7f:96:b6:a9:b1:37:cb:f9:53:92:6e:8b: 94:27:0d:50:93:ad:a9:5c:a0:2a:f6:5d:68:db:3d:3a: 70:ce:d0:54:b8:7c:2d:18:22:f0:23:a2:0b:66:a4:40: f5:a0:0b:94:f8:77:69:7e:49:7f:c5:b6:4f:2d:35:bd: bf:55:ae:1d:9d:fd:ea:8e:4d:37:dc:58:54:c5:d7:4f: d2:47:c5:35:7c:18:4e:42:ff:45:cf:fa:5f:70:7d:d8: 50:02:62:76:f6:45:3b:a1:9b:3e:71:5d:6c:d7:1c:ee: 15:8e:7d:39:ec:e1:7e:2c:99:46:04:d0:bf:b7:1c:86: ae:6b:01:0b:07:94:c4:d0:80:99:82:a9:42:89:92:3a: e7:87:8d:16:04:5c:5d:6d:cf:f8:ad:31:9a:bf:2c:64: f4:19:15:4b:fc:e4:19:2a:00:35:fb:ed:19:11:31:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:15:ae:4f:a4:2c:71:77:45:a0:bb:e0:75:6b:53:4f: 29:c4:c2:58:79:11:ff:93:93:4b:9d:75:b8:df:8f:60: 96:d3:41:31:56:bb:fc:dd:25:e9:62:9e:0e:14:d3:cc: 4c:94:50:a3:d3:42:25:21:28:2b:b1:57:8e:79:67:85: 36:1c:6f:0c:0c:7d:8d:33:72:5a:4f:e4:94:6b:d0:43: 47:d8:94:26:68:35:39:21:aa:e2:bf:b2:8d:75:1a:68: 64:31:7a:0d:0d:79:cc:8d:d3:46:1e:89:b1:42:e0:46: 91:6d:43:58:e1:94:de:df:52:c1:97:f8:5f:76:c1:90: 44:fe:85:3d:cd:bf:f8:ed:9b:21:07:67:a1:44:b8:ca: f9:f1:ab:28:1f:31:35:1d:cc:d5:b4:81:48:02:50:db: 01:67:3c:4e:11:92:c8:fb:e3:1e:9f:7c:d9:81:f0:4d: a1:47:a9:94:71:80:43:0d:d0:7d:dc:03:f9:42:d3:5f: 55:8d:b4:6e:e1:22:17:45:73:6a:76:cf:59:2b:e5:c3: 56:aa:55:a3:4d:96:36:8d:a0:45:c4:ea:0a:35:7c:5e: fe:bb:77:68:01:1b:a3:43:46:43:6c:7d:65:f6:b7:f6: 2a:96:9f:71:07:b6:c5:c4:98:a2:81:56:6a:31:fa:29 Fingerprint (SHA-256): 8A:1C:8B:D9:27:1D:45:FE:A2:54:A1:0F:AF:FA:A8:99:25:1F:D2:D4:A7:D9:C4:CC:58:03:8F:BF:12:1A:2D:31 Fingerprint (SHA1): 43:DA:EF:F5:E4:EB:26:70:64:84:6E:BD:E7:06:CF:B7:C8:EF:6A:1B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3845: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3846: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3847: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121328 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3848: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3849: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #3850: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3851: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 510121329 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3852: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3853: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #3854: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3855: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 510121330 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3856: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3857: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #3858: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3859: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 510121331 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3860: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3861: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #3862: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3863: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 510121332 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3864: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3865: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #3866: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3867: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 510121333 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3868: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3869: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #3870: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3871: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 510121334 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3872: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3873: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3874: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121328 (0x1e67d570) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:17:17 2017 Not After : Tue May 10 12:17:17 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9e:c4:64:30:63:6d:1b:2f:72:bf:da:b7:40:25:ba:a3: 13:58:5d:9e:c6:7b:55:3c:6c:c1:f7:69:f0:63:83:6b: 88:d5:9b:11:a2:d0:8a:ff:78:3b:4f:f7:36:48:07:91: 3c:f1:67:38:32:76:4e:29:56:15:72:9d:d3:1a:2a:d5: 97:9b:77:b4:4f:d6:2e:77:f8:c3:97:88:9f:c9:16:c7: 55:ad:6a:35:5d:40:64:6b:4c:34:2f:c0:aa:d8:6d:ca: 75:f3:86:00:d6:d5:80:c1:76:44:2e:39:b3:fc:a0:a6: 0c:38:13:1e:1e:dc:34:a5:32:e9:ea:53:af:93:ac:80: 6f:c8:42:0d:87:7d:ef:50:70:bf:51:4c:01:6e:35:cc: 63:57:1b:4f:04:f7:bc:51:19:9f:8b:12:b0:90:48:c9: 14:4a:36:17:67:bc:a9:aa:3e:ba:e6:94:c5:e9:90:46: 9a:9e:cb:5b:ca:39:2b:6a:33:c9:39:98:59:69:bc:1e: d6:bc:5b:de:ce:ef:1a:5b:0d:30:13:50:2b:00:30:ac: 6d:32:cf:a6:53:47:d6:05:5d:aa:e0:2c:b3:97:89:b8: 92:37:4d:19:27:51:e7:9c:08:2d:4a:15:6e:6f:dd:8a: 33:d1:d6:a9:28:fe:2f:98:c0:9d:85:45:49:d8:58:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 74:d8:89:15:0a:ca:42:57:65:f4:64:fc:88:8e:81:59: 98:83:ad:90:3c:1e:98:44:fe:ef:8f:91:55:40:eb:ff: 46:b1:d5:19:7e:ce:c7:c5:d0:1d:42:22:0b:ed:49:fa: 1c:0e:09:64:53:58:47:dc:92:0f:98:12:6d:5a:68:3f: 31:d6:89:6a:66:42:1b:8f:6e:40:4e:3e:eb:ce:ed:4d: c5:25:63:86:78:bb:86:53:b5:fb:b7:7c:f1:0b:58:af: 75:1a:18:2d:d4:15:2b:25:47:da:88:0f:b5:0f:71:6c: 24:c5:b1:3c:c1:1d:5d:ba:1c:6a:f8:c0:f3:b6:68:17: eb:be:bc:7c:1a:52:b1:3e:a2:9b:80:11:c3:5c:c9:b3: c1:68:78:b9:2d:73:c8:c0:c9:c1:94:63:8b:d0:2e:d6: ee:b3:d1:b9:a0:f3:a3:9d:23:63:b9:2b:18:4f:f4:01: 39:b9:75:73:ba:07:09:5a:1b:6b:8c:b8:2c:a0:17:ea: ea:51:2f:44:d0:9a:13:71:f0:02:3f:43:90:ba:a2:bb: 3d:e2:1f:c1:4c:c4:4a:5e:58:bb:af:de:cb:cf:ac:61: 94:b8:94:d9:f6:ab:98:d3:50:d0:8e:23:27:04:6f:c8: 7c:b2:58:f0:74:78:cd:86:02:fa:ed:26:52:fc:2a:6d Fingerprint (SHA-256): B5:C9:8F:75:DD:67:73:DE:88:4F:57:6C:33:F9:D2:B9:8E:F6:BC:97:0F:0C:8D:0E:F9:17:73:E9:2F:57:DA:B4 Fingerprint (SHA1): 59:A9:25:CB:89:CA:12:5E:C9:8C:57:C7:37:88:8C:C5:DB:24:15:BA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #3875: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3876: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3877: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3878: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121328 (0x1e67d570) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:17:17 2017 Not After : Tue May 10 12:17:17 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9e:c4:64:30:63:6d:1b:2f:72:bf:da:b7:40:25:ba:a3: 13:58:5d:9e:c6:7b:55:3c:6c:c1:f7:69:f0:63:83:6b: 88:d5:9b:11:a2:d0:8a:ff:78:3b:4f:f7:36:48:07:91: 3c:f1:67:38:32:76:4e:29:56:15:72:9d:d3:1a:2a:d5: 97:9b:77:b4:4f:d6:2e:77:f8:c3:97:88:9f:c9:16:c7: 55:ad:6a:35:5d:40:64:6b:4c:34:2f:c0:aa:d8:6d:ca: 75:f3:86:00:d6:d5:80:c1:76:44:2e:39:b3:fc:a0:a6: 0c:38:13:1e:1e:dc:34:a5:32:e9:ea:53:af:93:ac:80: 6f:c8:42:0d:87:7d:ef:50:70:bf:51:4c:01:6e:35:cc: 63:57:1b:4f:04:f7:bc:51:19:9f:8b:12:b0:90:48:c9: 14:4a:36:17:67:bc:a9:aa:3e:ba:e6:94:c5:e9:90:46: 9a:9e:cb:5b:ca:39:2b:6a:33:c9:39:98:59:69:bc:1e: d6:bc:5b:de:ce:ef:1a:5b:0d:30:13:50:2b:00:30:ac: 6d:32:cf:a6:53:47:d6:05:5d:aa:e0:2c:b3:97:89:b8: 92:37:4d:19:27:51:e7:9c:08:2d:4a:15:6e:6f:dd:8a: 33:d1:d6:a9:28:fe:2f:98:c0:9d:85:45:49:d8:58:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 74:d8:89:15:0a:ca:42:57:65:f4:64:fc:88:8e:81:59: 98:83:ad:90:3c:1e:98:44:fe:ef:8f:91:55:40:eb:ff: 46:b1:d5:19:7e:ce:c7:c5:d0:1d:42:22:0b:ed:49:fa: 1c:0e:09:64:53:58:47:dc:92:0f:98:12:6d:5a:68:3f: 31:d6:89:6a:66:42:1b:8f:6e:40:4e:3e:eb:ce:ed:4d: c5:25:63:86:78:bb:86:53:b5:fb:b7:7c:f1:0b:58:af: 75:1a:18:2d:d4:15:2b:25:47:da:88:0f:b5:0f:71:6c: 24:c5:b1:3c:c1:1d:5d:ba:1c:6a:f8:c0:f3:b6:68:17: eb:be:bc:7c:1a:52:b1:3e:a2:9b:80:11:c3:5c:c9:b3: c1:68:78:b9:2d:73:c8:c0:c9:c1:94:63:8b:d0:2e:d6: ee:b3:d1:b9:a0:f3:a3:9d:23:63:b9:2b:18:4f:f4:01: 39:b9:75:73:ba:07:09:5a:1b:6b:8c:b8:2c:a0:17:ea: ea:51:2f:44:d0:9a:13:71:f0:02:3f:43:90:ba:a2:bb: 3d:e2:1f:c1:4c:c4:4a:5e:58:bb:af:de:cb:cf:ac:61: 94:b8:94:d9:f6:ab:98:d3:50:d0:8e:23:27:04:6f:c8: 7c:b2:58:f0:74:78:cd:86:02:fa:ed:26:52:fc:2a:6d Fingerprint (SHA-256): B5:C9:8F:75:DD:67:73:DE:88:4F:57:6C:33:F9:D2:B9:8E:F6:BC:97:0F:0C:8D:0E:F9:17:73:E9:2F:57:DA:B4 Fingerprint (SHA1): 59:A9:25:CB:89:CA:12:5E:C9:8C:57:C7:37:88:8C:C5:DB:24:15:BA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #3879: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3880: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3881: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3882: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121335 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3883: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3884: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3885: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3886: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510121336 --extCP --extPM < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3887: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3888: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3889: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3890: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510121337 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3891: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3892: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3893: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3894: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 510121338 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3895: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3896: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3897: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3898: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3899: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3900: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121335 (0x1e67d577) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:17:27 2017 Not After : Tue May 10 12:17:27 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:7a:49:83:92:d7:ce:92:e6:54:42:9f:df:70:c5:2f: 4a:88:d0:b8:b8:89:b4:f6:c0:0e:fe:33:94:8e:9f:b9: d9:4a:86:74:15:2d:ee:65:04:38:c6:b9:b6:98:dc:6d: 2a:bc:82:f6:65:38:14:9e:36:23:dd:b0:98:0d:0c:8b: ea:21:4c:2f:a3:18:24:bd:43:05:83:55:9d:22:a9:f3: ce:d2:11:dd:96:2f:e9:72:62:81:62:88:0b:cb:b0:3b: 44:e6:2c:20:38:e3:1d:67:d5:5d:49:53:9b:4f:13:de: 24:7a:03:d7:0d:39:88:a9:99:07:74:e8:60:85:8b:dd: f2:c8:cf:81:40:77:1a:40:0f:15:2a:ef:e3:06:86:8b: 4d:ef:29:bc:68:03:ed:0c:ad:f4:f9:ae:40:40:b3:50: 08:d0:49:05:d3:9b:98:ac:8a:68:0c:1f:a3:07:f1:fe: e6:b3:c7:63:34:c2:ea:aa:78:8f:4a:af:63:66:89:bb: 1d:18:30:d8:3d:ee:39:9b:4a:40:64:d6:cf:90:2a:56: 8e:ad:45:eb:e6:c2:34:03:a3:50:9b:1d:13:44:72:7f: bd:5b:37:31:61:18:91:c6:c7:e6:36:49:fc:d1:77:3f: 2f:72:98:96:e6:8a:1e:11:b6:91:03:bb:5b:56:d1:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:cc:37:20:08:d1:13:68:9d:94:17:fb:80:60:00:fd: 6d:98:b4:f5:f5:f9:bc:6d:02:d1:31:f1:75:fd:b2:5f: 92:a2:ca:bb:4d:85:a6:39:d9:e0:8d:c9:37:f4:52:8a: 96:62:d7:ad:1a:68:4b:0d:da:3f:4b:f0:2c:7d:33:08: 17:4a:d6:64:2a:d1:c0:79:14:6b:85:f4:cb:ac:63:aa: 72:e0:c1:69:1b:d9:4f:e6:ab:cc:79:5c:5f:f2:79:0b: 62:a0:5f:e6:f0:47:52:45:73:6c:51:f6:3f:b7:98:fd: 4b:00:fd:a8:fb:65:a9:62:fd:8f:eb:52:e2:82:a8:6b: c0:fc:90:a4:d6:42:72:b7:17:34:e7:13:07:dd:c0:cd: 17:2a:ab:42:51:aa:9e:d9:9d:b3:94:3c:4a:c8:c1:c7: f4:8e:ac:6d:e1:02:0c:e5:e3:f9:d8:7b:a4:b1:90:fc: 08:9f:ea:06:fd:d2:7e:ce:71:7a:c5:d2:d8:e1:ff:48: 1b:09:20:2b:ed:35:b5:dc:29:e8:26:ec:d2:f0:0a:49: c3:ef:2c:8b:6e:3d:1e:e1:9a:41:87:df:f2:6a:62:cf: 39:78:8c:30:4a:98:af:c3:c0:3e:9f:c7:1e:22:03:29: b0:96:7b:40:50:49:ae:12:ec:5e:e0:18:66:87:2d:d8 Fingerprint (SHA-256): DF:48:FA:97:68:55:96:E2:2F:30:60:ED:60:3B:CB:4B:F6:F3:1D:D8:F9:A3:46:F0:88:3B:E3:83:80:F4:E4:2D Fingerprint (SHA1): FF:2E:A6:25:5F:F0:FA:16:BF:E9:27:6C:4D:49:66:D5:72:25:0A:C8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3901: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3902: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3903: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121336 (0x1e67d578) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:17:29 2017 Not After : Tue May 10 12:17:29 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:a1:91:0b:32:f0:29:17:c7:3f:b6:9a:c7:02:ea:a0: 4b:72:fc:33:51:26:df:36:dc:c1:8c:01:b4:a9:69:c6: be:92:a7:6d:d9:72:ea:4d:2b:36:58:95:ce:6f:6b:52: 80:d8:c2:6f:d3:64:28:d7:50:e8:a8:eb:65:c8:d3:f2: cb:a9:b2:8d:14:17:69:7d:18:39:59:49:09:d4:f5:7e: 4c:4e:98:6e:99:96:cc:4d:59:3c:0d:e4:43:f9:0d:80: 63:0d:4e:1c:16:06:3d:e7:55:fd:96:d5:ce:2a:5f:a9: fa:4d:5f:3c:55:62:f7:81:5c:87:a7:83:b8:de:c8:f7: c0:6d:e0:f0:82:6f:60:7d:3f:87:dd:dd:c8:76:51:94: 67:b6:8f:5a:d9:ed:39:e8:eb:ef:6c:aa:ff:94:ca:0d: 9b:4b:0d:98:4c:d0:1a:9d:4e:36:bf:d0:a6:67:7a:cc: 01:06:70:90:d6:e5:ef:ab:84:69:5c:ef:1a:13:e8:e4: 67:9c:1f:1c:d4:e6:1c:69:e2:10:d7:54:5d:fc:ff:c3: 79:13:4e:cc:6b:7c:9a:ea:b4:f4:7c:57:e3:5c:c4:ab: f9:9f:45:95:43:4d:7b:f8:bd:d1:8e:e0:ca:59:7f:7d: 73:37:81:f5:ff:24:e2:0d:7c:d2:ba:13:a9:02:e1:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:cc:80:08:e8:d9:2a:23:41:9e:f0:10:9a:fd:92:d1: 1c:bd:c8:6a:ad:a2:1d:51:bc:bc:eb:1c:1e:82:1f:62: 29:6f:a5:e1:b6:82:6f:e4:7d:b5:da:a1:3f:4b:e1:0d: 51:11:d7:a0:d2:c2:0d:b0:b1:79:29:16:a5:4b:65:6b: ba:90:b5:ce:07:f4:95:c1:1c:01:f0:96:ed:09:69:1a: 90:51:c5:70:dc:e3:86:3d:aa:1c:17:8e:43:27:a0:9a: ae:2f:ce:c1:6a:fc:38:2a:51:f6:6e:09:47:3b:39:d5: 7c:33:3b:42:b1:cb:9b:ff:3c:ca:82:52:8c:a8:8a:ed: 9d:d5:fc:32:b6:a4:e9:d9:24:74:0f:62:1e:5e:9b:ec: 8b:e5:7e:09:86:17:c8:dd:d1:e5:35:d3:dd:ee:90:f9: e6:71:ef:92:5d:82:1f:b3:90:f9:f6:d4:16:e1:ee:30: 55:9f:1d:77:94:11:ab:6d:69:e8:0a:9f:72:5b:8d:21: 15:88:e1:ad:5e:8e:01:3c:99:6f:54:1e:97:37:f4:d8: 43:87:f6:38:18:dd:51:98:bc:a0:13:08:1b:5d:d5:2f: fc:d7:7b:d5:58:0b:46:1d:8e:14:16:18:3a:54:dc:93: 51:7b:0a:e3:f4:96:be:4f:45:1a:6f:17:59:30:8b:42 Fingerprint (SHA-256): EC:31:F2:16:E7:AA:50:CC:F2:F1:C2:77:CC:A4:0F:F7:7C:AF:10:1E:7E:D3:2B:02:9B:FF:F5:87:EB:53:AF:76 Fingerprint (SHA1): A1:B7:49:B9:9D:93:C8:E3:00:B0:74:0F:FC:3A:44:F5:C8:67:F4:86 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3904: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3905: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121337 (0x1e67d579) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:17:30 2017 Not After : Tue May 10 12:17:30 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:ea:e9:e2:a8:33:fe:02:75:b4:a2:6b:17:02:42:6b: f6:6c:1d:e1:1c:46:39:00:d5:b6:4a:21:51:06:d7:5e: 4e:d5:8d:97:eb:eb:4b:6d:25:6b:f1:4a:d2:8c:55:58: ec:d8:12:62:80:b7:38:f6:85:8c:2a:13:78:54:32:19: 8c:dc:bb:87:e7:f1:68:07:24:cb:5b:0b:64:73:75:97: fd:c9:4a:5a:f0:c0:4e:f6:a1:b9:16:a8:22:07:50:1e: fd:db:2c:7b:8c:f9:1c:e4:05:7b:35:e4:a0:af:f8:5a: bf:67:a4:84:31:68:95:69:fc:1c:d0:45:74:63:22:73: 0b:55:c8:f4:2a:83:46:0e:e4:3c:0e:30:1b:d7:1b:c7: 1b:39:ed:5a:c1:f9:08:5a:80:3c:3d:22:0a:37:d1:ad: 45:11:e9:00:c4:8d:4e:25:bc:28:df:bb:c9:d2:f8:9d: 24:02:95:e1:30:6e:83:a2:ea:eb:ac:3a:0b:8f:4d:14: dc:e5:0e:ad:a6:68:c9:f2:fb:16:3d:80:58:21:d4:a2: be:23:e8:89:82:cb:c9:eb:37:ca:23:6e:3a:b4:03:07: 3f:1c:34:a1:a0:ce:b3:b8:cb:16:9c:bf:91:1e:f4:f5: a7:f6:f4:3b:11:2a:a5:cd:a4:f9:9c:18:cf:67:05:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:27:54:eb:50:27:22:60:ef:84:16:2e:cc:c2:2f:66: 06:6a:6b:54:0a:78:1b:9c:7c:45:7b:7f:24:58:9c:61: df:0b:9c:bf:c7:83:aa:a4:40:20:31:c0:27:67:49:b4: 8d:b1:10:25:2e:99:d3:fc:92:be:f0:bc:e0:9d:e0:b7: 91:f8:8e:7d:6d:8f:38:19:7f:bc:b5:cf:e9:c4:e9:6c: e6:13:86:fe:ef:6f:75:71:65:c4:ac:a1:80:6e:4b:a3: 74:b7:c5:ba:2e:49:15:9a:04:45:bb:c6:e4:b8:8b:ec: 3e:3f:e9:c3:47:35:bd:6a:92:cd:a8:77:eb:35:37:7a: 03:c1:cd:23:09:83:67:bb:31:1a:28:f0:5d:44:5f:07: e0:58:21:0c:da:6e:46:c2:6d:50:b9:b1:86:74:73:2d: 60:e1:f6:b5:49:0d:ac:7a:82:bf:c9:3f:5e:47:72:a1: 6e:0c:6f:b2:77:bd:e6:6c:41:24:ac:07:df:0b:3e:0b: 02:00:f7:31:8c:6f:48:a2:db:bf:17:fa:21:50:b4:20: 71:1e:17:ee:c6:65:34:4c:14:fa:57:01:61:88:a1:49: 27:12:54:37:5b:03:65:27:17:f2:bf:d3:3b:f4:26:b9: ca:4d:eb:d7:14:db:c2:c2:46:a6:67:ff:3c:e6:c5:a4 Fingerprint (SHA-256): D2:7B:8A:C8:49:E5:87:07:25:9C:A0:C2:DA:24:D4:84:F0:45:2F:70:6E:F8:58:6C:6F:06:1E:B4:92:48:56:6B Fingerprint (SHA1): 72:DF:43:5C:B3:61:77:55:00:C8:08:8B:82:EE:A6:61:15:BC:11:45 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #3906: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3907: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121339 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3908: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3909: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3910: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3911: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510121340 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3912: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3913: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3914: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3915: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510121341 --extCP --extPM < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3916: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3917: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #3918: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3919: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 510121342 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3920: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3921: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3922: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3923: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 510121343 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3924: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3925: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3926: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3927: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3928: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3929: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #3930: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121339 (0x1e67d57b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:17:35 2017 Not After : Tue May 10 12:17:35 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:1f:d8:07:c5:f1:97:ba:57:8a:3b:fb:e2:58:ab:76: e1:84:1b:b6:eb:8e:11:c0:80:3a:2c:5b:a8:a3:1e:f9: 31:d5:d8:c7:af:f3:a3:a8:cd:30:63:f7:54:57:b2:9b: b4:c9:af:69:12:ed:21:55:a9:bf:b5:f5:c5:96:a8:b1: e3:82:88:c0:b1:51:a0:db:dd:17:1d:51:34:b4:e6:44: 2b:85:73:d3:8e:e8:a2:ed:a8:ae:d8:02:67:e4:65:9b: b1:32:0f:27:89:45:7d:70:6a:ac:1a:a2:18:3d:ca:b8: 4f:54:60:bd:39:0a:ae:f9:dc:9b:36:fc:96:24:9b:93: ca:b9:bc:b8:35:bc:a6:dc:a8:be:81:28:1b:51:4b:4a: 83:c4:16:d7:a8:63:3b:bd:e4:84:78:3c:fe:ec:35:50: 1c:f7:de:52:af:44:11:07:34:dd:e7:94:54:c9:63:7a: 41:f6:a9:c2:bd:9a:27:b4:3e:73:ff:a7:88:33:85:8c: 74:b3:dd:b0:68:bb:ba:c7:c2:3b:a7:b9:a1:11:26:c2: a4:2f:75:37:32:da:11:33:7d:9f:c0:15:8a:82:04:91: 7f:60:60:9e:55:05:02:41:1a:a0:1a:d6:61:b9:88:4c: 30:fe:31:f4:02:76:5c:c2:e0:b5:a0:21:12:1e:3a:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 64:83:bf:8f:1f:38:a2:f8:62:d7:4e:08:fb:8e:c2:03: fa:80:9b:4a:a8:29:95:53:7f:f4:c3:0c:c6:f8:62:f9: 23:50:9e:64:f7:16:95:f9:f8:08:ee:6f:05:9e:6c:a6: 82:75:74:e7:60:7f:45:1b:a5:a3:eb:c0:bc:da:e0:41: 33:09:08:2e:15:ab:90:c1:48:bb:b6:4f:99:c7:53:c7: 8c:94:a8:89:b2:3f:ef:2d:98:f7:ea:2a:6b:e6:e8:c8: a7:d2:e8:c4:27:3e:79:61:9a:95:6c:2c:1e:81:82:f6: 31:9b:7b:cd:a0:c2:c2:af:c5:32:40:b7:bf:38:43:55: 22:90:8f:9e:94:ce:11:8c:84:21:31:ab:7c:e1:92:11: 78:1f:b3:63:e4:fe:26:29:93:29:84:06:16:1c:43:d8: 85:3b:6f:01:cf:65:3d:49:d3:7f:46:4a:81:53:51:e5: 55:d5:ec:4a:08:8b:ef:24:ca:86:cb:54:9f:5a:b0:d3: 32:53:ea:92:19:a1:43:f2:a0:e4:be:c2:42:ca:3c:29: ee:76:47:10:10:e3:1c:9e:d8:78:31:e3:5d:f9:6c:29: af:4b:b1:3a:cd:05:d3:bb:54:b3:33:bd:cb:69:f2:fd: ae:1f:2b:24:3c:2d:2f:42:4e:1f:a4:2c:5b:f7:0b:3b Fingerprint (SHA-256): 6E:32:24:14:8E:E4:32:D2:86:F2:06:C7:7F:62:32:CC:0E:2D:53:4D:35:88:0E:A3:FB:BF:6B:EE:87:FC:EC:A8 Fingerprint (SHA1): 5B:42:0B:FA:81:5E:B2:25:F9:05:36:92:29:E3:B1:40:C6:90:86:75 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3931: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3932: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121340 (0x1e67d57c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:17:36 2017 Not After : Tue May 10 12:17:36 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:2d:d7:c5:ee:78:50:5b:15:ea:8c:ad:76:e9:7b:fe: 02:80:85:a3:c2:a9:1b:88:52:16:e8:66:c4:a6:54:28: 00:1d:45:1a:5c:84:86:3e:61:b2:d5:c8:85:62:15:8a: 72:43:31:95:08:6b:6c:7f:23:b0:2d:f1:e4:8c:2f:02: 91:c0:52:21:5f:df:a6:26:d2:31:37:65:42:0a:75:60: 3b:ca:65:7e:af:86:8b:ef:26:1b:98:52:00:50:7d:85: 04:a7:61:13:6c:75:d2:16:36:9d:dc:0b:2e:38:e6:d4: 52:76:e6:6c:23:c6:48:4a:80:dd:2e:c2:73:3b:48:f7: a4:e4:8e:29:47:12:42:7f:af:d4:01:2a:aa:9b:50:d5: 69:02:ef:6e:3b:e0:50:c7:6a:33:6a:36:d8:32:a2:28: 91:83:19:c1:13:03:ae:cc:03:3f:bb:a4:c4:1d:ac:35: 0e:a3:0f:87:5c:31:df:25:b3:29:6a:be:4e:4a:75:74: 62:3d:f6:f4:87:61:4f:8c:3a:ab:e1:f5:65:88:47:26: 2f:39:d2:a0:1a:05:d6:98:4b:ef:fb:44:3e:f4:9b:a0: e8:19:06:16:f7:2c:c8:79:37:0c:7c:41:26:9d:32:4e: fc:e7:c5:7f:31:84:0a:37:62:fb:6a:0f:1f:ac:b9:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:50:7b:ce:80:3c:51:99:81:c5:49:2e:43:76:9c:1e: 1e:38:8c:51:06:7c:de:4b:4d:ff:9c:2c:5b:af:5f:ea: 7b:b4:92:69:82:ac:d4:9f:dc:44:b8:62:68:05:88:74: 21:dd:0b:cf:60:a0:09:e8:ab:83:2c:c0:9c:07:41:3f: 21:4d:d6:84:86:d4:43:6b:6f:4f:96:a5:3c:18:ca:b9: ee:e4:a4:84:9b:74:1f:a2:46:06:6a:dc:3a:6a:09:ec: 25:32:c9:bb:39:9c:21:07:68:af:a4:f6:c4:02:7c:13: 4d:e9:96:b3:93:82:ab:5b:ee:d8:f6:8a:0d:3f:3c:8c: a4:00:59:2b:8c:c4:bb:a5:a1:27:68:88:84:1d:bb:69: f0:44:44:cd:90:b4:b6:8a:ac:06:63:42:4c:a6:6c:c8: cd:5d:46:6b:3f:87:98:2f:8a:d8:1c:72:94:f8:6b:cd: c4:fe:0e:66:1c:b0:c3:a6:22:fb:c6:64:9c:56:0d:5c: 6e:2a:b1:22:0f:54:30:6a:7b:75:be:26:bb:b1:df:70: 09:d9:8d:c1:11:01:d5:95:df:45:42:11:78:c8:d8:b1: df:ae:79:34:82:dd:e4:78:52:fc:f0:e9:22:22:22:a3: a4:c5:e2:a3:4c:f1:c2:77:0f:40:5c:7d:e6:9b:64:f1 Fingerprint (SHA-256): 4C:CE:21:BA:75:8A:6A:1E:24:44:6B:5E:FE:7C:CC:5C:3B:CB:48:34:0D:BB:B8:56:70:65:EE:62:0F:F9:2F:7D Fingerprint (SHA1): 9A:F0:86:BE:E8:0E:5F:6A:76:C0:16:92:4B:7B:23:45:7C:F0:49:5B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3933: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3934: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3935: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121341 (0x1e67d57d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:17:37 2017 Not After : Tue May 10 12:17:37 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:c6:cb:1e:6e:72:53:1e:16:05:bd:0c:4e:27:46:4d: b1:58:dc:5d:cd:4b:f2:45:f1:0c:5d:a9:dd:64:71:5a: ff:de:7b:2c:07:78:f7:2c:fa:eb:1a:9f:40:ec:91:0b: ce:7f:46:97:5c:83:88:1b:b4:a5:39:5c:8e:bd:b0:f6: c0:9e:51:db:34:7b:e1:bd:5b:d8:59:dc:17:9f:eb:d3: 02:8c:a1:64:57:a2:4d:50:b7:44:65:bf:30:10:bf:ec: 67:5a:b3:75:a3:c4:46:d0:d0:ba:cc:52:0a:cd:3b:3a: bf:39:b9:3e:5c:e9:73:8d:06:31:db:2a:59:94:56:96: 13:9a:f1:16:33:31:a8:57:d0:0e:2e:e4:4a:88:f4:1d: 9a:b2:cf:3d:3a:c4:cc:b7:8a:37:57:0d:8e:2a:ad:b1: 06:54:45:c0:f9:a7:d6:74:af:14:37:14:cc:87:9b:0b: 4e:f1:74:ec:ea:3d:7e:71:55:0b:04:73:b4:ae:a2:c7: 79:bf:cc:2d:72:33:0e:90:38:bb:3d:c8:9b:89:0e:8e: ce:1f:95:8e:17:34:f1:68:fc:a2:41:42:60:78:f0:f9: f8:2f:11:bb:89:a9:c6:19:16:aa:1c:ab:29:38:40:ae: 30:37:a6:66:c7:e2:fa:cc:96:14:8a:dc:d4:01:fb:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3a:22:57:6e:fd:3a:c3:a2:f1:e4:f4:5b:f0:34:a0:f9: 11:bb:9d:23:b5:e1:b5:c7:01:4d:be:e9:94:48:13:ab: c2:3a:70:f9:43:21:a1:ec:a8:b1:8b:3e:98:bb:81:d1: 43:c9:f9:b6:47:82:aa:91:43:09:19:ed:11:af:23:f6: 74:64:ff:69:0e:52:47:53:4a:90:aa:73:9c:af:03:31: d3:fc:09:83:f6:d9:eb:54:f3:7c:ec:02:d7:0e:4b:73: ae:df:ab:98:f0:a6:3b:51:8c:e0:df:0b:ae:15:76:ec: 50:03:83:1f:70:6b:01:cf:71:af:6d:72:f9:24:51:3e: bc:fa:c9:1b:8d:4a:0c:68:fe:01:4c:31:8f:29:52:0c: 52:83:97:a6:81:08:b0:60:e3:a4:85:66:a9:f5:ac:d4: 07:91:b5:22:df:83:e4:18:18:61:57:44:12:7f:71:28: d2:cf:ee:e0:e0:80:d2:5d:92:87:9c:81:be:d2:ca:c6: 49:4d:13:4d:b7:bc:c5:a9:8c:2d:e5:bb:85:2c:d1:d1: a3:ea:04:85:b2:72:4e:80:4b:c1:f6:54:21:5c:dc:26: 65:7f:5c:fe:6a:12:c0:76:e4:8c:be:1d:ba:05:f4:66: d1:84:2a:c8:f8:77:92:c8:65:40:c1:f0:e1:54:77:f4 Fingerprint (SHA-256): 42:86:D0:10:97:66:8F:29:CA:20:27:77:80:43:70:B0:0F:4A:52:F9:76:4E:0C:1A:9D:DD:0E:29:48:9A:BC:96 Fingerprint (SHA1): 90:D7:B9:62:3A:81:FC:13:EB:7A:53:EE:97:CE:E7:E3:EF:64:C2:31 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #3936: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3937: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121344 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3938: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3939: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3940: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3941: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510121345 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3942: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3943: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3944: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3945: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510121346 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA1Root-510121123.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3946: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3947: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3948: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3949: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 510121347 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3950: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3951: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #3952: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121344 (0x1e67d580) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:17:41 2017 Not After : Tue May 10 12:17:41 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:84:85:e5:8c:74:c3:7e:15:1a:b4:57:b6:9d:6f:2e: 37:35:92:8d:31:af:f4:59:74:77:38:a4:5d:17:a7:e3: 76:3a:4b:38:ec:20:16:8b:b1:21:23:b0:9d:3e:4b:5d: 88:58:98:c4:60:1d:68:3f:e5:26:50:ae:63:89:17:18: 40:79:d0:c8:83:05:5f:b1:68:84:f2:34:2d:f9:df:da: 94:14:ca:d1:fc:19:00:bf:92:a9:e2:b8:2f:2a:10:23: 07:6b:33:d3:56:2b:d4:18:d4:75:c3:a0:ca:19:01:7b: 67:ce:d4:23:2a:93:3e:d1:de:61:93:70:e9:53:77:f5: 4e:9d:3e:ae:f4:ba:6c:94:62:5f:39:3e:18:0c:db:58: b3:28:38:1d:0d:90:18:b8:09:62:da:4d:a2:b1:f0:31: fe:9f:b3:03:d0:fc:67:55:cf:35:75:ac:d6:d1:32:28: 00:43:db:d0:a1:74:7c:19:02:8c:d6:17:03:5a:43:7a: 62:2a:cd:ed:e5:f1:41:7f:94:64:a0:1c:8a:47:64:d2: 32:f6:73:b5:fa:6b:1b:2e:50:04:de:9e:c1:ae:bc:3b: 5e:14:48:5d:c9:29:19:06:9b:48:af:31:09:23:ca:bf: d5:06:46:68:97:c2:7f:1d:55:7f:78:e2:5e:62:b2:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:dd:20:16:31:a5:4b:35:95:4c:8c:de:83:61:42:ca: 0f:93:ef:e8:42:e4:9a:34:27:20:76:8c:38:6f:ad:1d: f1:9d:a3:d7:74:ca:ea:83:0d:c8:ea:9a:c6:66:c8:d2: 96:0a:32:33:3b:8e:bd:0a:48:5c:f5:21:39:95:a6:45: 24:9c:20:3a:05:61:0d:98:9b:23:d7:80:7d:3c:e9:1a: 6e:94:9d:0a:4c:41:81:44:ee:f3:a6:17:24:01:4b:8c: 4c:20:3c:22:cc:10:a5:ea:52:ea:61:5b:3d:38:49:83: 10:5d:02:6d:b1:75:69:c5:17:9f:c9:75:c1:a5:77:a6: b5:0c:5d:66:68:c9:19:14:0d:1a:80:82:ce:a9:7a:71: 5b:46:63:ee:fa:1b:b2:c5:c7:1b:40:c0:b0:65:eb:2b: d8:4b:40:66:d6:39:58:79:2b:4a:e5:a4:f9:72:84:79: d0:4c:38:59:22:e5:7d:45:ec:5d:75:ab:8e:a2:f4:db: af:f9:a9:ff:97:f4:c2:fa:9b:ab:63:81:e9:68:6a:0c: 0d:82:49:1d:f2:22:1b:ca:47:40:cc:7b:df:12:c2:73: b0:ea:12:7b:2d:9a:8f:9c:3f:ed:ce:9f:d0:9f:62:bf: 64:ae:36:2f:0c:8e:4b:17:bd:b8:4e:01:07:7b:df:70 Fingerprint (SHA-256): 71:AA:B8:49:82:87:94:8A:FA:9C:29:01:D6:99:2F:B2:B0:CE:45:BE:99:C6:BD:06:CA:B3:E6:C4:CD:F5:6E:90 Fingerprint (SHA1): A8:CE:8C:1D:61:D2:8F:08:4E:E2:21:5C:53:E2:83:AD:73:CE:78:8E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3953: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3954: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121348 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3955: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3956: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3957: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121349 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3958: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3959: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3960: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3961: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 510121350 -7 Bridge@Army < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3962: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3963: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 510121351 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3964: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3965: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #3966: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3967: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3968: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 510121352 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-Bridge-510121124.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3969: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3970: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3971: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3972: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510121353 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3973: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3974: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #3975: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #3976: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121349 (0x1e67d585) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:17:48 2017 Not After : Tue May 10 12:17:48 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:58:ab:48:f9:e1:fe:f3:86:a7:fb:a8:13:5b:5b:69: bb:b1:7b:82:d0:1c:89:e2:79:c5:77:9d:ac:a0:47:a8: 45:df:58:5a:49:37:9b:7a:c8:57:65:32:56:60:7e:eb: 06:55:e3:df:d0:0f:5f:d9:25:24:98:20:f2:9e:ad:3e: 58:63:1b:ea:33:62:99:00:bb:35:b0:ba:d3:f1:43:05: bb:56:bb:7f:43:4c:55:c0:55:2d:a2:04:53:b5:ca:c0: 5b:d7:ff:2a:6a:47:90:8e:01:e3:f7:50:e6:8b:a8:95: aa:33:e3:a9:e0:fb:c1:6a:3c:05:cb:f3:8d:00:2e:1b: 72:57:51:79:8e:67:f8:48:b1:ef:24:a3:13:92:59:45: 4e:7b:1e:f8:ca:62:50:a9:06:d4:cc:68:b6:73:15:9e: 5c:f4:e0:0c:51:27:85:46:b4:1d:bd:05:9d:b5:ce:6f: 08:0c:d8:d9:0a:82:89:62:f6:01:55:bf:a8:e6:1a:d2: c6:04:e0:33:30:2f:bc:55:4e:8d:ec:30:8f:e8:14:ed: 83:5a:41:1c:60:83:7a:eb:8d:97:e4:c5:39:c6:5f:db: f4:39:15:d8:09:96:b9:be:9b:2c:ef:5b:9f:0f:2d:ca: 3b:99:f9:f3:a2:5e:ab:e9:42:c0:23:ca:5b:95:54:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:4d:ee:48:6a:71:ff:36:a9:7a:b4:af:99:c5:84:09: 66:44:b9:03:78:1e:f3:1d:35:10:83:5e:71:36:8f:9c: a7:cc:31:01:d1:20:73:96:b2:c2:56:b6:ec:04:db:5e: 2b:b4:f5:79:88:ac:16:0f:a1:f8:bd:2f:fb:47:41:23: c6:f4:df:3a:c2:c3:2a:ee:22:c4:00:ed:b4:95:f1:4d: d0:04:a6:95:10:51:bf:1d:18:54:f9:c8:2e:92:5f:2e: 2d:54:9a:13:0e:82:34:e6:81:ad:fd:2f:61:f4:bc:ea: d8:ec:2f:dd:5d:ed:f3:cd:fd:c7:62:fd:e6:57:36:12: 57:53:b0:8d:ad:95:50:b2:ee:17:0c:e6:2b:9d:47:76: e1:33:f7:3c:4e:ce:8f:e0:78:d8:2d:d3:8a:23:32:f3: e3:93:72:21:d0:f3:9b:17:4b:54:12:ca:0e:b8:2c:8f: cf:7d:4b:5f:90:56:36:d7:51:20:8b:7f:28:d1:c0:2d: b6:4f:d2:1d:43:9a:a1:f0:ad:a0:a8:35:b9:a7:5a:8e: 2d:0f:1e:1d:9c:8e:83:c8:bc:ae:e4:6f:76:f9:db:75: 22:df:e1:25:63:d2:b1:3a:c4:d9:19:71:0b:fd:6a:47: cb:7b:1a:16:9c:07:dc:60:52:e4:57:cd:85:f5:87:55 Fingerprint (SHA-256): 6C:7F:F9:65:27:3C:BA:10:CD:85:E6:AB:43:7F:AD:DE:E4:CA:EA:CA:6A:9E:9C:DD:4F:3A:1C:C6:EE:3B:07:CA Fingerprint (SHA1): 8A:A9:6A:CF:A6:2B:0A:37:7E:FC:9D:1D:40:C9:BC:E2:03:07:33:DB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3977: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121349 (0x1e67d585) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:17:48 2017 Not After : Tue May 10 12:17:48 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:58:ab:48:f9:e1:fe:f3:86:a7:fb:a8:13:5b:5b:69: bb:b1:7b:82:d0:1c:89:e2:79:c5:77:9d:ac:a0:47:a8: 45:df:58:5a:49:37:9b:7a:c8:57:65:32:56:60:7e:eb: 06:55:e3:df:d0:0f:5f:d9:25:24:98:20:f2:9e:ad:3e: 58:63:1b:ea:33:62:99:00:bb:35:b0:ba:d3:f1:43:05: bb:56:bb:7f:43:4c:55:c0:55:2d:a2:04:53:b5:ca:c0: 5b:d7:ff:2a:6a:47:90:8e:01:e3:f7:50:e6:8b:a8:95: aa:33:e3:a9:e0:fb:c1:6a:3c:05:cb:f3:8d:00:2e:1b: 72:57:51:79:8e:67:f8:48:b1:ef:24:a3:13:92:59:45: 4e:7b:1e:f8:ca:62:50:a9:06:d4:cc:68:b6:73:15:9e: 5c:f4:e0:0c:51:27:85:46:b4:1d:bd:05:9d:b5:ce:6f: 08:0c:d8:d9:0a:82:89:62:f6:01:55:bf:a8:e6:1a:d2: c6:04:e0:33:30:2f:bc:55:4e:8d:ec:30:8f:e8:14:ed: 83:5a:41:1c:60:83:7a:eb:8d:97:e4:c5:39:c6:5f:db: f4:39:15:d8:09:96:b9:be:9b:2c:ef:5b:9f:0f:2d:ca: 3b:99:f9:f3:a2:5e:ab:e9:42:c0:23:ca:5b:95:54:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:4d:ee:48:6a:71:ff:36:a9:7a:b4:af:99:c5:84:09: 66:44:b9:03:78:1e:f3:1d:35:10:83:5e:71:36:8f:9c: a7:cc:31:01:d1:20:73:96:b2:c2:56:b6:ec:04:db:5e: 2b:b4:f5:79:88:ac:16:0f:a1:f8:bd:2f:fb:47:41:23: c6:f4:df:3a:c2:c3:2a:ee:22:c4:00:ed:b4:95:f1:4d: d0:04:a6:95:10:51:bf:1d:18:54:f9:c8:2e:92:5f:2e: 2d:54:9a:13:0e:82:34:e6:81:ad:fd:2f:61:f4:bc:ea: d8:ec:2f:dd:5d:ed:f3:cd:fd:c7:62:fd:e6:57:36:12: 57:53:b0:8d:ad:95:50:b2:ee:17:0c:e6:2b:9d:47:76: e1:33:f7:3c:4e:ce:8f:e0:78:d8:2d:d3:8a:23:32:f3: e3:93:72:21:d0:f3:9b:17:4b:54:12:ca:0e:b8:2c:8f: cf:7d:4b:5f:90:56:36:d7:51:20:8b:7f:28:d1:c0:2d: b6:4f:d2:1d:43:9a:a1:f0:ad:a0:a8:35:b9:a7:5a:8e: 2d:0f:1e:1d:9c:8e:83:c8:bc:ae:e4:6f:76:f9:db:75: 22:df:e1:25:63:d2:b1:3a:c4:d9:19:71:0b:fd:6a:47: cb:7b:1a:16:9c:07:dc:60:52:e4:57:cd:85:f5:87:55 Fingerprint (SHA-256): 6C:7F:F9:65:27:3C:BA:10:CD:85:E6:AB:43:7F:AD:DE:E4:CA:EA:CA:6A:9E:9C:DD:4F:3A:1C:C6:EE:3B:07:CA Fingerprint (SHA1): 8A:A9:6A:CF:A6:2B:0A:37:7E:FC:9D:1D:40:C9:BC:E2:03:07:33:DB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3978: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3979: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121354 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3980: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3981: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3982: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121355 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3983: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3984: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3985: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3986: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 510121356 -7 Bridge@Army < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3987: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3988: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 510121357 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3989: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3990: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #3991: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3992: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3993: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 510121358 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-Bridge-510121125.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3994: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3995: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3996: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3997: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510121359 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3998: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3999: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4000: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4001: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 510121360 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-BridgeNavy-510121126.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4002: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4003: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #4004: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4005: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 510121361 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4006: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4007: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #4008: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #4009: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121355 (0x1e67d58b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:17:56 2017 Not After : Tue May 10 12:17:56 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:2b:a0:ac:26:f5:67:9f:06:66:61:38:ff:a2:db:0d: f1:4b:0a:76:0e:6f:f9:4e:4c:83:b2:5c:25:a7:62:e0: 6b:c0:28:48:84:12:98:b8:13:71:0d:f5:3b:1f:76:03: 1f:4f:94:13:7f:11:3e:84:01:d5:17:bb:10:67:67:53: 75:e4:03:03:c5:0b:1c:c6:99:9a:cf:dd:ed:66:75:69: 6d:b0:3c:f5:84:b1:e9:7b:ef:f5:27:16:44:3f:7a:c3: ee:80:14:0f:b4:b5:b4:25:df:65:25:4d:37:9f:58:74: 6d:c9:ec:d4:d0:01:4d:d2:1f:df:16:a8:c7:83:ce:75: 01:68:8b:49:f3:06:9e:ed:6e:85:44:e7:85:e7:08:bd: 0d:02:78:37:6f:ad:e9:42:8c:43:fc:0a:cb:c9:b2:b5: 7b:da:f3:66:f9:fd:40:51:85:77:d9:71:ce:04:c8:42: b4:73:ce:11:da:72:c3:62:62:4b:f3:6b:a0:eb:b9:ae: 15:28:7a:c1:50:31:8a:1d:f6:c6:d2:3a:4c:41:67:fb: 69:0b:6d:7e:6b:e4:78:0f:0e:53:94:df:a3:9e:0f:72: 88:eb:50:62:e6:54:ad:80:b4:56:ad:26:57:75:d1:01: 97:cd:14:9e:9d:b9:97:9c:08:7b:a6:7f:81:2f:c8:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:ea:7c:4a:93:d7:9f:8a:c2:a5:d7:26:b9:80:d6:7f: 03:b5:36:70:b8:ab:01:6d:67:0d:77:4f:1c:42:b4:b6: b2:fa:e2:dc:e8:96:d3:d6:d4:95:dc:28:ce:a1:08:0b: 5f:1c:85:ef:41:9a:40:30:0f:c0:12:36:03:39:44:a4: 7c:74:7d:12:14:86:15:4e:01:6f:70:1c:3b:05:ce:a9: 40:e7:ec:09:77:04:22:72:e4:77:6c:66:6c:9a:4d:bd: d1:1e:b3:4d:d2:86:8b:75:fc:d4:a8:21:09:07:e2:14: 67:8a:26:30:f1:77:7e:55:47:5a:19:b1:6b:45:3d:ef: 85:4c:b5:7f:73:d9:77:04:09:97:44:23:c9:75:b6:6a: c4:b9:b5:ff:7d:c8:a1:be:53:f5:7a:39:1b:51:20:63: 24:a6:ae:17:15:3d:be:f5:42:9f:f6:ed:99:a0:da:b6: a1:9e:d9:fa:20:48:1a:cb:46:92:14:1b:a1:fa:c8:08: 91:3a:1e:ff:f9:95:a3:32:ae:1f:f7:2a:61:d4:42:70: 4e:35:ed:55:61:d3:c4:e0:d9:53:33:b2:d1:dc:d8:29: dc:06:30:58:c4:80:92:54:b6:5f:75:09:e4:f9:f6:81: 2e:c3:1d:68:4e:f5:10:c8:47:f5:f3:e8:d5:02:0a:1c Fingerprint (SHA-256): 57:3A:0B:D6:7B:70:3C:DC:DB:04:21:00:E4:32:BD:B4:51:E6:A5:6F:5C:88:85:3A:C6:54:EC:59:FE:2E:6F:8E Fingerprint (SHA1): 51:70:D8:60:1E:9C:D4:9C:1A:27:54:AB:B3:B3:AF:A9:B8:71:53:A7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4010: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121355 (0x1e67d58b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:17:56 2017 Not After : Tue May 10 12:17:56 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:2b:a0:ac:26:f5:67:9f:06:66:61:38:ff:a2:db:0d: f1:4b:0a:76:0e:6f:f9:4e:4c:83:b2:5c:25:a7:62:e0: 6b:c0:28:48:84:12:98:b8:13:71:0d:f5:3b:1f:76:03: 1f:4f:94:13:7f:11:3e:84:01:d5:17:bb:10:67:67:53: 75:e4:03:03:c5:0b:1c:c6:99:9a:cf:dd:ed:66:75:69: 6d:b0:3c:f5:84:b1:e9:7b:ef:f5:27:16:44:3f:7a:c3: ee:80:14:0f:b4:b5:b4:25:df:65:25:4d:37:9f:58:74: 6d:c9:ec:d4:d0:01:4d:d2:1f:df:16:a8:c7:83:ce:75: 01:68:8b:49:f3:06:9e:ed:6e:85:44:e7:85:e7:08:bd: 0d:02:78:37:6f:ad:e9:42:8c:43:fc:0a:cb:c9:b2:b5: 7b:da:f3:66:f9:fd:40:51:85:77:d9:71:ce:04:c8:42: b4:73:ce:11:da:72:c3:62:62:4b:f3:6b:a0:eb:b9:ae: 15:28:7a:c1:50:31:8a:1d:f6:c6:d2:3a:4c:41:67:fb: 69:0b:6d:7e:6b:e4:78:0f:0e:53:94:df:a3:9e:0f:72: 88:eb:50:62:e6:54:ad:80:b4:56:ad:26:57:75:d1:01: 97:cd:14:9e:9d:b9:97:9c:08:7b:a6:7f:81:2f:c8:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:ea:7c:4a:93:d7:9f:8a:c2:a5:d7:26:b9:80:d6:7f: 03:b5:36:70:b8:ab:01:6d:67:0d:77:4f:1c:42:b4:b6: b2:fa:e2:dc:e8:96:d3:d6:d4:95:dc:28:ce:a1:08:0b: 5f:1c:85:ef:41:9a:40:30:0f:c0:12:36:03:39:44:a4: 7c:74:7d:12:14:86:15:4e:01:6f:70:1c:3b:05:ce:a9: 40:e7:ec:09:77:04:22:72:e4:77:6c:66:6c:9a:4d:bd: d1:1e:b3:4d:d2:86:8b:75:fc:d4:a8:21:09:07:e2:14: 67:8a:26:30:f1:77:7e:55:47:5a:19:b1:6b:45:3d:ef: 85:4c:b5:7f:73:d9:77:04:09:97:44:23:c9:75:b6:6a: c4:b9:b5:ff:7d:c8:a1:be:53:f5:7a:39:1b:51:20:63: 24:a6:ae:17:15:3d:be:f5:42:9f:f6:ed:99:a0:da:b6: a1:9e:d9:fa:20:48:1a:cb:46:92:14:1b:a1:fa:c8:08: 91:3a:1e:ff:f9:95:a3:32:ae:1f:f7:2a:61:d4:42:70: 4e:35:ed:55:61:d3:c4:e0:d9:53:33:b2:d1:dc:d8:29: dc:06:30:58:c4:80:92:54:b6:5f:75:09:e4:f9:f6:81: 2e:c3:1d:68:4e:f5:10:c8:47:f5:f3:e8:d5:02:0a:1c Fingerprint (SHA-256): 57:3A:0B:D6:7B:70:3C:DC:DB:04:21:00:E4:32:BD:B4:51:E6:A5:6F:5C:88:85:3A:C6:54:EC:59:FE:2E:6F:8E Fingerprint (SHA1): 51:70:D8:60:1E:9C:D4:9C:1A:27:54:AB:B3:B3:AF:A9:B8:71:53:A7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4011: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #4012: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121354 (0x1e67d58a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 12:17:54 2017 Not After : Tue May 10 12:17:54 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9e:0a:7e:62:c6:03:2d:d7:53:03:c8:d7:41:fa:67:91: 6c:79:6a:57:93:42:40:52:a5:0f:a6:34:d1:f4:27:b2: a2:e2:66:33:eb:58:71:13:4b:4a:e1:54:b8:fe:2c:cb: a3:95:23:41:8c:b9:bc:46:24:bd:8f:09:b8:e5:57:40: 44:74:eb:b7:b1:d1:cc:25:ee:97:65:5c:b5:86:1f:f6: 27:6f:89:dc:27:18:55:eb:ae:51:3a:55:cb:74:b4:51: 90:06:9c:0d:c2:af:95:c2:8d:0b:69:5d:e2:34:40:eb: 07:12:1b:02:d2:f6:2d:a6:ea:e5:bc:84:36:de:e5:00: b9:de:30:9d:07:2e:f2:96:12:84:f5:b4:ef:91:e2:b0: 00:29:26:2a:9a:d3:0d:32:e5:19:37:f8:b0:2c:ba:ae: c1:56:e9:56:e0:4b:52:2a:ae:d0:cc:9c:0b:41:7a:82: a8:7c:01:ae:46:40:ad:2b:5b:48:fc:eb:3d:2d:d6:11: 73:e0:78:39:c2:3b:a9:dd:74:70:7a:91:46:a0:9a:4d: d0:c0:f4:bd:c4:0c:76:a0:4f:de:3e:d7:db:af:2f:f2: 89:6b:7a:47:9f:95:ba:1e:be:9b:18:aa:7e:d5:3e:e5: 5b:00:79:40:42:4d:51:a0:52:1e:fe:7c:88:c7:88:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:3a:db:62:fe:66:ba:06:08:7c:53:4b:31:ab:ec:79: a2:17:92:de:66:10:9a:8e:48:03:23:3f:f0:74:c0:cd: ed:5c:c7:11:76:3d:3d:cb:93:ef:1e:8d:f7:b7:a4:ea: 0c:0c:5c:d0:79:dc:9d:d0:e4:68:3a:f4:b8:a1:9f:97: 5a:57:42:21:8b:90:43:00:91:97:9d:0e:51:ca:4a:16: 33:f6:b7:fb:52:c0:14:db:76:8d:79:89:f8:5f:d5:1d: ba:49:df:98:f3:05:59:f2:bc:31:91:96:87:84:96:ef: 19:b5:24:ea:2f:ea:24:3d:3f:ea:d8:68:dc:ff:e4:24: 29:6a:3d:d1:d5:e1:69:b4:57:40:f8:91:9c:30:3c:54: bc:1a:e5:7b:d6:b4:58:a9:c7:d8:61:85:4d:11:cc:de: 95:ee:30:47:b7:33:70:80:9c:7a:14:42:d4:5a:f5:23: b6:6c:6a:11:1c:c9:43:2e:1c:87:1f:ee:12:8c:e6:06: 25:b2:e6:13:0c:01:76:ef:5b:42:21:62:0b:64:d5:ff: 66:3b:71:57:1f:72:67:34:ad:4c:8b:79:30:89:bb:11: fc:22:e3:95:9f:8b:33:ce:f1:a0:00:3a:9e:91:1e:36: 85:84:bf:52:c8:fb:2a:9f:ec:75:cf:8a:a8:e8:cd:8c Fingerprint (SHA-256): D7:92:17:89:53:A6:BC:DC:18:45:F3:28:49:D5:34:E5:D6:E0:7A:0F:53:7C:AC:7A:CE:DB:26:42:B4:DA:A5:54 Fingerprint (SHA1): 51:50:E9:F1:5C:58:A3:49:13:21:EE:F5:94:DF:9A:1D:52:27:00:A9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4013: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121355 (0x1e67d58b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:17:56 2017 Not After : Tue May 10 12:17:56 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:2b:a0:ac:26:f5:67:9f:06:66:61:38:ff:a2:db:0d: f1:4b:0a:76:0e:6f:f9:4e:4c:83:b2:5c:25:a7:62:e0: 6b:c0:28:48:84:12:98:b8:13:71:0d:f5:3b:1f:76:03: 1f:4f:94:13:7f:11:3e:84:01:d5:17:bb:10:67:67:53: 75:e4:03:03:c5:0b:1c:c6:99:9a:cf:dd:ed:66:75:69: 6d:b0:3c:f5:84:b1:e9:7b:ef:f5:27:16:44:3f:7a:c3: ee:80:14:0f:b4:b5:b4:25:df:65:25:4d:37:9f:58:74: 6d:c9:ec:d4:d0:01:4d:d2:1f:df:16:a8:c7:83:ce:75: 01:68:8b:49:f3:06:9e:ed:6e:85:44:e7:85:e7:08:bd: 0d:02:78:37:6f:ad:e9:42:8c:43:fc:0a:cb:c9:b2:b5: 7b:da:f3:66:f9:fd:40:51:85:77:d9:71:ce:04:c8:42: b4:73:ce:11:da:72:c3:62:62:4b:f3:6b:a0:eb:b9:ae: 15:28:7a:c1:50:31:8a:1d:f6:c6:d2:3a:4c:41:67:fb: 69:0b:6d:7e:6b:e4:78:0f:0e:53:94:df:a3:9e:0f:72: 88:eb:50:62:e6:54:ad:80:b4:56:ad:26:57:75:d1:01: 97:cd:14:9e:9d:b9:97:9c:08:7b:a6:7f:81:2f:c8:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:ea:7c:4a:93:d7:9f:8a:c2:a5:d7:26:b9:80:d6:7f: 03:b5:36:70:b8:ab:01:6d:67:0d:77:4f:1c:42:b4:b6: b2:fa:e2:dc:e8:96:d3:d6:d4:95:dc:28:ce:a1:08:0b: 5f:1c:85:ef:41:9a:40:30:0f:c0:12:36:03:39:44:a4: 7c:74:7d:12:14:86:15:4e:01:6f:70:1c:3b:05:ce:a9: 40:e7:ec:09:77:04:22:72:e4:77:6c:66:6c:9a:4d:bd: d1:1e:b3:4d:d2:86:8b:75:fc:d4:a8:21:09:07:e2:14: 67:8a:26:30:f1:77:7e:55:47:5a:19:b1:6b:45:3d:ef: 85:4c:b5:7f:73:d9:77:04:09:97:44:23:c9:75:b6:6a: c4:b9:b5:ff:7d:c8:a1:be:53:f5:7a:39:1b:51:20:63: 24:a6:ae:17:15:3d:be:f5:42:9f:f6:ed:99:a0:da:b6: a1:9e:d9:fa:20:48:1a:cb:46:92:14:1b:a1:fa:c8:08: 91:3a:1e:ff:f9:95:a3:32:ae:1f:f7:2a:61:d4:42:70: 4e:35:ed:55:61:d3:c4:e0:d9:53:33:b2:d1:dc:d8:29: dc:06:30:58:c4:80:92:54:b6:5f:75:09:e4:f9:f6:81: 2e:c3:1d:68:4e:f5:10:c8:47:f5:f3:e8:d5:02:0a:1c Fingerprint (SHA-256): 57:3A:0B:D6:7B:70:3C:DC:DB:04:21:00:E4:32:BD:B4:51:E6:A5:6F:5C:88:85:3A:C6:54:EC:59:FE:2E:6F:8E Fingerprint (SHA1): 51:70:D8:60:1E:9C:D4:9C:1A:27:54:AB:B3:B3:AF:A9:B8:71:53:A7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4014: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121355 (0x1e67d58b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:17:56 2017 Not After : Tue May 10 12:17:56 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:2b:a0:ac:26:f5:67:9f:06:66:61:38:ff:a2:db:0d: f1:4b:0a:76:0e:6f:f9:4e:4c:83:b2:5c:25:a7:62:e0: 6b:c0:28:48:84:12:98:b8:13:71:0d:f5:3b:1f:76:03: 1f:4f:94:13:7f:11:3e:84:01:d5:17:bb:10:67:67:53: 75:e4:03:03:c5:0b:1c:c6:99:9a:cf:dd:ed:66:75:69: 6d:b0:3c:f5:84:b1:e9:7b:ef:f5:27:16:44:3f:7a:c3: ee:80:14:0f:b4:b5:b4:25:df:65:25:4d:37:9f:58:74: 6d:c9:ec:d4:d0:01:4d:d2:1f:df:16:a8:c7:83:ce:75: 01:68:8b:49:f3:06:9e:ed:6e:85:44:e7:85:e7:08:bd: 0d:02:78:37:6f:ad:e9:42:8c:43:fc:0a:cb:c9:b2:b5: 7b:da:f3:66:f9:fd:40:51:85:77:d9:71:ce:04:c8:42: b4:73:ce:11:da:72:c3:62:62:4b:f3:6b:a0:eb:b9:ae: 15:28:7a:c1:50:31:8a:1d:f6:c6:d2:3a:4c:41:67:fb: 69:0b:6d:7e:6b:e4:78:0f:0e:53:94:df:a3:9e:0f:72: 88:eb:50:62:e6:54:ad:80:b4:56:ad:26:57:75:d1:01: 97:cd:14:9e:9d:b9:97:9c:08:7b:a6:7f:81:2f:c8:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:ea:7c:4a:93:d7:9f:8a:c2:a5:d7:26:b9:80:d6:7f: 03:b5:36:70:b8:ab:01:6d:67:0d:77:4f:1c:42:b4:b6: b2:fa:e2:dc:e8:96:d3:d6:d4:95:dc:28:ce:a1:08:0b: 5f:1c:85:ef:41:9a:40:30:0f:c0:12:36:03:39:44:a4: 7c:74:7d:12:14:86:15:4e:01:6f:70:1c:3b:05:ce:a9: 40:e7:ec:09:77:04:22:72:e4:77:6c:66:6c:9a:4d:bd: d1:1e:b3:4d:d2:86:8b:75:fc:d4:a8:21:09:07:e2:14: 67:8a:26:30:f1:77:7e:55:47:5a:19:b1:6b:45:3d:ef: 85:4c:b5:7f:73:d9:77:04:09:97:44:23:c9:75:b6:6a: c4:b9:b5:ff:7d:c8:a1:be:53:f5:7a:39:1b:51:20:63: 24:a6:ae:17:15:3d:be:f5:42:9f:f6:ed:99:a0:da:b6: a1:9e:d9:fa:20:48:1a:cb:46:92:14:1b:a1:fa:c8:08: 91:3a:1e:ff:f9:95:a3:32:ae:1f:f7:2a:61:d4:42:70: 4e:35:ed:55:61:d3:c4:e0:d9:53:33:b2:d1:dc:d8:29: dc:06:30:58:c4:80:92:54:b6:5f:75:09:e4:f9:f6:81: 2e:c3:1d:68:4e:f5:10:c8:47:f5:f3:e8:d5:02:0a:1c Fingerprint (SHA-256): 57:3A:0B:D6:7B:70:3C:DC:DB:04:21:00:E4:32:BD:B4:51:E6:A5:6F:5C:88:85:3A:C6:54:EC:59:FE:2E:6F:8E Fingerprint (SHA1): 51:70:D8:60:1E:9C:D4:9C:1A:27:54:AB:B3:B3:AF:A9:B8:71:53:A7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4015: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #4016: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121362 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4017: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #4018: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #4019: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121363 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4020: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #4021: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #4022: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4023: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 510121364 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4024: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4025: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #4026: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4027: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 510121365 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4028: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4029: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #4030: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4031: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 510121366 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #4032: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4033: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 510121367 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #4034: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4035: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #4036: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4037: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4038: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 510121368 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4039: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4040: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4041: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4042: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 510121369 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4043: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4044: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4045: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4046: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510121370 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4047: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4048: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #4049: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4050: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 510121371 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4051: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4052: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4053: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121362 (0x1e67d592) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 12:18:05 2017 Not After : Tue May 10 12:18:05 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:e3:a3:3f:2e:76:58:d1:7d:a9:97:74:f3:ee:e4:4e: e0:2b:4c:1b:c2:b2:70:8c:da:eb:65:aa:ab:51:d7:0b: fc:6e:b2:18:9f:11:92:74:ee:2b:3b:f1:1a:50:da:3d: ac:1c:42:8f:1f:9d:87:fe:75:cd:6a:5f:1d:4b:cb:0d: dd:ac:54:a0:a4:68:a8:9d:e1:56:53:91:5f:cc:91:51: 9a:ab:84:7c:b9:88:14:a4:89:39:e2:c4:58:56:ff:1e: 69:f6:c7:fb:52:f7:ae:e0:0b:8f:13:7c:1d:10:0e:99: 0b:04:5a:27:16:6a:e2:d7:b6:8a:e4:7f:4a:1d:f7:5b: 38:8d:06:09:ca:e4:bf:f2:56:60:3e:f1:bd:94:e2:7e: 2d:2b:09:16:aa:6b:81:c6:23:77:8e:3e:75:2c:58:2b: ad:03:ea:5f:b8:5c:29:f5:41:61:19:cc:7b:51:f9:ad: 50:99:dc:ab:08:25:07:19:c6:20:a6:6a:da:5a:18:be: 00:c1:13:fe:29:9e:f6:47:f8:1a:e1:9e:64:85:43:14: cb:cc:ad:f0:bd:b6:b5:e0:b6:3c:79:ad:b9:ac:a0:f9: c4:95:f3:5e:c7:cc:be:51:45:74:71:26:18:a1:ef:2f: 36:dd:3c:17:fb:2a:33:b7:15:18:ec:58:74:22:37:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2c:d4:97:af:f4:50:7c:21:6b:5b:fa:60:d1:6e:b3: 6d:a9:05:4f:8f:ab:7c:00:8c:57:aa:40:e7:f2:92:8e: f3:f7:6a:f2:12:65:03:10:e2:80:b7:fb:8e:83:e3:a3: 6b:8f:89:3d:a4:49:a8:48:77:d9:ae:c3:d7:d6:40:8e: 3e:98:88:51:ad:fa:7e:2f:4d:29:14:4b:19:da:47:5c: 06:05:cd:ed:17:91:15:7d:d6:47:7e:29:0d:da:93:5c: 4b:35:41:91:7f:b3:38:dd:ea:fa:b1:f9:e0:6b:b2:b3: 04:80:89:77:81:ab:d7:13:91:ea:00:be:7e:79:94:5c: dc:5a:28:23:16:72:10:7f:c0:dd:b0:2c:cd:fa:01:8e: 32:ce:49:dd:2e:1c:0c:04:17:70:0e:8c:cc:fe:34:13: a2:ee:47:ce:18:f3:19:1e:c4:b3:d0:23:57:94:48:b5: 62:1d:fc:95:fd:76:eb:7a:b1:7e:9d:13:d6:4d:69:76: 30:06:44:c3:e4:02:ec:c2:0f:09:93:ca:16:dc:74:6f: a9:9d:6f:83:c4:d6:28:40:b6:22:dd:e6:73:fe:c4:3c: 67:98:e7:b0:b6:82:2d:93:08:be:db:d7:a5:07:17:9d: 58:f5:cb:dd:d9:86:ca:57:9b:92:e9:69:ff:15:85:57 Fingerprint (SHA-256): F3:16:45:07:89:93:2E:30:B3:B7:9A:61:3F:3D:57:C9:BF:1B:5D:0C:A3:69:04:16:81:E0:FC:E0:9B:FB:88:4E Fingerprint (SHA1): F3:D4:A6:31:22:68:FC:8D:42:5B:32:7D:2B:28:59:77:F3:C1:A6:75 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #4054: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4055: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4056: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4057: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4058: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4059: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4060: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4061: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4062: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121363 (0x1e67d593) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:18:06 2017 Not After : Tue May 10 12:18:06 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:e9:48:14:60:e7:0e:b9:30:95:7e:81:9d:ee:eb:a9: f0:68:87:1e:86:3f:05:e8:4f:a3:a4:bf:a6:c0:a4:05: 9e:f7:36:c7:32:6b:07:89:7e:b2:11:be:aa:fb:64:78: 0e:33:45:99:e4:fc:0c:ff:2f:f9:2e:b8:16:96:ba:13: cf:40:2c:5d:16:bd:cc:a6:96:f7:32:5e:b4:6e:7f:74: b8:63:28:e5:58:43:42:de:f1:ff:48:d0:36:f6:a1:74: 6a:b8:e0:a4:18:72:97:68:65:24:d1:79:84:dd:6f:64: 42:1b:27:9c:83:cf:ca:63:4c:c1:3f:25:07:50:97:61: a3:f0:b9:52:77:84:27:63:b4:c5:2c:67:da:6f:1f:db: d1:bd:ff:88:35:f7:78:21:b1:39:37:cc:55:db:1e:ae: f6:bc:68:0e:27:25:ef:8b:c2:8d:bb:14:5d:7c:6f:a2: 75:70:52:a9:73:a3:30:a8:33:7d:b1:ef:a2:a7:cc:c5: ff:f6:2d:68:51:15:72:86:3b:68:42:4d:8c:64:c7:87: 10:c3:07:13:48:6d:35:ec:e2:b5:24:21:7f:31:73:d3: 45:80:9f:93:23:4c:84:37:d0:36:bb:b2:8b:22:99:25: 1f:dd:c2:ff:c6:26:ae:89:d3:4e:0a:fb:e1:6f:06:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a0:d4:5e:5d:aa:20:6e:8b:b4:c2:b6:1f:4d:dd:27:27: db:33:69:3c:f7:dc:cb:d0:86:f4:26:d1:fb:a0:52:90: 77:d3:23:93:d4:3a:04:23:2e:10:b2:5f:44:50:03:68: 25:eb:26:44:19:cb:fa:17:26:34:44:f5:c5:a0:f8:40: b6:3d:1d:72:b5:36:be:35:14:5a:19:17:36:43:90:40: 09:df:70:c8:e6:c5:01:d4:de:98:1c:7a:9b:9d:01:2d: 7d:89:2c:22:b1:66:31:54:a8:2c:f5:1e:48:5e:b1:89: 18:ab:bf:09:94:e9:bf:23:05:f3:c6:b7:3a:94:f3:13: 6f:d1:28:d4:77:a4:66:9e:65:dc:9c:54:2c:0c:9f:37: 37:51:d3:4b:cc:b4:53:47:43:13:36:bb:38:f3:9d:d8: f0:fe:48:3a:51:8a:4f:66:6f:32:c1:b4:86:14:13:f9: 04:21:34:86:d5:d8:7d:0d:d6:b5:32:c9:d8:68:ec:a1: d7:72:2d:38:c7:a8:06:78:f4:39:11:7f:5f:f6:47:05: b7:81:ce:f9:e4:8b:1d:5e:dd:cd:c0:0c:b7:5d:e8:4b: 85:b0:cd:b1:35:41:c7:36:8e:5a:7d:a4:4c:72:66:01: 3a:dd:f8:3c:23:6c:7b:94:a0:73:57:e9:5e:1a:c8:5e Fingerprint (SHA-256): 5E:D4:3C:82:7D:79:CB:F5:9F:62:9F:D2:57:78:C0:0B:61:1B:63:F3:2F:AF:B6:04:E8:9F:F7:DE:2E:EE:D2:0B Fingerprint (SHA1): 5F:E1:66:B6:DC:2B:A1:EA:36:D8:FD:AE:6D:B0:0A:E6:E2:E6:C0:73 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #4063: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4064: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4065: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4066: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4067: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4068: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4069: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #4070: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #4071: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #4072: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #4073: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #4074: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #4075: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #4076: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #4077: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #4078: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #4079: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #4080: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4081: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121372 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4082: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4083: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4084: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4085: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510121373 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4086: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4087: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4088: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4089: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510121374 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4090: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4091: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4092: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4093: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 510121375 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4094: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4095: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #4096: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4097: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 510121376 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4098: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4099: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #4100: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4101: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 510121377 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4102: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4103: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #4104: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4105: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 510121378 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4106: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4107: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #4108: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4109: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 510121379 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4110: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4111: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #4112: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4113: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 510121380 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4114: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4115: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4116: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121372 (0x1e67d59c) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:18:21 2017 Not After : Tue May 10 12:18:21 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 8e:f1:fc:07:84:2a:36:67:fc:31:23:35:79:40:50:33: f8:5f:26:12:f3:0d:e8:27:1d:54:3c:d3:47:31:b7:03: ab:91:bd:0c:83:4f:f5:96:2f:d1:90:8d:f7:e4:4f:86: d1:8b:e2:36:7d:76:c6:3c:eb:11:6e:fb:a0:2b:b8:a3: cb:b1:64:47:92:6d:a7:3c:94:50:f7:c3:a2:9d:1e:51: cc:cb:92:b9:7c:76:77:d0:ea:9e:30:0a:b3:c4:6d:10: f2:91:1f:6f:db:79:52:f3:c0:f9:17:8f:a2:71:57:6d: 37:58:06:f6:87:97:e1:54:90:0c:b0:e5:17:91:d0:f2: 27:81:3b:25:df:19:76:97:2c:55:08:4c:f6:33:c5:d2: 5e:23:5d:c9:44:b6:03:52:50:40:43:90:a3:b9:e6:fa: 84:52:06:04:e0:91:23:a9:43:51:68:17:58:74:ac:4e: 67:11:2b:2b:33:6e:75:ac:da:36:69:06:d7:3b:ea:29: a7:df:a2:5c:a6:48:11:21:1a:d6:5b:88:31:62:58:ca: 20:af:cf:8e:2e:97:ad:93:c3:67:37:c8:90:85:cb:90: 20:44:7c:4e:59:1a:e8:6e:0c:99:78:e6:a6:58:5b:f5: 1e:4c:92:82:a4:39:90:88:08:4d:98:31:78:5b:a2:62 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1d:00:ad:0b:16:ec:5a:92:35:7e:19:b3:5b: 86:49:80:c8:0b:18:32:a6:cc:3b:7e:a6:ec:19:69:b1: d1:02:1c:42:c6:07:45:d0:cd:b9:2f:1d:67:91:b3:ee: 2d:2c:cd:4d:f6:9d:ea:83:df:7e:c4:9a:99:2f:ae Fingerprint (SHA-256): D6:D4:41:68:BF:90:B2:F2:15:50:34:CE:2D:36:E0:73:9A:6B:98:20:C3:33:65:B4:A7:15:10:20:65:BD:5E:36 Fingerprint (SHA1): FF:1C:EA:F9:85:A1:EC:98:C7:C0:69:A1:4B:E8:C6:33:D4:96:FF:F6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4117: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121372 (0x1e67d59c) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:18:21 2017 Not After : Tue May 10 12:18:21 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 8e:f1:fc:07:84:2a:36:67:fc:31:23:35:79:40:50:33: f8:5f:26:12:f3:0d:e8:27:1d:54:3c:d3:47:31:b7:03: ab:91:bd:0c:83:4f:f5:96:2f:d1:90:8d:f7:e4:4f:86: d1:8b:e2:36:7d:76:c6:3c:eb:11:6e:fb:a0:2b:b8:a3: cb:b1:64:47:92:6d:a7:3c:94:50:f7:c3:a2:9d:1e:51: cc:cb:92:b9:7c:76:77:d0:ea:9e:30:0a:b3:c4:6d:10: f2:91:1f:6f:db:79:52:f3:c0:f9:17:8f:a2:71:57:6d: 37:58:06:f6:87:97:e1:54:90:0c:b0:e5:17:91:d0:f2: 27:81:3b:25:df:19:76:97:2c:55:08:4c:f6:33:c5:d2: 5e:23:5d:c9:44:b6:03:52:50:40:43:90:a3:b9:e6:fa: 84:52:06:04:e0:91:23:a9:43:51:68:17:58:74:ac:4e: 67:11:2b:2b:33:6e:75:ac:da:36:69:06:d7:3b:ea:29: a7:df:a2:5c:a6:48:11:21:1a:d6:5b:88:31:62:58:ca: 20:af:cf:8e:2e:97:ad:93:c3:67:37:c8:90:85:cb:90: 20:44:7c:4e:59:1a:e8:6e:0c:99:78:e6:a6:58:5b:f5: 1e:4c:92:82:a4:39:90:88:08:4d:98:31:78:5b:a2:62 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1d:00:ad:0b:16:ec:5a:92:35:7e:19:b3:5b: 86:49:80:c8:0b:18:32:a6:cc:3b:7e:a6:ec:19:69:b1: d1:02:1c:42:c6:07:45:d0:cd:b9:2f:1d:67:91:b3:ee: 2d:2c:cd:4d:f6:9d:ea:83:df:7e:c4:9a:99:2f:ae Fingerprint (SHA-256): D6:D4:41:68:BF:90:B2:F2:15:50:34:CE:2D:36:E0:73:9A:6B:98:20:C3:33:65:B4:A7:15:10:20:65:BD:5E:36 Fingerprint (SHA1): FF:1C:EA:F9:85:A1:EC:98:C7:C0:69:A1:4B:E8:C6:33:D4:96:FF:F6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4118: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121372 (0x1e67d59c) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:18:21 2017 Not After : Tue May 10 12:18:21 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 8e:f1:fc:07:84:2a:36:67:fc:31:23:35:79:40:50:33: f8:5f:26:12:f3:0d:e8:27:1d:54:3c:d3:47:31:b7:03: ab:91:bd:0c:83:4f:f5:96:2f:d1:90:8d:f7:e4:4f:86: d1:8b:e2:36:7d:76:c6:3c:eb:11:6e:fb:a0:2b:b8:a3: cb:b1:64:47:92:6d:a7:3c:94:50:f7:c3:a2:9d:1e:51: cc:cb:92:b9:7c:76:77:d0:ea:9e:30:0a:b3:c4:6d:10: f2:91:1f:6f:db:79:52:f3:c0:f9:17:8f:a2:71:57:6d: 37:58:06:f6:87:97:e1:54:90:0c:b0:e5:17:91:d0:f2: 27:81:3b:25:df:19:76:97:2c:55:08:4c:f6:33:c5:d2: 5e:23:5d:c9:44:b6:03:52:50:40:43:90:a3:b9:e6:fa: 84:52:06:04:e0:91:23:a9:43:51:68:17:58:74:ac:4e: 67:11:2b:2b:33:6e:75:ac:da:36:69:06:d7:3b:ea:29: a7:df:a2:5c:a6:48:11:21:1a:d6:5b:88:31:62:58:ca: 20:af:cf:8e:2e:97:ad:93:c3:67:37:c8:90:85:cb:90: 20:44:7c:4e:59:1a:e8:6e:0c:99:78:e6:a6:58:5b:f5: 1e:4c:92:82:a4:39:90:88:08:4d:98:31:78:5b:a2:62 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1d:00:ad:0b:16:ec:5a:92:35:7e:19:b3:5b: 86:49:80:c8:0b:18:32:a6:cc:3b:7e:a6:ec:19:69:b1: d1:02:1c:42:c6:07:45:d0:cd:b9:2f:1d:67:91:b3:ee: 2d:2c:cd:4d:f6:9d:ea:83:df:7e:c4:9a:99:2f:ae Fingerprint (SHA-256): D6:D4:41:68:BF:90:B2:F2:15:50:34:CE:2D:36:E0:73:9A:6B:98:20:C3:33:65:B4:A7:15:10:20:65:BD:5E:36 Fingerprint (SHA1): FF:1C:EA:F9:85:A1:EC:98:C7:C0:69:A1:4B:E8:C6:33:D4:96:FF:F6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #4119: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121372 (0x1e67d59c) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:18:21 2017 Not After : Tue May 10 12:18:21 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 8e:f1:fc:07:84:2a:36:67:fc:31:23:35:79:40:50:33: f8:5f:26:12:f3:0d:e8:27:1d:54:3c:d3:47:31:b7:03: ab:91:bd:0c:83:4f:f5:96:2f:d1:90:8d:f7:e4:4f:86: d1:8b:e2:36:7d:76:c6:3c:eb:11:6e:fb:a0:2b:b8:a3: cb:b1:64:47:92:6d:a7:3c:94:50:f7:c3:a2:9d:1e:51: cc:cb:92:b9:7c:76:77:d0:ea:9e:30:0a:b3:c4:6d:10: f2:91:1f:6f:db:79:52:f3:c0:f9:17:8f:a2:71:57:6d: 37:58:06:f6:87:97:e1:54:90:0c:b0:e5:17:91:d0:f2: 27:81:3b:25:df:19:76:97:2c:55:08:4c:f6:33:c5:d2: 5e:23:5d:c9:44:b6:03:52:50:40:43:90:a3:b9:e6:fa: 84:52:06:04:e0:91:23:a9:43:51:68:17:58:74:ac:4e: 67:11:2b:2b:33:6e:75:ac:da:36:69:06:d7:3b:ea:29: a7:df:a2:5c:a6:48:11:21:1a:d6:5b:88:31:62:58:ca: 20:af:cf:8e:2e:97:ad:93:c3:67:37:c8:90:85:cb:90: 20:44:7c:4e:59:1a:e8:6e:0c:99:78:e6:a6:58:5b:f5: 1e:4c:92:82:a4:39:90:88:08:4d:98:31:78:5b:a2:62 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1d:00:ad:0b:16:ec:5a:92:35:7e:19:b3:5b: 86:49:80:c8:0b:18:32:a6:cc:3b:7e:a6:ec:19:69:b1: d1:02:1c:42:c6:07:45:d0:cd:b9:2f:1d:67:91:b3:ee: 2d:2c:cd:4d:f6:9d:ea:83:df:7e:c4:9a:99:2f:ae Fingerprint (SHA-256): D6:D4:41:68:BF:90:B2:F2:15:50:34:CE:2D:36:E0:73:9A:6B:98:20:C3:33:65:B4:A7:15:10:20:65:BD:5E:36 Fingerprint (SHA1): FF:1C:EA:F9:85:A1:EC:98:C7:C0:69:A1:4B:E8:C6:33:D4:96:FF:F6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #4120: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4121: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4122: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4123: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #4124: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4125: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4126: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4127: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4128: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4129: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4130: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4131: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #4132: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4133: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4134: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4135: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #4136: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4137: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4138: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4139: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4140: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4141: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4142: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4143: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #4144: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4145: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4146: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4147: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20170510121834Z nextupdate=20180510121834Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed May 10 12:18:34 2017 Next Update: Thu May 10 12:18:34 2018 CRL Extensions: chains.sh: #4148: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510121834Z nextupdate=20180510121834Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 12:18:34 2017 Next Update: Thu May 10 12:18:34 2018 CRL Extensions: chains.sh: #4149: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170510121835Z nextupdate=20180510121835Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed May 10 12:18:35 2017 Next Update: Thu May 10 12:18:35 2018 CRL Extensions: chains.sh: #4150: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20170510121835Z nextupdate=20180510121835Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed May 10 12:18:35 2017 Next Update: Thu May 10 12:18:35 2018 CRL Extensions: chains.sh: #4151: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170510121836Z addcert 14 20170510121836Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed May 10 12:18:36 2017 Next Update: Thu May 10 12:18:35 2018 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Wed May 10 12:18:36 2017 CRL Extensions: chains.sh: #4152: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510121837Z addcert 15 20170510121837Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 12:18:37 2017 Next Update: Thu May 10 12:18:34 2018 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Wed May 10 12:18:37 2017 CRL Extensions: chains.sh: #4153: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4154: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4155: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #4156: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #4157: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #4158: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #4159: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #4160: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #4161: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #4162: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:18:28 2017 Not After : Tue May 10 12:18:28 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:f6:1e:04:a0:78:d9:27:d6:b7:77:65:27:6f:92:22: 93:bc:b0:f0:6c:cb:1d:95:df:10:94:64:a9:68:10:17: 48:e7:3b:3b:4f:b3:00:d8:b6:3c:d1:e7:6d:0c:4f:b4: f8:c3:d3:70:7b:08:24:41:b8:f1:a8:07:3c:5f:a8:89: 2e:f9:49:ca:ed:5b:62:0e:a7:18:32:a5:50:80:ff:50: 38:ce:be:00:a0:a4:50:ef:f4:53:7f:94:5c:a0:2a:32: 2b:4f:97:71:b3:e4:6b:87:5d:cc:da:ee:c3:f2:c6:74: cb:47:ee:09:79:55:b2:c7:7f:07:8a:64:d1:7b:d3:4e: 30:d4:5a:06:2e:7b:fa:0c:00:a0:f0:48:b1:73:de:d1: cd:1a:2e:a4:1c:61:34:d4:10:c2:8f:55:41:e0:88:46: 90:2c:1e:70:0e:44:bb:88:b1:6c:eb:e2:5a:b1:93:8d: e9:da:45:ac:69:02:8e:ba:58:6a:32:9b:3a:d8:d5:97: 70:58:c8:b0:7e:21:cb:a8:57:c1:73:ac:77:ec:ff:d3: 5c:91:49:71:7c:e7:2f:7e:2f:53:ee:3b:56:32:86:2d: 4e:9f:61:cd:9c:4d:57:e1:75:2c:d2:b4:cf:f6:f7:3b: 87:67:25:b0:a6:f3:2c:5a:c4:cb:05:75:62:5c:f0:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b7:b8:c4:a5:c7:a9:07:8f:05:96:ed:ea:3e:b2:98:f4: a0:fc:18:ce:eb:d4:a1:80:5d:82:aa:ba:c2:6d:3b:e0: 5a:2b:59:48:5d:96:08:04:f6:83:6e:f6:9f:c7:6d:55: 48:a9:a2:3c:ba:3b:56:2f:88:83:34:3b:b8:6d:6d:64: d6:b6:13:da:a7:22:04:aa:90:08:ad:2f:9c:43:21:d3: 17:f4:68:fa:19:e0:6e:de:1a:7c:d9:c7:df:d0:aa:41: fd:3f:db:dd:f9:66:1a:41:ee:66:3e:96:de:74:0a:b7: bc:e8:90:4d:ef:48:bd:e6:93:8b:ed:b5:4a:cd:0b:e6: f1:3f:41:f3:b1:5b:d7:2e:3d:cf:d1:9f:57:0f:9e:15: 78:e7:35:75:96:eb:a3:c1:95:01:6a:38:a8:18:63:7c: 1c:6c:2d:17:98:a6:06:ac:bd:83:68:e4:7b:b7:92:67: 2b:94:5b:62:49:1c:9d:e7:57:48:4a:51:c8:eb:14:3f: ed:f1:d6:96:b3:84:46:9c:bd:28:0f:05:5b:cf:a9:18: 98:37:5d:1c:24:8c:44:28:28:e0:a6:83:24:e9:51:7f: 06:e3:85:b2:7e:f7:50:33:a0:77:02:b7:f7:19:d0:e7: be:ee:05:8c:cb:bb:a2:9b:b1:ee:8b:ce:35:e4:6e:bf Fingerprint (SHA-256): 7C:02:D1:A7:A3:AB:66:A8:93:02:69:82:21:E7:1E:1D:C8:67:AD:BB:71:06:37:E3:9F:AC:48:3B:E2:90:06:72 Fingerprint (SHA1): 2E:44:5F:C9:1F:CB:F1:F1:4D:F7:FC:DC:C7:0B:38:FC:95:8C:5E:64 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #4163: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #4164: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:18:28 2017 Not After : Tue May 10 12:18:28 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:f6:1e:04:a0:78:d9:27:d6:b7:77:65:27:6f:92:22: 93:bc:b0:f0:6c:cb:1d:95:df:10:94:64:a9:68:10:17: 48:e7:3b:3b:4f:b3:00:d8:b6:3c:d1:e7:6d:0c:4f:b4: f8:c3:d3:70:7b:08:24:41:b8:f1:a8:07:3c:5f:a8:89: 2e:f9:49:ca:ed:5b:62:0e:a7:18:32:a5:50:80:ff:50: 38:ce:be:00:a0:a4:50:ef:f4:53:7f:94:5c:a0:2a:32: 2b:4f:97:71:b3:e4:6b:87:5d:cc:da:ee:c3:f2:c6:74: cb:47:ee:09:79:55:b2:c7:7f:07:8a:64:d1:7b:d3:4e: 30:d4:5a:06:2e:7b:fa:0c:00:a0:f0:48:b1:73:de:d1: cd:1a:2e:a4:1c:61:34:d4:10:c2:8f:55:41:e0:88:46: 90:2c:1e:70:0e:44:bb:88:b1:6c:eb:e2:5a:b1:93:8d: e9:da:45:ac:69:02:8e:ba:58:6a:32:9b:3a:d8:d5:97: 70:58:c8:b0:7e:21:cb:a8:57:c1:73:ac:77:ec:ff:d3: 5c:91:49:71:7c:e7:2f:7e:2f:53:ee:3b:56:32:86:2d: 4e:9f:61:cd:9c:4d:57:e1:75:2c:d2:b4:cf:f6:f7:3b: 87:67:25:b0:a6:f3:2c:5a:c4:cb:05:75:62:5c:f0:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b7:b8:c4:a5:c7:a9:07:8f:05:96:ed:ea:3e:b2:98:f4: a0:fc:18:ce:eb:d4:a1:80:5d:82:aa:ba:c2:6d:3b:e0: 5a:2b:59:48:5d:96:08:04:f6:83:6e:f6:9f:c7:6d:55: 48:a9:a2:3c:ba:3b:56:2f:88:83:34:3b:b8:6d:6d:64: d6:b6:13:da:a7:22:04:aa:90:08:ad:2f:9c:43:21:d3: 17:f4:68:fa:19:e0:6e:de:1a:7c:d9:c7:df:d0:aa:41: fd:3f:db:dd:f9:66:1a:41:ee:66:3e:96:de:74:0a:b7: bc:e8:90:4d:ef:48:bd:e6:93:8b:ed:b5:4a:cd:0b:e6: f1:3f:41:f3:b1:5b:d7:2e:3d:cf:d1:9f:57:0f:9e:15: 78:e7:35:75:96:eb:a3:c1:95:01:6a:38:a8:18:63:7c: 1c:6c:2d:17:98:a6:06:ac:bd:83:68:e4:7b:b7:92:67: 2b:94:5b:62:49:1c:9d:e7:57:48:4a:51:c8:eb:14:3f: ed:f1:d6:96:b3:84:46:9c:bd:28:0f:05:5b:cf:a9:18: 98:37:5d:1c:24:8c:44:28:28:e0:a6:83:24:e9:51:7f: 06:e3:85:b2:7e:f7:50:33:a0:77:02:b7:f7:19:d0:e7: be:ee:05:8c:cb:bb:a2:9b:b1:ee:8b:ce:35:e4:6e:bf Fingerprint (SHA-256): 7C:02:D1:A7:A3:AB:66:A8:93:02:69:82:21:E7:1E:1D:C8:67:AD:BB:71:06:37:E3:9F:AC:48:3B:E2:90:06:72 Fingerprint (SHA1): 2E:44:5F:C9:1F:CB:F1:F1:4D:F7:FC:DC:C7:0B:38:FC:95:8C:5E:64 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #4165: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #4166: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4167: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121381 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4168: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4169: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #4170: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4171: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 510121382 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4172: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4173: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4174: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510121153.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #4175: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0Root-510121127.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4176: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4177: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #4178: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510121153.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #4179: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 510121383 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4180: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4181: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4182: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510121153.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #4183: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0Root-510121128.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4184: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4185: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #4186: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4187: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 510121384 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4188: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4189: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4190: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510121153.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #4191: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0Root-510121129.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4192: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4193: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #4194: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510121153.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #4195: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0Root-510121130.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4196: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4197: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20170510121851Z nextupdate=20180510121851Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed May 10 12:18:51 2017 Next Update: Thu May 10 12:18:51 2018 CRL Extensions: chains.sh: #4198: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510121851Z nextupdate=20180510121851Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 12:18:51 2017 Next Update: Thu May 10 12:18:51 2018 CRL Extensions: chains.sh: #4199: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170510121851Z nextupdate=20180510121851Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed May 10 12:18:51 2017 Next Update: Thu May 10 12:18:51 2018 CRL Extensions: chains.sh: #4200: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20170510121851Z nextupdate=20180510121851Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed May 10 12:18:51 2017 Next Update: Thu May 10 12:18:51 2018 CRL Extensions: chains.sh: #4201: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510121852Z addcert 20 20170510121852Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 12:18:52 2017 Next Update: Thu May 10 12:18:51 2018 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed May 10 12:18:52 2017 CRL Extensions: chains.sh: #4202: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510121853Z addcert 40 20170510121853Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 12:18:53 2017 Next Update: Thu May 10 12:18:51 2018 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed May 10 12:18:52 2017 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Wed May 10 12:18:53 2017 CRL Extensions: chains.sh: #4203: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4204: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4205: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #4206: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121381 (0x1e67d5a5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:18:40 2017 Not After : Tue May 10 12:18:40 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:3a:68:76:d7:60:e7:b7:61:06:8f:9b:ab:74:49:f6: 16:82:a4:37:47:03:b1:9e:90:d8:40:31:1d:28:44:11: f3:c4:68:74:2b:b8:28:5b:aa:38:61:65:4d:ac:63:4c: c1:40:6f:ce:f0:3c:eb:cd:c8:9a:e6:33:59:d1:83:64: 54:e1:5e:87:b9:95:94:f6:71:67:0e:b5:fe:58:f4:87: bb:50:16:db:98:cd:21:2d:77:b6:e5:ba:62:d8:00:47: f3:02:ac:ac:93:c6:40:e9:c7:56:2e:37:42:5b:9e:9c: d9:ea:b4:df:7a:de:40:6e:44:c9:12:6b:90:e7:47:a1: 0a:90:65:43:db:c7:e2:b7:74:36:59:b3:c8:b3:32:21: 58:58:3b:e5:ad:b5:3b:67:e5:82:f4:58:b7:62:d1:e0: 0e:4c:83:20:ad:8a:4e:75:4b:36:1a:30:4d:10:03:17: f1:d3:d8:76:7e:9d:bd:21:53:25:4f:ce:e3:e5:d0:c6: 33:db:13:b7:40:45:75:e7:1e:cb:6f:a8:33:48:7f:5b: 15:79:bb:46:ac:1e:f0:e9:ed:9f:ec:d9:df:e8:c0:84: d7:67:0a:7b:fc:34:8e:02:c2:cf:29:f1:07:20:19:1b: 82:db:5c:10:76:50:84:e4:58:e5:ef:a1:b6:9b:5a:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:61:c6:73:58:2f:d6:a7:30:48:78:70:e5:84:cf:53: 99:22:cf:61:42:b3:48:7f:42:76:77:4b:3d:32:d7:b0: 87:b3:cc:81:be:b4:de:89:7f:ea:8a:7c:86:ba:d8:49: 3d:5d:b9:4e:cc:4b:5c:40:2f:c9:5e:40:a3:f7:3b:1e: 6e:49:07:71:97:99:1b:4c:ea:26:32:1a:b6:dd:51:d0: fc:88:03:dc:d3:50:40:12:1b:ed:8e:5f:17:57:3f:8b: f1:20:c4:58:73:f4:52:d4:94:c2:34:29:ff:e1:89:a7: 86:ed:18:31:1b:c2:0d:6b:1c:ee:c6:af:55:94:fc:5b: 26:01:2d:a2:4c:75:88:0a:22:01:43:4a:2f:9a:63:02: b5:ac:c2:1f:4f:d6:33:82:48:18:e0:5b:30:6b:a9:64: 16:ea:b3:9f:25:d2:88:5c:8b:07:eb:4a:04:d0:e0:dc: a0:80:2c:c9:34:01:bd:8f:d0:47:b4:de:0e:9c:57:d4: fa:4b:66:07:67:d6:a9:9d:4b:a6:d1:df:ec:a4:20:3f: be:38:49:12:ba:9f:31:1d:ad:10:96:28:3f:85:cb:eb: 8e:26:6a:ad:e0:0b:cb:60:b9:85:d7:f4:c6:d7:c8:17: db:2a:03:5a:f8:bb:d8:a6:03:26:70:11:10:d3:58:f6 Fingerprint (SHA-256): 72:C2:2A:61:F7:AF:4A:42:DE:D1:B2:2E:4B:3C:36:F7:9E:46:F7:D3:99:F3:10:0A:2B:B5:80:84:14:1A:50:BB Fingerprint (SHA1): 5B:E6:DB:49:E3:0E:7B:BA:0C:36:6B:D8:1A:B2:32:23:94:34:96:1C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #4207: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #4208: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121381 (0x1e67d5a5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:18:40 2017 Not After : Tue May 10 12:18:40 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:3a:68:76:d7:60:e7:b7:61:06:8f:9b:ab:74:49:f6: 16:82:a4:37:47:03:b1:9e:90:d8:40:31:1d:28:44:11: f3:c4:68:74:2b:b8:28:5b:aa:38:61:65:4d:ac:63:4c: c1:40:6f:ce:f0:3c:eb:cd:c8:9a:e6:33:59:d1:83:64: 54:e1:5e:87:b9:95:94:f6:71:67:0e:b5:fe:58:f4:87: bb:50:16:db:98:cd:21:2d:77:b6:e5:ba:62:d8:00:47: f3:02:ac:ac:93:c6:40:e9:c7:56:2e:37:42:5b:9e:9c: d9:ea:b4:df:7a:de:40:6e:44:c9:12:6b:90:e7:47:a1: 0a:90:65:43:db:c7:e2:b7:74:36:59:b3:c8:b3:32:21: 58:58:3b:e5:ad:b5:3b:67:e5:82:f4:58:b7:62:d1:e0: 0e:4c:83:20:ad:8a:4e:75:4b:36:1a:30:4d:10:03:17: f1:d3:d8:76:7e:9d:bd:21:53:25:4f:ce:e3:e5:d0:c6: 33:db:13:b7:40:45:75:e7:1e:cb:6f:a8:33:48:7f:5b: 15:79:bb:46:ac:1e:f0:e9:ed:9f:ec:d9:df:e8:c0:84: d7:67:0a:7b:fc:34:8e:02:c2:cf:29:f1:07:20:19:1b: 82:db:5c:10:76:50:84:e4:58:e5:ef:a1:b6:9b:5a:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:61:c6:73:58:2f:d6:a7:30:48:78:70:e5:84:cf:53: 99:22:cf:61:42:b3:48:7f:42:76:77:4b:3d:32:d7:b0: 87:b3:cc:81:be:b4:de:89:7f:ea:8a:7c:86:ba:d8:49: 3d:5d:b9:4e:cc:4b:5c:40:2f:c9:5e:40:a3:f7:3b:1e: 6e:49:07:71:97:99:1b:4c:ea:26:32:1a:b6:dd:51:d0: fc:88:03:dc:d3:50:40:12:1b:ed:8e:5f:17:57:3f:8b: f1:20:c4:58:73:f4:52:d4:94:c2:34:29:ff:e1:89:a7: 86:ed:18:31:1b:c2:0d:6b:1c:ee:c6:af:55:94:fc:5b: 26:01:2d:a2:4c:75:88:0a:22:01:43:4a:2f:9a:63:02: b5:ac:c2:1f:4f:d6:33:82:48:18:e0:5b:30:6b:a9:64: 16:ea:b3:9f:25:d2:88:5c:8b:07:eb:4a:04:d0:e0:dc: a0:80:2c:c9:34:01:bd:8f:d0:47:b4:de:0e:9c:57:d4: fa:4b:66:07:67:d6:a9:9d:4b:a6:d1:df:ec:a4:20:3f: be:38:49:12:ba:9f:31:1d:ad:10:96:28:3f:85:cb:eb: 8e:26:6a:ad:e0:0b:cb:60:b9:85:d7:f4:c6:d7:c8:17: db:2a:03:5a:f8:bb:d8:a6:03:26:70:11:10:d3:58:f6 Fingerprint (SHA-256): 72:C2:2A:61:F7:AF:4A:42:DE:D1:B2:2E:4B:3C:36:F7:9E:46:F7:D3:99:F3:10:0A:2B:B5:80:84:14:1A:50:BB Fingerprint (SHA1): 5B:E6:DB:49:E3:0E:7B:BA:0C:36:6B:D8:1A:B2:32:23:94:34:96:1C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #4209: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #4210: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #4211: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121385 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4212: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #4213: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4214: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4215: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 510121386 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4216: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4217: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4218: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4219: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510121387 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4220: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4221: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4222: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4223: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 510121388 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4224: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4225: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #4226: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -m 510121389 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4227: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #4228: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #4229: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4230: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 510121390 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4231: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4232: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #4233: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4234: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 510121391 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4235: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4236: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #4237: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #4238: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #4239: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121385 (0x1e67d5a9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:18:55 2017 Not After : Tue May 10 12:18:55 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:56:5b:20:48:8f:b1:7c:13:98:cb:e4:37:37:10:ac: a3:62:57:cd:64:30:98:5f:f8:57:02:c8:db:15:cb:3b: a5:66:f6:1c:60:fa:d9:86:73:9d:60:4b:8c:17:70:05: 3e:67:f9:e8:c3:9c:f3:a2:2b:88:8d:3e:0e:c3:88:ce: cd:ce:d8:0b:70:a3:72:9f:42:d4:31:59:9f:0b:52:85: 90:24:f7:69:20:5a:27:b5:35:b8:ac:ba:e5:37:0b:98: 0b:f5:5a:4e:6d:08:76:56:ab:4e:35:b0:fa:36:eb:54: 03:d0:f2:43:9a:a6:64:49:35:e7:c9:0f:98:e1:eb:9c: f9:d5:33:fc:76:a6:81:72:85:51:c8:d0:70:f3:e3:75: 36:3a:c8:e9:c1:17:b9:82:b6:d4:98:42:91:dd:f1:2d: a6:e6:f0:35:d7:3c:a4:1a:64:5c:04:72:32:ef:66:c0: af:82:ac:4c:dd:14:ac:8d:86:4b:d3:8e:91:ee:08:d5: 0e:0d:bb:39:0e:4d:4f:95:20:70:40:37:7f:f8:da:a5: ef:6c:91:ee:69:08:47:bd:b7:86:1d:1f:c0:7d:53:a2: c3:94:83:8f:42:73:0f:1d:d9:1f:4c:4d:8b:ad:7f:af: a9:e8:91:3b:2d:0d:1a:1b:07:1e:18:f9:fd:1c:4c:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:2a:83:fb:cf:40:e4:2c:d1:1b:78:d6:85:3c:7f:18: 9f:92:61:b6:a6:c4:a7:85:d3:9e:8a:d4:5e:99:9a:8b: c3:59:55:6f:2f:15:18:0e:22:b0:42:d5:d8:08:a2:87: b8:57:93:bf:25:e6:c8:98:15:99:3b:61:ca:84:f2:7e: 58:8f:9e:20:83:d4:4e:0a:19:5e:c6:62:bc:f7:73:13: e9:61:ed:5a:15:89:9e:d0:f3:42:de:d0:38:11:f5:70: 32:aa:e1:db:1c:37:84:3d:ee:4e:1f:29:e0:bf:cc:dc: 3d:b7:b1:6c:41:0d:08:23:d0:c6:54:7a:b2:a5:de:27: 6c:51:47:7a:f3:f1:e1:7e:04:08:8f:6a:81:1e:5d:ed: f6:65:1a:af:b5:14:bb:b3:96:36:dc:f4:af:6c:f3:92: 7c:64:6f:1f:b2:d2:b2:9a:2f:f2:35:10:e3:4d:3b:c0: 94:e3:47:3f:35:17:b8:c3:b8:16:a1:91:85:8a:5b:ba: 0e:5a:f4:52:f9:eb:57:1a:25:b9:9f:aa:47:c0:78:68: ba:01:f2:1e:de:d8:87:c8:4c:e1:38:f7:00:91:1a:cc: f9:03:6b:83:e4:eb:26:fe:3b:40:bd:e3:ec:f8:8d:43: d1:9c:a2:48:a0:da:b9:11:9d:09:ab:00:bc:e0:ae:f5 Fingerprint (SHA-256): B7:17:A6:6F:81:CE:00:64:50:05:44:23:4B:82:D0:DB:AD:5B:CB:FC:9B:46:82:AF:05:77:3A:20:15:18:70:3C Fingerprint (SHA1): 28:0D:A1:A0:F6:33:E8:F9:53:95:15:95:0E:32:D1:86:46:77:BF:AE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4240: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121387 (0x1e67d5ab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:18:59 2017 Not After : Tue May 10 12:18:59 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:1f:7e:67:2e:37:24:3c:1f:9e:6c:e4:ca:10:5d:f6: 08:25:48:1c:07:67:e5:53:65:dd:b5:2f:b2:c7:59:e2: 5e:ad:06:be:60:8d:e3:6a:c2:12:00:b9:3c:c5:25:d0: 75:54:15:66:35:d4:22:55:0b:3a:8e:f4:bf:b4:bb:37: b4:e4:82:1d:29:95:09:fe:3f:32:9c:8a:02:ab:4e:f1: 99:4b:ec:c4:71:e3:22:ff:cb:16:0b:ee:ac:bd:d6:b5: d2:82:79:e3:1b:0e:44:bb:22:1b:45:89:73:7c:6c:5d: 8f:b7:41:8e:ef:0e:bb:4b:87:04:4e:56:d2:c3:5a:5e: e3:9e:eb:78:66:a0:fb:6e:ef:5c:cb:d0:1d:f6:fd:a9: 01:f9:37:dc:60:4c:ee:b5:3f:39:bf:63:e7:2a:90:ad: 0d:cc:51:a4:6c:12:5e:0e:14:65:52:da:7a:4c:66:70: 28:7d:e6:19:9c:4b:fb:c8:57:f7:c0:56:74:15:3d:0d: 29:35:00:92:67:b6:e6:97:00:f5:12:0c:82:0b:be:45: 97:13:54:90:9f:67:cd:69:e0:f7:08:7c:73:e4:8a:8c: a6:19:4f:1b:af:67:9b:4e:b1:e3:78:d2:f8:5a:6a:ad: db:4b:5f:54:5a:84:42:10:3d:9a:e9:07:d4:f4:ac:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:ad:9e:56:68:41:8b:87:1d:18:47:20:dd:39:69:14: eb:3d:52:a6:db:27:3e:42:d4:87:58:db:df:3e:5d:37: a8:48:25:c7:2d:02:47:a9:b1:63:80:e9:22:62:82:e5: 60:64:ee:16:5d:c9:43:41:b7:45:55:ea:4a:8b:7d:40: cb:66:cd:90:30:f1:5f:ad:22:c3:39:fd:e5:99:1b:0f: 41:c1:f2:87:8c:24:2c:27:c6:17:d9:64:0e:5b:0c:45: a2:b5:0e:d0:d2:5f:7c:c9:2b:be:4c:8b:9c:1a:4c:e2: 67:25:e6:bd:6a:7d:9c:f4:88:c1:4a:bc:55:94:50:a2: 71:0d:1d:98:be:78:d4:23:d8:7b:9f:c1:fe:72:df:50: 5e:33:9c:0d:1d:68:d2:3b:21:87:98:6c:96:c7:d9:cd: 49:e1:52:f1:39:11:66:8c:36:f8:fc:d1:94:c9:6f:28: 8f:0f:da:17:ad:8d:ab:4a:fa:a4:36:57:b2:74:d4:fd: 4c:a9:b5:60:ec:dc:38:90:5c:f7:03:85:e6:ac:4a:0a: a9:99:c8:7f:f6:ca:0e:a4:cd:bc:0e:71:a6:9e:bb:7c: c2:b7:95:32:a4:a2:59:4f:69:56:82:42:2d:a6:18:5e: 29:91:7a:06:5f:bf:6f:ab:74:b4:02:e5:2b:f4:68:8b Fingerprint (SHA-256): D5:87:92:50:B3:E5:6A:74:B1:D5:79:E6:47:65:A5:BD:11:38:7A:23:B0:AD:56:60:C8:50:D3:47:9A:8D:E8:90 Fingerprint (SHA1): 45:DF:47:09:3C:E1:10:B2:28:02:26:A5:39:22:CB:50:7B:A9:74:AB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #4241: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121385 (0x1e67d5a9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:18:55 2017 Not After : Tue May 10 12:18:55 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:56:5b:20:48:8f:b1:7c:13:98:cb:e4:37:37:10:ac: a3:62:57:cd:64:30:98:5f:f8:57:02:c8:db:15:cb:3b: a5:66:f6:1c:60:fa:d9:86:73:9d:60:4b:8c:17:70:05: 3e:67:f9:e8:c3:9c:f3:a2:2b:88:8d:3e:0e:c3:88:ce: cd:ce:d8:0b:70:a3:72:9f:42:d4:31:59:9f:0b:52:85: 90:24:f7:69:20:5a:27:b5:35:b8:ac:ba:e5:37:0b:98: 0b:f5:5a:4e:6d:08:76:56:ab:4e:35:b0:fa:36:eb:54: 03:d0:f2:43:9a:a6:64:49:35:e7:c9:0f:98:e1:eb:9c: f9:d5:33:fc:76:a6:81:72:85:51:c8:d0:70:f3:e3:75: 36:3a:c8:e9:c1:17:b9:82:b6:d4:98:42:91:dd:f1:2d: a6:e6:f0:35:d7:3c:a4:1a:64:5c:04:72:32:ef:66:c0: af:82:ac:4c:dd:14:ac:8d:86:4b:d3:8e:91:ee:08:d5: 0e:0d:bb:39:0e:4d:4f:95:20:70:40:37:7f:f8:da:a5: ef:6c:91:ee:69:08:47:bd:b7:86:1d:1f:c0:7d:53:a2: c3:94:83:8f:42:73:0f:1d:d9:1f:4c:4d:8b:ad:7f:af: a9:e8:91:3b:2d:0d:1a:1b:07:1e:18:f9:fd:1c:4c:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:2a:83:fb:cf:40:e4:2c:d1:1b:78:d6:85:3c:7f:18: 9f:92:61:b6:a6:c4:a7:85:d3:9e:8a:d4:5e:99:9a:8b: c3:59:55:6f:2f:15:18:0e:22:b0:42:d5:d8:08:a2:87: b8:57:93:bf:25:e6:c8:98:15:99:3b:61:ca:84:f2:7e: 58:8f:9e:20:83:d4:4e:0a:19:5e:c6:62:bc:f7:73:13: e9:61:ed:5a:15:89:9e:d0:f3:42:de:d0:38:11:f5:70: 32:aa:e1:db:1c:37:84:3d:ee:4e:1f:29:e0:bf:cc:dc: 3d:b7:b1:6c:41:0d:08:23:d0:c6:54:7a:b2:a5:de:27: 6c:51:47:7a:f3:f1:e1:7e:04:08:8f:6a:81:1e:5d:ed: f6:65:1a:af:b5:14:bb:b3:96:36:dc:f4:af:6c:f3:92: 7c:64:6f:1f:b2:d2:b2:9a:2f:f2:35:10:e3:4d:3b:c0: 94:e3:47:3f:35:17:b8:c3:b8:16:a1:91:85:8a:5b:ba: 0e:5a:f4:52:f9:eb:57:1a:25:b9:9f:aa:47:c0:78:68: ba:01:f2:1e:de:d8:87:c8:4c:e1:38:f7:00:91:1a:cc: f9:03:6b:83:e4:eb:26:fe:3b:40:bd:e3:ec:f8:8d:43: d1:9c:a2:48:a0:da:b9:11:9d:09:ab:00:bc:e0:ae:f5 Fingerprint (SHA-256): B7:17:A6:6F:81:CE:00:64:50:05:44:23:4B:82:D0:DB:AD:5B:CB:FC:9B:46:82:AF:05:77:3A:20:15:18:70:3C Fingerprint (SHA1): 28:0D:A1:A0:F6:33:E8:F9:53:95:15:95:0E:32:D1:86:46:77:BF:AE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4242: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #4243: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121385 (0x1e67d5a9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:18:55 2017 Not After : Tue May 10 12:18:55 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:56:5b:20:48:8f:b1:7c:13:98:cb:e4:37:37:10:ac: a3:62:57:cd:64:30:98:5f:f8:57:02:c8:db:15:cb:3b: a5:66:f6:1c:60:fa:d9:86:73:9d:60:4b:8c:17:70:05: 3e:67:f9:e8:c3:9c:f3:a2:2b:88:8d:3e:0e:c3:88:ce: cd:ce:d8:0b:70:a3:72:9f:42:d4:31:59:9f:0b:52:85: 90:24:f7:69:20:5a:27:b5:35:b8:ac:ba:e5:37:0b:98: 0b:f5:5a:4e:6d:08:76:56:ab:4e:35:b0:fa:36:eb:54: 03:d0:f2:43:9a:a6:64:49:35:e7:c9:0f:98:e1:eb:9c: f9:d5:33:fc:76:a6:81:72:85:51:c8:d0:70:f3:e3:75: 36:3a:c8:e9:c1:17:b9:82:b6:d4:98:42:91:dd:f1:2d: a6:e6:f0:35:d7:3c:a4:1a:64:5c:04:72:32:ef:66:c0: af:82:ac:4c:dd:14:ac:8d:86:4b:d3:8e:91:ee:08:d5: 0e:0d:bb:39:0e:4d:4f:95:20:70:40:37:7f:f8:da:a5: ef:6c:91:ee:69:08:47:bd:b7:86:1d:1f:c0:7d:53:a2: c3:94:83:8f:42:73:0f:1d:d9:1f:4c:4d:8b:ad:7f:af: a9:e8:91:3b:2d:0d:1a:1b:07:1e:18:f9:fd:1c:4c:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:2a:83:fb:cf:40:e4:2c:d1:1b:78:d6:85:3c:7f:18: 9f:92:61:b6:a6:c4:a7:85:d3:9e:8a:d4:5e:99:9a:8b: c3:59:55:6f:2f:15:18:0e:22:b0:42:d5:d8:08:a2:87: b8:57:93:bf:25:e6:c8:98:15:99:3b:61:ca:84:f2:7e: 58:8f:9e:20:83:d4:4e:0a:19:5e:c6:62:bc:f7:73:13: e9:61:ed:5a:15:89:9e:d0:f3:42:de:d0:38:11:f5:70: 32:aa:e1:db:1c:37:84:3d:ee:4e:1f:29:e0:bf:cc:dc: 3d:b7:b1:6c:41:0d:08:23:d0:c6:54:7a:b2:a5:de:27: 6c:51:47:7a:f3:f1:e1:7e:04:08:8f:6a:81:1e:5d:ed: f6:65:1a:af:b5:14:bb:b3:96:36:dc:f4:af:6c:f3:92: 7c:64:6f:1f:b2:d2:b2:9a:2f:f2:35:10:e3:4d:3b:c0: 94:e3:47:3f:35:17:b8:c3:b8:16:a1:91:85:8a:5b:ba: 0e:5a:f4:52:f9:eb:57:1a:25:b9:9f:aa:47:c0:78:68: ba:01:f2:1e:de:d8:87:c8:4c:e1:38:f7:00:91:1a:cc: f9:03:6b:83:e4:eb:26:fe:3b:40:bd:e3:ec:f8:8d:43: d1:9c:a2:48:a0:da:b9:11:9d:09:ab:00:bc:e0:ae:f5 Fingerprint (SHA-256): B7:17:A6:6F:81:CE:00:64:50:05:44:23:4B:82:D0:DB:AD:5B:CB:FC:9B:46:82:AF:05:77:3A:20:15:18:70:3C Fingerprint (SHA1): 28:0D:A1:A0:F6:33:E8:F9:53:95:15:95:0E:32:D1:86:46:77:BF:AE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4244: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121387 (0x1e67d5ab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:18:59 2017 Not After : Tue May 10 12:18:59 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:1f:7e:67:2e:37:24:3c:1f:9e:6c:e4:ca:10:5d:f6: 08:25:48:1c:07:67:e5:53:65:dd:b5:2f:b2:c7:59:e2: 5e:ad:06:be:60:8d:e3:6a:c2:12:00:b9:3c:c5:25:d0: 75:54:15:66:35:d4:22:55:0b:3a:8e:f4:bf:b4:bb:37: b4:e4:82:1d:29:95:09:fe:3f:32:9c:8a:02:ab:4e:f1: 99:4b:ec:c4:71:e3:22:ff:cb:16:0b:ee:ac:bd:d6:b5: d2:82:79:e3:1b:0e:44:bb:22:1b:45:89:73:7c:6c:5d: 8f:b7:41:8e:ef:0e:bb:4b:87:04:4e:56:d2:c3:5a:5e: e3:9e:eb:78:66:a0:fb:6e:ef:5c:cb:d0:1d:f6:fd:a9: 01:f9:37:dc:60:4c:ee:b5:3f:39:bf:63:e7:2a:90:ad: 0d:cc:51:a4:6c:12:5e:0e:14:65:52:da:7a:4c:66:70: 28:7d:e6:19:9c:4b:fb:c8:57:f7:c0:56:74:15:3d:0d: 29:35:00:92:67:b6:e6:97:00:f5:12:0c:82:0b:be:45: 97:13:54:90:9f:67:cd:69:e0:f7:08:7c:73:e4:8a:8c: a6:19:4f:1b:af:67:9b:4e:b1:e3:78:d2:f8:5a:6a:ad: db:4b:5f:54:5a:84:42:10:3d:9a:e9:07:d4:f4:ac:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:ad:9e:56:68:41:8b:87:1d:18:47:20:dd:39:69:14: eb:3d:52:a6:db:27:3e:42:d4:87:58:db:df:3e:5d:37: a8:48:25:c7:2d:02:47:a9:b1:63:80:e9:22:62:82:e5: 60:64:ee:16:5d:c9:43:41:b7:45:55:ea:4a:8b:7d:40: cb:66:cd:90:30:f1:5f:ad:22:c3:39:fd:e5:99:1b:0f: 41:c1:f2:87:8c:24:2c:27:c6:17:d9:64:0e:5b:0c:45: a2:b5:0e:d0:d2:5f:7c:c9:2b:be:4c:8b:9c:1a:4c:e2: 67:25:e6:bd:6a:7d:9c:f4:88:c1:4a:bc:55:94:50:a2: 71:0d:1d:98:be:78:d4:23:d8:7b:9f:c1:fe:72:df:50: 5e:33:9c:0d:1d:68:d2:3b:21:87:98:6c:96:c7:d9:cd: 49:e1:52:f1:39:11:66:8c:36:f8:fc:d1:94:c9:6f:28: 8f:0f:da:17:ad:8d:ab:4a:fa:a4:36:57:b2:74:d4:fd: 4c:a9:b5:60:ec:dc:38:90:5c:f7:03:85:e6:ac:4a:0a: a9:99:c8:7f:f6:ca:0e:a4:cd:bc:0e:71:a6:9e:bb:7c: c2:b7:95:32:a4:a2:59:4f:69:56:82:42:2d:a6:18:5e: 29:91:7a:06:5f:bf:6f:ab:74:b4:02:e5:2b:f4:68:8b Fingerprint (SHA-256): D5:87:92:50:B3:E5:6A:74:B1:D5:79:E6:47:65:A5:BD:11:38:7A:23:B0:AD:56:60:C8:50:D3:47:9A:8D:E8:90 Fingerprint (SHA1): 45:DF:47:09:3C:E1:10:B2:28:02:26:A5:39:22:CB:50:7B:A9:74:AB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #4245: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #4246: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #4247: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #4248: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121385 (0x1e67d5a9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:18:55 2017 Not After : Tue May 10 12:18:55 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:56:5b:20:48:8f:b1:7c:13:98:cb:e4:37:37:10:ac: a3:62:57:cd:64:30:98:5f:f8:57:02:c8:db:15:cb:3b: a5:66:f6:1c:60:fa:d9:86:73:9d:60:4b:8c:17:70:05: 3e:67:f9:e8:c3:9c:f3:a2:2b:88:8d:3e:0e:c3:88:ce: cd:ce:d8:0b:70:a3:72:9f:42:d4:31:59:9f:0b:52:85: 90:24:f7:69:20:5a:27:b5:35:b8:ac:ba:e5:37:0b:98: 0b:f5:5a:4e:6d:08:76:56:ab:4e:35:b0:fa:36:eb:54: 03:d0:f2:43:9a:a6:64:49:35:e7:c9:0f:98:e1:eb:9c: f9:d5:33:fc:76:a6:81:72:85:51:c8:d0:70:f3:e3:75: 36:3a:c8:e9:c1:17:b9:82:b6:d4:98:42:91:dd:f1:2d: a6:e6:f0:35:d7:3c:a4:1a:64:5c:04:72:32:ef:66:c0: af:82:ac:4c:dd:14:ac:8d:86:4b:d3:8e:91:ee:08:d5: 0e:0d:bb:39:0e:4d:4f:95:20:70:40:37:7f:f8:da:a5: ef:6c:91:ee:69:08:47:bd:b7:86:1d:1f:c0:7d:53:a2: c3:94:83:8f:42:73:0f:1d:d9:1f:4c:4d:8b:ad:7f:af: a9:e8:91:3b:2d:0d:1a:1b:07:1e:18:f9:fd:1c:4c:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:2a:83:fb:cf:40:e4:2c:d1:1b:78:d6:85:3c:7f:18: 9f:92:61:b6:a6:c4:a7:85:d3:9e:8a:d4:5e:99:9a:8b: c3:59:55:6f:2f:15:18:0e:22:b0:42:d5:d8:08:a2:87: b8:57:93:bf:25:e6:c8:98:15:99:3b:61:ca:84:f2:7e: 58:8f:9e:20:83:d4:4e:0a:19:5e:c6:62:bc:f7:73:13: e9:61:ed:5a:15:89:9e:d0:f3:42:de:d0:38:11:f5:70: 32:aa:e1:db:1c:37:84:3d:ee:4e:1f:29:e0:bf:cc:dc: 3d:b7:b1:6c:41:0d:08:23:d0:c6:54:7a:b2:a5:de:27: 6c:51:47:7a:f3:f1:e1:7e:04:08:8f:6a:81:1e:5d:ed: f6:65:1a:af:b5:14:bb:b3:96:36:dc:f4:af:6c:f3:92: 7c:64:6f:1f:b2:d2:b2:9a:2f:f2:35:10:e3:4d:3b:c0: 94:e3:47:3f:35:17:b8:c3:b8:16:a1:91:85:8a:5b:ba: 0e:5a:f4:52:f9:eb:57:1a:25:b9:9f:aa:47:c0:78:68: ba:01:f2:1e:de:d8:87:c8:4c:e1:38:f7:00:91:1a:cc: f9:03:6b:83:e4:eb:26:fe:3b:40:bd:e3:ec:f8:8d:43: d1:9c:a2:48:a0:da:b9:11:9d:09:ab:00:bc:e0:ae:f5 Fingerprint (SHA-256): B7:17:A6:6F:81:CE:00:64:50:05:44:23:4B:82:D0:DB:AD:5B:CB:FC:9B:46:82:AF:05:77:3A:20:15:18:70:3C Fingerprint (SHA1): 28:0D:A1:A0:F6:33:E8:F9:53:95:15:95:0E:32:D1:86:46:77:BF:AE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4249: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121389 (0x1e67d5ad) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed May 10 12:19:01 2017 Not After : Tue May 10 12:19:01 2067 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:bb:29:44:c9:e7:0d:cc:23:1a:52:fb:d4:15:56:9d: b4:6f:de:6b:1e:f4:c6:19:28:af:1b:68:db:b3:2f:fa: b1:0d:96:0f:ab:b3:d4:7a:00:d8:26:37:51:1f:2d:6f: e4:e3:d7:e6:f3:94:fc:36:8c:4d:a9:f1:10:7a:f3:a5: 27:c3:b6:b4:93:ff:a1:fa:df:a1:bb:05:56:da:e9:57: 5c:11:b2:61:fd:8b:24:9f:42:39:5b:30:69:e2:75:fb: 87:0a:ed:22:81:29:2f:c2:81:c0:4c:97:91:b2:e9:46: 99:38:70:8d:63:c0:e2:8f:41:ad:dd:0e:b4:d6:26:ca: 8f:74:1d:db:1a:d9:10:a5:78:64:d9:e3:fe:47:a2:f5: 4a:9e:b0:0c:d6:13:a1:0b:7b:02:7a:e8:81:a2:5e:73: 95:e2:35:79:d6:51:73:e1:b1:14:28:1b:36:9a:dd:4a: dc:d2:a9:0d:4d:b3:fa:5f:8d:5d:cb:af:55:fe:16:dc: 59:0c:5b:7e:64:e2:4d:54:91:86:fe:3d:aa:d1:ce:ce: d0:dd:e3:39:d5:d9:81:a6:1b:dd:84:da:6a:f7:92:e0: f6:1f:b5:b8:d3:88:fe:43:88:7b:a2:1a:6e:1a:80:93: ea:a6:2c:59:9a:11:5e:2a:f2:8e:5e:d1:9b:87:10:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7c:38:31:27:ef:8e:5d:61:cf:c1:21:e0:65:74:0c:b4: 87:be:f8:5f:11:2b:ae:23:25:0d:14:76:f6:3a:44:53: 4d:96:f8:0f:22:d3:5e:92:35:23:19:64:08:51:fc:f6: b9:36:f5:55:82:ad:0c:56:64:9a:22:bc:30:a0:37:82: eb:b0:01:50:37:9e:a0:72:6c:38:68:a3:36:6e:bb:82: 8c:e7:cb:aa:2e:cc:1c:cb:d4:ab:85:de:3e:fe:08:e7: 80:3b:d7:51:a3:4b:7f:c5:47:f2:77:df:96:c2:0f:3f: 8b:a1:b5:f7:f5:4e:fc:f8:dc:6a:9c:12:ec:35:a9:a8: a3:a6:09:4d:99:79:8d:d9:8b:db:64:e3:e7:4e:a0:67: 9e:15:e3:68:ef:b2:78:5f:52:06:97:60:f0:1e:be:17: ab:08:0c:20:99:d8:83:ae:76:ff:95:78:a1:39:00:32: 02:c8:f2:fc:3f:0d:29:7e:1a:c7:97:93:01:82:9c:5d: 34:b8:4b:94:08:23:bd:04:d1:40:bb:dd:c2:7d:b5:17: a1:bd:38:8b:c8:bd:ce:52:fe:ed:63:ab:61:ec:96:63: 53:10:f2:a9:5b:3f:9f:c8:40:30:c8:5f:ac:01:99:a9: 0f:75:38:99:3f:4d:e1:30:05:e7:48:2a:8c:34:57:84 Fingerprint (SHA-256): D0:C3:3F:C6:32:36:8B:F4:2C:7A:A3:1A:6B:27:43:8B:F1:02:6D:2A:D3:44:FC:99:5F:A1:A4:B2:00:E4:DA:A8 Fingerprint (SHA1): 80:AF:8A:B8:07:52:41:89:8D:E0:E5:6F:B5:42:12:99:66:F0:51:FA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #4250: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121385 (0x1e67d5a9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:18:55 2017 Not After : Tue May 10 12:18:55 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:56:5b:20:48:8f:b1:7c:13:98:cb:e4:37:37:10:ac: a3:62:57:cd:64:30:98:5f:f8:57:02:c8:db:15:cb:3b: a5:66:f6:1c:60:fa:d9:86:73:9d:60:4b:8c:17:70:05: 3e:67:f9:e8:c3:9c:f3:a2:2b:88:8d:3e:0e:c3:88:ce: cd:ce:d8:0b:70:a3:72:9f:42:d4:31:59:9f:0b:52:85: 90:24:f7:69:20:5a:27:b5:35:b8:ac:ba:e5:37:0b:98: 0b:f5:5a:4e:6d:08:76:56:ab:4e:35:b0:fa:36:eb:54: 03:d0:f2:43:9a:a6:64:49:35:e7:c9:0f:98:e1:eb:9c: f9:d5:33:fc:76:a6:81:72:85:51:c8:d0:70:f3:e3:75: 36:3a:c8:e9:c1:17:b9:82:b6:d4:98:42:91:dd:f1:2d: a6:e6:f0:35:d7:3c:a4:1a:64:5c:04:72:32:ef:66:c0: af:82:ac:4c:dd:14:ac:8d:86:4b:d3:8e:91:ee:08:d5: 0e:0d:bb:39:0e:4d:4f:95:20:70:40:37:7f:f8:da:a5: ef:6c:91:ee:69:08:47:bd:b7:86:1d:1f:c0:7d:53:a2: c3:94:83:8f:42:73:0f:1d:d9:1f:4c:4d:8b:ad:7f:af: a9:e8:91:3b:2d:0d:1a:1b:07:1e:18:f9:fd:1c:4c:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:2a:83:fb:cf:40:e4:2c:d1:1b:78:d6:85:3c:7f:18: 9f:92:61:b6:a6:c4:a7:85:d3:9e:8a:d4:5e:99:9a:8b: c3:59:55:6f:2f:15:18:0e:22:b0:42:d5:d8:08:a2:87: b8:57:93:bf:25:e6:c8:98:15:99:3b:61:ca:84:f2:7e: 58:8f:9e:20:83:d4:4e:0a:19:5e:c6:62:bc:f7:73:13: e9:61:ed:5a:15:89:9e:d0:f3:42:de:d0:38:11:f5:70: 32:aa:e1:db:1c:37:84:3d:ee:4e:1f:29:e0:bf:cc:dc: 3d:b7:b1:6c:41:0d:08:23:d0:c6:54:7a:b2:a5:de:27: 6c:51:47:7a:f3:f1:e1:7e:04:08:8f:6a:81:1e:5d:ed: f6:65:1a:af:b5:14:bb:b3:96:36:dc:f4:af:6c:f3:92: 7c:64:6f:1f:b2:d2:b2:9a:2f:f2:35:10:e3:4d:3b:c0: 94:e3:47:3f:35:17:b8:c3:b8:16:a1:91:85:8a:5b:ba: 0e:5a:f4:52:f9:eb:57:1a:25:b9:9f:aa:47:c0:78:68: ba:01:f2:1e:de:d8:87:c8:4c:e1:38:f7:00:91:1a:cc: f9:03:6b:83:e4:eb:26:fe:3b:40:bd:e3:ec:f8:8d:43: d1:9c:a2:48:a0:da:b9:11:9d:09:ab:00:bc:e0:ae:f5 Fingerprint (SHA-256): B7:17:A6:6F:81:CE:00:64:50:05:44:23:4B:82:D0:DB:AD:5B:CB:FC:9B:46:82:AF:05:77:3A:20:15:18:70:3C Fingerprint (SHA1): 28:0D:A1:A0:F6:33:E8:F9:53:95:15:95:0E:32:D1:86:46:77:BF:AE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4251: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #4252: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #4253: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #4254: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #4255: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #4256: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510121390 (0x1e67d5ae) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed May 10 12:19:02 2017 Not After : Tue May 10 12:19:02 2022 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:48:0c:42:64:bd:40:85:5e:37:53:5e:5a:ee:ea:f8: 84:f8:63:22:db:12:c3:8e:0c:90:2b:3b:5a:66:50:a9: c8:4d:27:a4:04:51:99:25:91:4f:29:c7:d7:99:78:91: 07:3e:da:05:bd:72:8f:c1:cd:41:e1:b2:32:b8:53:76: c5:41:95:c8:11:56:52:47:60:86:1d:61:e6:fd:00:f8: 3e:2a:57:23:80:d5:8c:c3:37:64:d1:ee:61:85:ee:9e: e1:72:5b:d5:b0:43:87:fa:4b:87:3f:5f:df:05:bb:c1: fc:8d:b9:45:70:c8:cc:d3:35:34:79:19:92:9c:de:14: eb:a1:43:4d:24:c8:9b:e0:54:fc:44:07:a6:8b:ad:a3: 14:24:e6:c3:7c:9a:9d:fa:91:c4:f0:6e:94:87:5f:9d: 4f:54:64:da:74:9f:d2:9a:ba:a5:68:e8:95:3b:b2:39: ab:8b:b5:d1:16:79:08:06:4e:ff:32:f8:75:d2:9e:fc: 7b:ac:a9:e6:01:f2:34:06:ca:34:9b:a2:36:df:23:3e: 79:6b:ad:7b:7c:9a:10:c7:bc:52:b5:94:1a:49:68:50: bc:0d:b9:55:4d:79:7f:83:65:f2:b6:44:c2:0a:25:b7: 10:20:20:87:a1:b9:64:11:e2:04:a9:6d:59:c4:7f:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:6f:b5:b4:92:f3:c3:bf:79:6d:aa:a1:89:98:85:9d: c2:e7:58:2d:ea:0b:03:b4:9d:57:4b:eb:35:29:a5:0f: 58:75:56:98:ce:ec:60:d5:82:76:59:da:1c:55:b8:e1: 18:3a:a1:b0:76:ba:10:da:52:07:2d:07:b8:4a:38:ba: cf:20:be:58:d4:ae:e4:8a:f0:9c:5f:fa:5c:c6:08:83: 35:98:b7:b5:b0:59:fe:52:cd:f8:53:1d:5d:3a:3c:be: d0:0e:84:93:1d:e7:42:31:1b:cd:b3:c8:2f:bb:4b:59: c9:2e:cc:28:b5:45:79:1b:77:c1:8b:3f:df:a7:4f:cd: 8b:44:e4:e3:e9:89:43:48:6d:7f:cd:d0:f6:a1:9d:9d: eb:d4:53:aa:66:60:95:d4:7d:22:4d:be:11:33:70:92: ea:fa:76:2f:88:0c:be:c3:eb:df:f2:03:71:70:d5:fd: 7d:b4:73:94:5b:f8:4e:84:2c:44:61:7a:0b:8d:10:aa: b2:cc:98:88:f6:cb:2e:c2:d9:5a:75:be:6c:fd:3c:81: 0c:9d:aa:16:41:88:8b:39:56:83:1a:36:1c:98:87:75: 33:c9:66:8b:01:0e:40:ae:b1:19:7d:a4:1b:87:c4:14: 58:cf:12:30:0e:f2:36:09:da:91:29:35:96:96:c5:38 Fingerprint (SHA-256): 76:6C:84:32:CF:45:50:E8:E3:C0:C4:5E:87:AE:F7:04:D4:81:82:E3:22:4A:5E:32:9C:3D:6F:9C:71:56:2F:94 Fingerprint (SHA1): F2:47:19:E5:CC:78:88:57:51:16:1B:A3:FD:13:BD:B8:A7:7B:34:C9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #4257: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #4258: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #4259: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #4260: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #4261: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #4262: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #4263: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #4264: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #4265: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #4266: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #4267: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #4268: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #4269: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #4270: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #4271: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #4272: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #4273: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #4274: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #4275: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #4276: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #4277: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #4278: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #4279: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #4280: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 25227 at Wed May 10 12:19:09 UTC 2017 kill -USR1 25227 httpserv: normal termination httpserv -b -p 9218 2>/dev/null; httpserv with PID 25227 killed at Wed May 10 12:19:09 UTC 2017 TIMESTAMP chains END: Wed May 10 12:19:09 UTC 2017 Running tests for ec TIMESTAMP ec BEGIN: Wed May 10 12:19:09 UTC 2017 Running ec tests for ecperf TIMESTAMP ecperf BEGIN: Wed May 10 12:19:09 UTC 2017 ecperf.sh: ecperf test =============================== ./ecperf.sh: line 43: ecperf: command not found ecperf.sh: #4281: ec(perf) test - PASSED TIMESTAMP ecperf END: Wed May 10 12:19:10 UTC 2017 Running ec tests for ectest TIMESTAMP ectest BEGIN: Wed May 10 12:19:10 UTC 2017 ectest.sh: freebl and pk11 ectest tests =============================== No password file "../tests.pw" exists. Test curve25519 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #4282: ec test certutil keygen - curve25519 - PASSED Test secp256r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #4283: ec test certutil keygen - secp256r1 - PASSED Test secp384r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #4284: ec test certutil keygen - secp384r1 - PASSED Test secp521r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #4285: ec test certutil keygen - secp521r1 - PASSED Test sect571r1 key generation using certutil that should fail because it's not implemented ... Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_KEY: The key does not support the requested operation. ectest.sh: #4286: ec test certutil keygen - secp521r1 - PASSED ectest.sh: #4287: pk11 ec tests - PASSED TIMESTAMP ectest END: Wed May 10 12:19:10 UTC 2017 TIMESTAMP ec END: Wed May 10 12:19:10 UTC 2017 Running tests for gtests TIMESTAMP gtests BEGIN: Wed May 10 12:19:10 UTC 2017 gtests: prng_gtest der_gtest pk11_gtest util_gtest gtests.sh: #4288: Skipping prng_gtest (not built) - UNKNOWN gtests.sh: der_gtest =============================== executing der_gtest [==========] Running 16 tests from 2 test cases. [----------] Global test environment set-up. [----------] 13 tests from DERIntegerDecodingTest [ RUN ] DERIntegerDecodingTest.DecodeLongMinus126 [ OK ] DERIntegerDecodingTest.DecodeLongMinus126 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong130 [ OK ] DERIntegerDecodingTest.DecodeLong130 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong130Padded [ OK ] DERIntegerDecodingTest.DecodeLong130Padded (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong0 [ OK ] DERIntegerDecodingTest.DecodeLong0 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong1 [ OK ] DERIntegerDecodingTest.DecodeLong1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinus1Padded [ OK ] DERIntegerDecodingTest.DecodeLongMinus1Padded (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMax [ OK ] DERIntegerDecodingTest.DecodeLongMax (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMin [ OK ] DERIntegerDecodingTest.DecodeLongMin (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMaxMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMaxMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinPlus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinPlus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMaxPlus1 [ OK ] DERIntegerDecodingTest.DecodeLongMaxPlus1 (0 ms) [----------] 13 tests from DERIntegerDecodingTest (1 ms total) [----------] 3 tests from DERPrivateKeyImportTest [ RUN ] DERPrivateKeyImportTest.ImportPrivateRSAKey [ OK ] DERPrivateKeyImportTest.ImportPrivateRSAKey (0 ms) [ RUN ] DERPrivateKeyImportTest.ImportInvalidPrivateKey [ OK ] DERPrivateKeyImportTest.ImportInvalidPrivateKey (0 ms) [ RUN ] DERPrivateKeyImportTest.ImportZeroLengthPrivateKey [ OK ] DERPrivateKeyImportTest.ImportZeroLengthPrivateKey (0 ms) [----------] 3 tests from DERPrivateKeyImportTest (0 ms total) [----------] Global test environment tear-down [==========] 16 tests from 2 test cases ran. (1 ms total) [ PASSED ] 16 tests. gtests.sh: #4289: der_gtest run successfully - PASSED test output dir: /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/der_gtest/report.xml executing sed to parse the xml report processing the parsed report gtests.sh: #4290: 'DERIntegerDecodingTest: DecodeLongMinus126' - PASSED gtests.sh: #4291: 'DERIntegerDecodingTest: DecodeLong130' - PASSED gtests.sh: #4292: 'DERIntegerDecodingTest: DecodeLong130Padded' - PASSED gtests.sh: #4293: 'DERIntegerDecodingTest: DecodeLong0' - PASSED gtests.sh: #4294: 'DERIntegerDecodingTest: DecodeLong1' - PASSED gtests.sh: #4295: 'DERIntegerDecodingTest: DecodeLongMinus1' - PASSED gtests.sh: #4296: 'DERIntegerDecodingTest: DecodeLongMinus1Padded' - PASSED gtests.sh: #4297: 'DERIntegerDecodingTest: DecodeLongMax' - PASSED gtests.sh: #4298: 'DERIntegerDecodingTest: DecodeLongMin' - PASSED gtests.sh: #4299: 'DERIntegerDecodingTest: DecodeLongMaxMinus1' - PASSED gtests.sh: #4300: 'DERIntegerDecodingTest: DecodeLongMinPlus1' - PASSED gtests.sh: #4301: 'DERIntegerDecodingTest: DecodeLongMinMinus1' - PASSED gtests.sh: #4302: 'DERIntegerDecodingTest: DecodeLongMaxPlus1' - PASSED gtests.sh: #4303: 'DERPrivateKeyImportTest: ImportPrivateRSAKey' - PASSED gtests.sh: #4304: 'DERPrivateKeyImportTest: ImportInvalidPrivateKey' - PASSED gtests.sh: #4305: 'DERPrivateKeyImportTest: ImportZeroLengthPrivateKey' - PASSED gtests.sh: #4306: Skipping pk11_gtest (not built) - UNKNOWN gtests.sh: #4307: Skipping util_gtest (not built) - UNKNOWN TIMESTAMP gtests END: Wed May 10 12:19:10 UTC 2017 Running tests for ssl_gtests TIMESTAMP ssl_gtests BEGIN: Wed May 10 12:19:10 UTC 2017 ssl_gtest.sh: SSL Gtests =============================== ssl_gtest.sh: #4308: create ssl_gtest database - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4309: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4310: create certificate: sign kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4311: create certificate: sign kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4312: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4313: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4314: create certificate: kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4315: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4316: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4317: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4318: create certificate: kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4319: create certificate: ca - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4320: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4321: create certificate: kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4322: create certificate: sign - PASSED ssl_gtest.sh: #4323: Skipping ssl_gtest (not built) - UNKNOWN TIMESTAMP ssl_gtests END: Wed May 10 12:19:15 UTC 2017 ssl_gtests.sh: Testing with PKIX =============================== Running tests for libpkix TIMESTAMP libpkix BEGIN: Wed May 10 12:19:15 UTC 2017 TIMESTAMP libpkix END: Wed May 10 12:19:15 UTC 2017 Running tests for cert TIMESTAMP cert BEGIN: Wed May 10 12:19:15 UTC 2017 cert.sh: Certutil and Crlutil Tests with ECC =============================== cert.sh: #4324: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/CA -f ../tests.pw cert.sh: #4325: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4326: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4327: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/CA -o root.cert cert.sh: #4328: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA -f ../tests.pw cert.sh: #4329: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4330: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4331: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #4332: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4333: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #4334: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4335: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #4336: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA -f ../tests.pw cert.sh: #4337: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4338: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4339: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #4340: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4341: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #4342: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4343: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #4344: Exporting Root Cert - PASSED cert.sh: Creating an DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4345: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #4346: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4347: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #4348: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4349: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #4350: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4351: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #4352: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4353: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #4354: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4355: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #4356: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4357: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #4358: Exporting DSA Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4359: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #4360: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4361: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #4362: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4363: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #4364: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4365: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #4366: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4367: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #4368: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4369: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #4370: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4371: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #4372: Exporting EC Root Cert - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw cert.sh: #4373: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4374: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4375: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #4376: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4377: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert cert.sh: #4378: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4379: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #4380: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4381: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA/clientCA-dsa.ca.cert cert.sh: #4382: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4383: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #4384: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4385: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4386: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #4387: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4388: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA/clientCA-ec.ca.cert cert.sh: #4389: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4390: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #4391: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4392: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4393: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA/serverCA-dsa.ca.cert cert.sh: #4394: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4395: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4396: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4397: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4398: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA/serverCA-ec.ca.cert cert.sh: #4399: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4400: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #4401: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw cert.sh: #4402: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4403: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4404: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #4405: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4406: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #4407: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4408: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #4409: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4410: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA/serverCA-dsa.ca.cert cert.sh: #4411: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4412: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #4413: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4414: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4415: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #4416: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4417: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA/serverCA-ec.ca.cert cert.sh: #4418: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4419: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #4420: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4421: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4422: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4423: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4424: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4425: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4426: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert cert.sh: #4427: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA/clientCA-ec.ca.cert cert.sh: #4428: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4429: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/clientCA/clientCA-dsa.ca.cert cert.sh: #4430: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw cert.sh: #4431: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4432: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA.ca.cert cert.sh: #4433: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #4434: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA-ec.ca.cert cert.sh: #4435: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4436: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #4437: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4438: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4439: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #4440: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4441: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4442: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #4443: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4444: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4445: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #4446: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4447: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4448: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #4449: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4450: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #4451: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4452: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA.ca.cert cert.sh: #4453: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #4454: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA-ec.ca.cert cert.sh: #4455: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4456: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #4457: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4458: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4459: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #4460: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4461: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4462: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #4463: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4464: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4465: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #4466: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4467: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4468: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #4469: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4470: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4471: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #4472: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4473: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4474: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #4475: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4476: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4477: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #4478: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4479: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4480: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #4481: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4482: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4483: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #4484: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4485: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #4486: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #4487: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #4488: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw cert.sh: #4489: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4490: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA.ca.cert cert.sh: #4491: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #4492: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #4493: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4494: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #4495: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4496: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4497: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #4498: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4499: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4500: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #4501: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4502: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4503: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #4504: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4505: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4506: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #4507: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4508: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw cert.sh: #4509: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4510: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA.ca.cert cert.sh: #4511: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #4512: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #4513: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4514: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #4515: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4516: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4517: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #4518: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4519: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4520: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #4521: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4522: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4523: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #4524: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4525: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4526: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #4527: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4528: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/dave -f ../tests.pw cert.sh: #4529: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4530: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA.ca.cert cert.sh: #4531: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #4532: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #4533: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4534: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #4535: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4536: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4537: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #4538: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4539: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4540: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #4541: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4542: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4543: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #4544: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4545: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4546: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #4547: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4548: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/eve -f ../tests.pw cert.sh: #4549: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4550: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA.ca.cert cert.sh: #4551: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #4552: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #4553: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4554: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #4555: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4556: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4557: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #4558: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4559: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4560: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #4561: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4562: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4563: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #4564: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4565: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4566: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #4567: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4568: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #4569: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #4570: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #4571: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #4572: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #4573: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #4574: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #4575: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #4576: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw cert.sh: #4577: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4578: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #4579: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4580: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw cert.sh: #4581: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4582: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #4583: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4584: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #4585: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4586: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4587: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #4588: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4589: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4590: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #4591: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4592: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw cert.sh: #4593: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4594: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #4595: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #4596: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #4597: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4598: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #4599: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4600: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4601: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #4602: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4603: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4604: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #4605: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4606: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4607: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #4608: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4609: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4610: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #4611: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4612: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:4f:ad Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Wed May 10 12:19:57 2017 Not After : Thu Aug 10 12:19:57 2017 Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:8e:5a:4f:e0:1f:95:55:1d:43:67:a4:6b:b2:f0:27: 91:92:4a:4b:9c:1e:1b:ba:58:1d:8c:ed:5d:8d:43:30: 6e:18:3e:de:12:e4:67:d7:94:9f:65:b8:ac:e9:61:6a: 03:4d:59:1d:94:b1:88:30:67:32:57:e0:a6:d1:4c:33: b3:19:d0:18:0b:3b:e4:76:7a:b5:80:44:31:53:c9:bc: ba:29:4b:68:6e:d9:06:46:b9:a0:5a:d6:b1:3e:a3:41: 10:78:d9:b8:22:1c:42:4e:54:e5:ef:86:34:1b:39:52: fb:98:32:37:09:4d:49:44:c9:0d:bc:3b:23:96:26:08: 0d:70:37:0a:d0:1b:df:cd:99:d3:24:84:f0:02:36:e7: 73:3f:be:4a:77:35:3a:a9:ae:12:f8:78:d0:ca:dc:04: ab:38:2a:0a:bb:97:6a:da:4c:25:0a:5f:92:2f:0a:9d: c0:40:6c:00:53:54:0c:c6:b6:e2:bc:40:21:d3:61:fd: 08:a8:76:6d:4c:93:93:8a:c9:50:4c:cf:67:b8:2b:4f: 72:7d:e8:60:fa:36:c7:e0:56:1b:3c:cd:da:30:a7:f8: a2:e6:0d:f9:ee:c0:df:de:d3:44:91:f9:98:d2:aa:4a: c2:17:0e:48:fd:c8:a1:d8:ba:bf:26:ad:54:0e:3a:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:14:6b:26:79:a4:1b:7c:f6:56:9b:7d:5c:dc:34:56: 42:e5:01:ac:fc:f4:c6:6b:20:f6:c3:dd:88:88:6e:65: 8a:62:18:11:57:04:0d:c4:a6:e2:20:63:3f:68:66:31: b9:0f:5b:07:e7:75:e2:ef:c6:66:a3:24:c7:91:5e:37: 3f:08:eb:e0:77:b3:5c:33:89:75:a4:b1:3b:4b:7e:a5: 4d:c1:20:54:05:c1:29:d1:25:7f:21:2d:0e:d1:c0:a3: 77:51:d2:3f:24:5e:f4:e3:aa:84:f7:34:91:94:54:f5: 77:1c:52:49:99:af:62:6b:35:cf:41:37:71:3d:03:86: a7:cf:81:cf:12:5c:22:15:4c:42:b7:43:99:a4:76:3e: 73:b2:5b:2e:55:14:38:09:c2:ac:98:75:43:16:3f:f6: 26:6c:cc:53:41:43:10:06:75:45:ae:7b:22:55:ec:63: 66:b2:ed:56:11:e4:c3:d0:b8:33:e9:65:62:2d:85:93: b0:ef:8c:6a:2f:5c:11:fc:36:5e:f8:25:71:8b:93:2f: 46:b8:ac:1f:62:c9:6f:1e:ba:73:03:82:aa:32:f2:0e: d4:ec:c4:58:38:b3:79:bf:cd:d8:dd:2f:11:09:35:13: 51:7b:20:91:0d:00:32:57:7f:79:d0:7f:e4:c7:bc:eb Fingerprint (SHA-256): EF:9C:C9:28:49:A9:A5:C3:F5:69:D5:7D:53:BE:0D:75:8B:DF:73:A2:62:5A:F1:DE:52:66:0A:FE:20:0C:DE:DA Fingerprint (SHA1): 8A:8C:07:F8:E1:ED:AF:05:FE:18:34:44:DE:96:A9:E7:8B:90:48:A1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4613: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:4f:b2 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Wed May 10 12:19:58 2017 Not After : Thu Aug 10 12:19:58 2017 Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:3a:eb:ef:be:86:22:06:ac:37:1a:77:95:24:ca:03: 05:97:73:4b:c3:94:73:d1:8e:86:c8:e9:db:13:60:be: 92:be:8d:ab:d5:48:e0:12:1f:ce:84:22:ea:ba:91:e7: 55:20:5c:64:05:1a:6a:69:13:9e:0f:99:27:8f:d0:e3: 02:8d:05:5b:cf:b5:fd:8b:ff:6e:91:f3:64:b2:48:f8: 68:7d:e4:45:42:6f:be:61:63:7e:7d:92:5b:0d:91:fd: 37:0a:8f:d0:8d:2a:60:ed:78:40:48:40:19:61:e6:84: df:10:87:8f:05:b9:1f:ed:70:37:0a:a4:b4:3b:79:9d: 14:55:23:1f:e6:c8:b8:48:25:de:3b:ec:c6:54:13:47: d2:fa:9f:d8:32:27:bc:e4:e3:0d:8c:72:18:b9:ad:ec: 3b:0f:80:31:8f:07:61:96:69:2c:19:be:f2:0a:61:f4: af:61:60:92:f3:5b:8d:ff:2c:93:c6:06:a3:3c:a7:e5: a2:f9:c0:d8:87:52:8d:6d:ef:93:92:61:ff:d2:bc:bb: 47:9b:b0:d3:e1:5c:6c:e1:72:4b:08:ea:03:18:6d:44: 8f:c0:09:8c:94:f0:81:ef:45:4b:34:2c:eb:6f:df:c1: c0:8e:03:71:b5:d1:c4:28:fe:e3:ca:01:9b:02:82:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:4a:63:d4:8c:19:62:b8:2c:0d:47:8c:b8:94:52:fd: ff:bd:3f:c8:d8:46:ff:c2:17:d9:81:1d:bb:55:b7:f4: d0:ca:db:3d:7e:86:c4:d8:a5:37:ff:b4:fe:3a:62:8e: 2f:9f:83:67:22:5e:24:ba:c0:f0:ee:00:c2:4a:67:ae: dd:f3:4c:9a:25:51:1d:ee:bf:09:f0:8d:cf:a8:fa:91: 08:99:62:ea:9f:21:94:d9:09:e5:fb:dd:a1:7e:55:7c: f6:17:97:f9:1d:36:90:2c:fa:f7:36:fc:11:a8:c2:55: 56:c4:1d:46:de:dc:80:e2:15:2d:13:f6:45:63:5f:d1: 8c:84:e6:9c:28:48:bf:9f:e2:7a:f5:84:ec:90:0a:5b: fe:c4:fe:38:65:91:3d:18:38:15:b0:c3:2a:db:88:b9: e9:a4:bd:ad:5f:7f:e0:85:50:ea:46:d0:32:e3:11:e4: 00:36:25:69:34:b3:2e:3f:75:1a:9a:43:54:5e:a5:9c: 58:a5:54:d6:4c:74:3e:7d:dc:57:ec:d3:ad:be:c0:d2: 97:ee:b7:f5:64:9b:da:13:a3:b5:88:d8:c5:e4:9d:49: a2:42:c5:d7:4f:75:1e:d1:74:75:9e:9b:94:98:3f:e7: 69:89:61:86:8e:c2:04:83:a1:42:16:00:c6:c7:1b:94 Fingerprint (SHA-256): 9D:1B:29:66:2A:CE:D7:EC:B9:70:1C:F4:2B:8C:FC:86:89:2D:50:07:55:A9:B1:67:9F:83:0A:DC:30:40:44:06 Fingerprint (SHA1): A7:73:12:99:88:45:33:2E:BF:D0:ED:0F:6B:A2:02:0C:2B:6A:B2:99 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4614: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:4f:b5 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Wed May 10 12:19:59 2017 Not After : Thu Aug 10 12:19:59 2017 Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:3f:8d:19:0c:00:e1:53:b5:92:67:e4:01:bc:c9:ef: d2:55:71:d2:73:bb:64:7b:61:93:fc:39:cc:21:24:a0: 28:b3:95:48:02:40:3b:25:98:fb:0e:64:7c:72:d2:54: f2:12:7d:e4:9d:5d:3a:c7:6c:e0:22:ae:4f:a6:12:c0: 8d:f7:93:18:dc:cc:c6:44:08:26:0d:61:98:69:a4:1a: 4f:4b:f8:f2:52:66:24:e9:b1:f6:d6:2c:7b:0d:03:01: 2c:70:d3:f8:ac:a9:d3:bd:f1:82:5d:a7:f6:75:98:1c: 8e:9f:36:a6:e8:25:75:f3:1c:60:04:75:6a:96:3d:da: 59:0b:b4:a7:c8:98:14:9c:83:ae:da:2b:57:6e:da:d6: 93:96:44:b1:f2:99:a6:6a:61:c9:3f:b2:f1:39:06:5e: 6d:83:85:f2:0d:61:bc:69:95:a6:54:db:b6:6c:e1:ea: 8d:0c:74:76:f2:19:ac:43:8c:61:a7:44:a9:e6:76:6e: a0:73:fd:3b:35:3d:2b:64:8d:6a:45:95:dc:87:5d:9b: cc:07:b7:62:a2:4f:6f:0e:19:ea:f1:86:a7:37:c0:d9: 82:d4:b4:bb:1f:84:95:d8:f8:5d:2e:a0:5a:cd:47:86: 0c:5d:aa:17:60:1e:35:9e:e2:a7:7e:91:44:1b:dc:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:9d:a8:d4:04:e4:1f:9a:fb:13:fe:25:53:ab:80:ed: 82:16:36:cd:68:50:2a:c0:48:4c:d5:9d:72:b1:ed:3b: 13:e0:9b:3a:5e:49:39:db:67:d1:8c:0d:af:9d:e2:75: 76:68:41:35:77:b4:84:ed:ee:ea:7e:3f:04:0f:bf:25: f5:b0:7f:e5:7d:77:5c:de:36:df:dd:ac:ab:e1:29:cd: 37:63:86:ba:2f:a7:d2:32:10:8b:ef:3f:1a:ea:eb:a6: 25:03:a4:3b:23:34:3d:73:07:27:89:b1:1d:4c:16:6c: 69:6d:50:18:b9:26:45:2a:e9:6a:6b:67:17:03:fb:e4: 15:3f:c8:77:ed:5d:74:e3:46:de:19:48:48:bb:2c:a2: 6e:8b:ed:23:38:7d:22:70:12:3b:e9:db:1b:3f:3b:50: 8f:8c:14:da:ff:8e:14:dc:3d:f1:3a:6e:5a:9c:c4:45: ff:53:43:42:67:f6:15:e6:32:c4:33:a4:35:30:87:0b: 8d:b8:fe:5c:89:4c:f3:9e:de:ff:71:09:57:31:47:e4: 3e:52:d1:f6:a0:fb:0c:b8:d5:51:7f:73:a6:33:04:df: 3a:e6:8e:88:6f:32:08:8c:11:aa:62:4c:d1:b2:0d:6c: 19:a4:d7:36:7b:ec:f6:ca:a8:d9:07:97:b6:4b:6a:75 Fingerprint (SHA-256): 84:C4:8E:2B:F7:F6:C0:77:F2:18:09:85:A3:FB:BB:63:20:6B:CC:A3:C9:BA:FD:16:FB:A4:36:21:53:DF:5F:F3 Fingerprint (SHA1): F3:C5:0F:3F:09:14:B3:81:C1:2E:B3:DE:D7:4A:0E:14:D1:29:EA:46 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4615: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:4f:b6 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Wed May 10 12:20:02 2017 Not After : Thu Aug 10 12:20:02 2017 Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:07:07:ef:f9:38:30:2f:7d:34:f7:56:07:72:f6:8a: 42:57:32:3f:19:40:f1:ea:ce:01:81:9b:4d:d4:44:b7: 89:22:78:8c:73:04:a9:bf:cc:ff:fa:c2:42:e5:8a:7f: b2:29:01:e2:4e:88:e6:bb:0c:47:c9:30:2e:ef:b6:e2: 2d:03:e2:a7:d8:4e:e3:00:29:b8:51:20:25:2b:15:e3: 53:02:d7:3c:a3:fe:6a:0d:03:fe:17:f4:8d:6d:37:fe: 0b:c1:73:cb:53:f1:aa:f7:72:cd:45:a8:bb:b9:fc:f1: 6a:40:62:11:e6:6f:ce:20:12:61:c1:fc:5d:2d:19:1e: ff:28:6f:d5:95:26:5a:b4:5f:48:c7:70:4b:a5:87:10: fc:e1:71:a5:37:85:0f:04:35:7a:e2:52:41:1b:24:ab: 0a:fa:0d:7d:83:8d:2c:c4:6c:9d:11:c8:d7:7e:de:e3: b4:6a:a4:db:15:ea:6c:aa:1c:b3:ec:1b:64:c1:a3:dd: c3:c5:0e:26:81:8c:a0:d0:fe:04:ee:ac:e8:05:4d:bd: d1:ce:7c:cc:e5:93:2e:c5:e8:f0:88:4e:7a:13:36:c9: d5:2f:f4:74:57:45:b6:e4:45:cb:0b:3b:d9:42:52:b8: c1:1e:ee:d8:7a:f0:de:10:66:af:86:7a:31:38:50:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:d3:cb:f7:5f:c0:8f:8c:dd:9f:80:fb:9e:e5:54:03: 25:25:a5:a3:db:bb:17:c0:54:10:f4:59:49:0f:bf:28: 77:47:4e:a2:99:04:7c:43:87:ee:eb:3e:e0:17:f8:d0: 43:62:0f:9d:0a:48:ba:d5:71:4f:79:f5:78:14:18:7a: 2d:52:65:18:25:74:4e:2c:4d:9d:41:c4:f4:d3:22:77: 75:c8:d3:e3:93:3c:8b:9f:7c:dc:28:e4:f1:70:7c:b4: 8b:0c:e7:2d:ab:3d:b7:d7:d4:33:17:e6:84:fd:a1:fe: b2:cc:b9:98:11:46:83:c7:78:75:58:e3:f9:47:03:07: 29:f7:5d:02:7b:cd:8b:e3:a3:c6:5c:42:5d:c7:95:91: b9:df:a3:fe:aa:32:a4:f8:72:4a:cf:67:73:d1:f9:92: d4:2e:50:e1:34:08:da:4e:e8:09:3a:16:3e:88:eb:64: a8:f5:46:d5:f1:50:c7:1e:96:f2:d5:d0:dd:98:4a:50: 96:bb:40:0a:d4:5d:51:f6:a3:0d:96:dd:0b:1a:57:bc: 88:a6:25:d7:a4:4a:3a:eb:ce:65:ff:8f:b8:66:3a:a1: 4a:89:3e:1f:3f:93:a3:a4:06:88:90:17:57:2c:e7:62: e5:85:3f:9b:49:89:0d:5d:90:61:7c:11:22:71:1c:ed Fingerprint (SHA-256): A9:E9:6F:CA:48:9D:45:20:F7:E5:20:5F:1C:2D:C3:90:EE:D4:8D:DE:BE:37:E4:97:26:4E:22:06:B2:29:47:50 Fingerprint (SHA1): A7:ED:61:AE:9B:CE:C6:27:2A:01:2E:57:A2:82:C8:E9:96:23:39:A3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4616: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:4f:bb Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Wed May 10 12:20:03 2017 Not After : Thu Aug 10 12:20:03 2017 Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:8f:5b:0f:f3:d4:aa:13:40:6c:36:ae:de:70:b3:37: 3c:87:e6:63:98:da:dc:86:3d:64:56:cf:df:8d:38:77: 9e:c0:59:1a:80:5e:9d:e3:59:3b:26:80:c6:95:ea:3b: 83:ba:69:aa:f4:1d:ba:72:9e:0e:09:44:91:0c:1c:d8: d3:42:00:03:bb:53:97:e2:ff:69:7b:b7:2f:8a:57:ac: 2f:fe:80:74:eb:fc:51:08:39:a4:c4:eb:70:80:2f:a0: fc:1c:80:d5:3e:1f:1d:8d:47:db:34:f8:2d:c2:cb:ff: 5e:5d:23:0c:65:fd:16:77:60:ff:97:00:53:ad:bd:4b: 61:c4:5d:1a:cf:14:28:eb:fd:08:4c:50:26:ca:52:5f: ea:61:00:fc:e5:16:a8:cb:b6:c0:0e:d3:8c:59:c2:69: 70:f5:78:9b:49:d7:e1:ae:f2:ff:bd:eb:57:b0:a6:91: b4:81:ec:5d:f6:75:54:3d:ee:3b:ca:38:34:15:70:80: c2:21:31:36:de:2b:88:f2:42:66:2e:bb:b7:9a:ec:f3: 56:51:8a:97:12:71:11:08:68:f6:6c:53:b3:23:14:02: 18:e2:61:18:a5:0a:b3:21:b5:b7:82:f3:39:c7:2d:ba: 53:71:74:79:83:e5:e0:d1:14:89:8e:18:1c:5b:63:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1e:4d:6a:c0:82:ec:9c:b7:66:80:b4:8f:1b:03:f6:10: 33:c8:79:2f:96:78:67:92:c6:d9:23:1b:ce:58:f3:32: 06:03:49:89:88:c0:bf:7d:e4:3f:b1:4d:39:bb:fe:96: cf:24:71:e4:59:d7:56:2b:e1:7d:33:82:73:0d:2f:06: ec:88:84:b7:d1:0c:1a:c8:b9:97:11:62:70:30:d0:09: 17:03:2e:d8:d8:48:74:48:a1:da:13:66:01:cf:d7:e5: bd:37:7d:f3:cb:c2:96:55:cd:db:68:73:b0:78:4e:45: f5:a5:71:30:5a:91:5c:cb:75:29:6e:a2:61:a2:3c:37: 54:54:c8:bf:91:c7:6e:81:a1:f3:58:96:3e:80:5d:db: 7f:68:2e:a4:45:dd:db:e8:de:0e:9a:d8:e7:c1:0a:d8: 6b:47:c5:50:9b:b4:28:c5:b1:12:f0:fe:a7:00:de:b9: 6f:73:be:39:6a:82:48:aa:a4:4d:07:ac:2c:d7:5a:99: c8:06:d5:cb:8d:c2:bc:f2:56:f6:e8:32:a3:d9:fc:15: 8f:ea:cc:3e:ef:34:a3:2e:b1:55:3a:2d:17:c5:64:08: ab:1a:cf:1a:c0:9d:ff:06:7c:bb:cc:a8:9e:98:85:82: 12:90:8a:38:10:21:43:45:fa:5d:fa:d6:dd:b1:94:cc Fingerprint (SHA-256): 34:24:EE:7B:15:5C:4E:5B:E5:C3:E1:2B:C5:9B:F9:D7:31:AF:D0:DB:FA:15:7E:A4:21:11:61:12:E8:73:A4:2D Fingerprint (SHA1): 23:8B:D7:32:8C:26:48:1B:FA:F3:52:58:7D:2B:EE:A9:36:D7:D4:7E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4617: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:4f:be Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Wed May 10 12:20:06 2017 Not After : Thu Aug 10 12:20:06 2017 Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:3f:66:ab:04:13:9a:c4:87:de:2f:20:5c:d8:3e:a1: 42:5b:16:c5:30:f5:de:6d:bf:51:d7:9f:89:99:5a:74: 13:3e:fd:ae:04:65:3b:08:68:63:7e:01:de:ee:9d:58: dc:15:5f:6f:4a:12:82:20:24:72:98:c9:a7:12:d5:27: f4:72:4c:4b:a4:c2:d0:5a:b6:39:23:fa:a4:0e:91:7a: 94:9a:41:c0:7e:4e:0d:bd:b5:e5:9e:45:bb:73:53:32: 8b:ae:7e:ed:4a:65:0f:47:9c:e0:69:a1:8c:e0:97:9c: a6:48:fd:4d:71:be:39:01:c5:7e:a4:9f:32:05:b0:9d: af:3c:c7:1e:90:07:45:30:c6:69:e3:d6:03:ab:1d:5c: 52:0d:1f:12:cf:46:22:98:8e:76:74:c9:5b:2e:27:11: 62:64:ea:fd:63:30:78:46:03:fe:3f:b7:56:56:7f:7c: 72:69:e5:ad:67:2f:44:5f:0c:35:60:6a:40:66:c3:2a: f8:b6:81:64:aa:64:53:e4:e7:ae:c0:80:b5:9f:d9:9a: 5b:8b:62:3b:70:88:83:32:a0:73:34:92:43:39:03:d2: 74:24:3d:5f:ea:d3:f8:2f:27:5b:f5:86:14:d2:48:e6: 86:b3:34:f7:a3:9b:b2:c0:a5:bf:7b:c5:d2:dd:59:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:a5:91:12:ca:3d:fd:25:dd:dc:91:93:ff:a8:38:b1: 20:9d:03:a4:16:21:df:23:89:27:52:36:15:ab:18:00: 4a:1f:b6:ff:c9:bd:3f:1b:ce:40:d8:0d:48:8b:eb:6b: fc:9e:77:09:a4:83:21:d3:44:7c:f1:55:2d:80:5e:d3: f5:da:a9:f2:a1:44:3c:bf:d5:f0:28:92:3a:3a:e6:76: cc:70:e4:e8:c3:2e:f2:6c:2b:12:76:e9:a7:26:8b:03: 3b:03:7e:7b:03:f2:54:db:30:a5:a7:c9:25:ff:23:fc: 87:5e:6a:be:0a:54:66:d2:26:ed:bf:83:1d:f4:de:78: 4b:6d:4b:45:96:b7:92:4b:fe:7b:f3:80:a1:b8:64:b5: 28:1d:30:54:9c:f5:b2:74:11:9a:43:4b:6d:d1:15:56: 58:b5:72:02:a3:c8:91:5a:1a:7e:a8:32:ad:ec:9c:4f: ba:8e:59:dd:7a:99:2e:2a:fa:2a:41:11:0c:ed:d4:8f: a2:26:36:3a:fa:91:40:95:b2:11:86:b1:55:88:2e:e3: dd:01:a6:78:ba:46:fe:ee:5a:f1:5e:1a:3e:ce:83:56: 71:92:dc:5b:d2:51:fd:00:b4:48:8c:1c:4d:aa:23:fc: 94:13:1e:e7:fb:04:81:70:fb:79:97:51:62:bd:e4:01 Fingerprint (SHA-256): 79:7F:E6:D3:07:C6:44:16:A3:BD:DB:87:00:FA:1A:52:71:5D:EE:0A:18:F0:5D:56:1F:22:20:EF:91:BC:65:AD Fingerprint (SHA1): A2:95:DD:7E:DF:C8:DE:28:AC:6B:58:71:D4:E9:3B:D8:A3:A7:A4:C2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4618: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:4f:c3 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Wed May 10 12:20:07 2017 Not After : Thu Aug 10 12:20:07 2017 Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 99:a1:26:51:90:9e:6a:5f:43:9f:1d:85:32:a1:1a:be: 3e:07:ea:ea:cd:eb:6b:21:25:c4:a6:db:ec:a4:9d:6b: ce:29:23:f2:44:a7:e3:23:83:78:b3:65:d8:c0:8e:ec: ee:ba:1f:1c:55:7f:3d:cf:e6:b5:12:53:b3:13:8a:1e: 28:c4:8c:69:a7:9e:d0:e6:0f:27:7d:2f:ba:8c:2a:11: 50:ff:01:17:6c:2e:dd:4f:5c:01:7a:2a:13:62:26:76: f7:ce:e1:4d:d8:41:b5:11:23:55:1f:23:65:ad:cd:36: b1:11:af:cf:e3:8c:3d:a3:2b:dd:2c:28:f4:be:38:0b: 88:b5:eb:54:d1:60:50:60:f7:0c:c5:05:44:78:35:1e: 82:31:9d:4a:e8:c5:a7:89:77:c6:44:ad:a0:80:d2:49: c3:8b:d0:12:9f:17:b6:90:84:b5:e5:de:f7:87:c9:54: b5:b2:33:ec:e3:95:ae:cf:09:13:85:f5:d7:9f:99:67: eb:77:a3:9c:a4:28:8b:e8:53:f5:c9:3b:61:90:34:a0: 7b:8b:b5:96:94:96:a0:5b:48:4f:3c:ca:14:b9:50:7b: 7c:45:eb:df:13:dd:86:18:79:77:59:8e:49:6c:2c:2d: 28:06:03:22:c0:f3:b0:6d:50:3e:96:6b:9d:66:62:2d Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:58:38:de:41:ca:f5:dc:5c:7c:80:ef:70:62:11:d1: 15:43:03:04:2b:f5:26:9d:01:29:c9:84:2d:c3:75:12: 20:91:e3:04:0d:d4:84:a1:f4:f8:e3:dd:6b:ac:ca:bc: 0a:4c:65:ce:6a:20:93:8e:da:7f:7c:3c:cc:0e:31:ed: 3f:50:0e:fa:01:d0:96:62:7c:e1:40:be:88:39:64:f0: 77:49:20:ed:83:ea:27:04:f1:f1:24:8c:95:32:b9:a5: f7:ad:f6:72:08:0a:9a:13:e5:c7:43:a6:b4:da:71:0a: 41:29:4f:46:46:11:dd:c2:f2:61:b8:93:ff:fc:28:89: f4:db:22:37:1b:30:fb:83:9e:6a:d1:95:6c:da:4c:e6: 46:1d:73:ca:e3:fe:17:3b:21:76:f4:9b:a6:73:dd:8a: 18:8f:cc:10:7f:fb:11:48:ae:e5:27:7a:02:72:63:f7: 3a:d8:ff:35:f9:a7:93:96:13:fd:5b:a1:63:74:ab:40: 8d:cd:5f:e6:c9:3f:af:c3:87:2b:64:55:bc:76:db:e6: e5:6e:9e:1b:f5:ce:f1:20:44:fc:97:49:fa:1d:1b:63: 85:04:79:d4:db:02:fb:d0:19:41:b6:c3:0d:f8:f0:f2: 3f:04:18:24:a2:38:2c:7c:ec:53:e9:bd:87:cd:34:ac Fingerprint (SHA-256): 0B:A3:30:EF:D2:D9:9A:19:56:A1:F9:9C:DE:DF:1A:FB:77:F0:69:81:2D:1E:F6:48:D1:DC:8C:4F:D1:48:E7:48 Fingerprint (SHA1): D6:6C:97:26:FA:B5:EC:34:46:87:7C:55:68:31:AF:65:60:64:46:1A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4619: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:4f:c5 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Wed May 10 12:20:08 2017 Not After : Thu Aug 10 12:20:08 2017 Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d9:d7:77:e1:1f:2b:7f:5e:50:e2:ca:fe:70:a7:8c: 54:cd:3a:c1:3d:8d:77:a5:98:1e:eb:6b:9d:87:84:9a: 1a:98:f5:57:a9:e2:7d:56:30:b9:0e:00:b6:bd:a2:9c: 95:a3:60:b1:a2:71:17:c5:48:38:b7:ef:87:5a:fd:9b: 70:34:93:ac:b0:e3:01:04:d3:de:92:d5:1d:39:25:ff: 67:0c:0a:00:4e:32:d1:73:62:2b:b5:ea:e1:79:4a:c9: 74:b2:a1:1d:5c:ef:b0:f4:b7:b1:f4:5e:21:10:10:40: 20:45:94:7e:bf:d4:42:be:b8:e2:91:70:52:4a:fc:88: 27:9c:5b:2c:52:3a:e3:20:52:89:dd:a7:8c:27:9a:4b: 5b:ea:e8:c0:4a:1a:9e:6c:4e:95:e5:74:51:6e:5a:d2: 00:6e:84:5e:34:93:e5:8e:ed:bf:ba:20:84:05:e2:18: 22:c8:24:61:2a:e6:df:54:50:47:28:a3:45:70:a2:25: 32:dc:e7:0e:5c:a0:76:00:f8:c9:c6:cd:ce:e4:af:17: d3:b6:d1:52:35:22:9b:bd:cf:dc:13:20:9e:84:9e:97: 01:c9:33:db:b7:e7:19:5b:d9:db:6d:fa:79:2f:75:13: a2:b5:f8:3c:f9:ef:0e:ed:f3:49:3e:c4:45:1d:ca:33 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:db:1b:fe:cb:a9:7b:25:4a:0b:9e:a2:cc:56:6b:71: b8:09:0d:54:11:bc:f0:f5:42:e4:32:4e:8b:3d:32:ce: 42:e6:42:43:a0:5d:af:04:b6:d2:6e:7f:14:4d:ea:f9: 67:7d:88:fd:94:48:36:de:e3:9e:84:5b:1a:53:4d:f1: 69:6f:cb:3b:4e:e1:c9:7c:b4:b7:d3:c1:6e:b4:b6:09: a9:bb:98:90:24:f4:ce:15:fb:c0:3c:5d:87:4a:4e:dc: 7c:01:3e:46:fb:15:b0:d1:16:1c:f8:9a:0d:a7:51:2d: 34:03:02:80:3c:ce:f9:81:e2:70:f6:e4:f8:43:99:e3: 87:90:b4:61:62:c5:5d:bd:35:86:dc:22:b8:a5:63:08: bc:12:79:75:6f:1d:f1:fe:e9:bc:98:40:2d:9c:b5:21: fe:6d:cf:5f:50:ed:e7:17:fe:42:29:79:5c:3f:e0:c6: fe:05:d8:97:7d:48:91:28:e4:30:18:6d:99:32:70:ad: b3:85:16:1d:33:a2:74:7d:69:19:9d:58:f2:2d:2d:80: 8b:d2:01:27:ca:58:0a:32:f2:ac:78:80:4e:8d:82:11: 17:fe:74:a7:ec:2c:60:ad:f1:e0:99:03:7a:55:52:7d: d7:d6:b5:b9:56:aa:07:92:16:31:b7:53:c7:f1:38:11 Fingerprint (SHA-256): A4:07:61:E5:4A:42:5E:81:FD:F6:18:B0:2C:A7:8F:C8:67:C4:59:54:A7:19:19:E3:83:C9:AE:70:74:13:34:A9 Fingerprint (SHA1): 61:81:F4:50:CD:C3:98:82:4E:95:A2:4A:F1:8C:FA:65:07:B8:27:93 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4620: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:4f:c7 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Wed May 10 12:20:09 2017 Not After : Thu Aug 10 12:20:09 2017 Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:9d:94:aa:4e:f3:5f:b9:49:12:59:de:05:26:6e:b7: 2e:51:69:8e:4f:71:1f:01:92:85:07:1a:89:27:e4:91: 54:d0:41:98:3c:a5:e7:f0:55:8b:5f:db:c6:70:77:d0: ad:78:03:c2:fb:5d:ea:8f:97:d6:c2:1b:ee:48:1f:74: 08:2a:5d:d7:08:e0:9d:71:24:43:b6:b7:bf:a1:e2:aa: ee:a6:94:cb:51:d3:a1:e3:01:67:df:22:30:45:3d:c2: 8c:6b:c0:3f:eb:06:db:54:4d:31:a5:61:8e:1f:07:af: f0:c8:ce:8a:6d:cc:a8:fb:9c:ea:14:b9:62:bd:49:6e: 0e:7c:3a:46:b9:88:01:43:af:1c:36:ab:14:49:ad:27: 06:8d:8c:6c:45:97:70:ec:3d:15:11:91:3e:dd:6c:6f: ac:ff:6b:61:a0:61:36:41:89:68:74:a6:76:98:f3:30: ba:35:66:56:93:d1:24:09:2e:5b:7c:49:ee:dc:a7:dd: 71:36:c3:54:7e:bb:7b:50:c6:5f:e7:fd:aa:51:9e:1c: 79:58:ea:3e:70:eb:0b:1c:54:bf:5b:2e:70:c8:93:0a: a9:ff:cd:9c:d2:52:98:8a:eb:bf:5e:c4:6c:d9:00:5f: a1:c5:ee:67:b2:55:ac:13:b9:4a:3b:fd:8e:b6:7d:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:cd:0b:ad:03:9d:89:09:5b:fc:46:11:e0:96:e1:72: 04:09:ff:c1:34:7b:51:a8:62:ce:81:8d:7c:13:a5:f8: da:db:28:f7:a4:2d:93:44:4a:b5:50:73:1c:cd:14:95: e7:45:67:1d:21:35:e2:ff:8b:0a:c6:e0:25:72:2e:5a: d4:c4:c3:bc:fd:29:1e:07:fa:94:39:27:34:4e:0c:8f: 64:da:2f:04:4b:33:ce:c6:91:de:85:54:ef:68:98:a5: a9:51:73:93:43:98:d1:03:e0:fd:81:6f:de:e4:73:26: be:0c:79:ff:c5:8c:2d:a9:b2:c9:f8:6d:af:67:82:ad: e9:bd:5f:a6:fa:0f:ef:5f:1b:57:84:04:b1:c0:c5:c5: 16:8b:11:31:34:f6:bd:f2:5b:bb:68:f0:78:ee:b6:5d: a4:b5:d3:09:4d:c8:ed:1d:69:67:4d:50:40:00:52:a5: 50:e1:28:ec:8f:93:15:63:ff:89:ee:14:96:7a:bf:a4: 56:72:4f:47:41:da:10:9c:33:46:88:e0:ac:dd:a4:a5: 1d:f6:3d:37:67:62:62:3e:14:c4:29:40:22:7e:d1:31: d2:c3:75:5b:fd:a7:f5:3a:13:2d:36:1a:14:75:8b:a4: f6:af:30:05:4b:ed:da:ac:4f:87:45:3a:00:c6:30:a5 Fingerprint (SHA-256): 13:F3:D7:89:FA:2A:39:08:89:82:2D:6C:21:46:7D:8D:F9:5B:90:91:5C:4A:08:75:1B:58:CE:F8:F9:8B:10:18 Fingerprint (SHA1): F7:8A:1C:98:FA:99:AE:C7:B6:BA:A1:CA:B3:C9:A9:3E:B2:F5:74:52 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4621: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:4f:c9 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed May 10 12:20:10 2017 Not After : Thu Aug 10 12:20:10 2017 Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:14:e7:08:68:2e:ca:68:f7:69:7a:3e:1f:37:df:cb: 92:2c:3b:7f:bf:3b:55:35:d0:02:20:6e:5f:f2:f7:1d: e5:40:46:9c:e5:23:cb:42:9d:70:b4:91:5f:e4:42:ec: 88:be:9a:99:79:33:90:b5:ec:05:b5:82:72:87:16:46: c8:52:15:c7:b3:c7:aa:8f:37:ec:f7:c2:47:09:56:02: fa:77:4b:70:2a:45:7a:a8:3d:c4:7c:4f:9d:73:cd:ac: d3:fd:39:63:24:01:89:8a:f3:8f:d0:9e:3a:61:d9:f8: d0:5a:8f:f2:78:81:7f:9f:4e:2d:f9:37:e5:c3:7d:41: 13:4a:95:1c:dd:52:92:bf:ca:a3:18:ce:0b:a8:95:ab: b6:c8:66:8b:cd:3e:90:8e:f9:36:d1:3b:bc:49:bd:eb: 7d:88:fb:62:b5:1e:57:9f:03:18:3e:ff:93:35:44:5c: 2c:5e:e3:d8:ad:18:d9:0c:bf:ff:93:b5:cc:29:17:64: b7:5f:3f:5f:67:5c:08:f6:f4:66:fa:8d:76:0b:30:11: c3:6d:97:db:f0:61:6e:d3:64:dc:24:b9:77:60:36:ff: be:55:c5:77:b6:c0:68:b5:c2:f3:a0:7f:10:96:e1:56: e8:2d:90:5f:93:b9:67:02:c0:9c:61:af:60:c8:af:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:44:6b:c0:d5:6b:0b:0f:95:08:fa:6e:9b:f6:f2:43: 7d:39:de:39:e2:e5:8d:ec:a8:a1:1c:66:26:0d:5a:5c: df:1b:bc:08:4d:e7:e8:79:89:ba:44:04:c4:e0:a4:43: 0e:c8:79:ae:85:fe:18:1d:3b:c8:3b:00:2e:5c:6d:28: b1:1d:9f:16:7d:d2:50:c9:f8:17:4a:f2:5f:b7:36:51: 53:f5:2e:b9:9f:59:5e:42:b8:22:b4:33:40:b1:5a:ea: dc:e5:f1:ed:38:57:89:4d:4a:9d:ea:42:19:5f:a6:c0: e9:37:0d:39:c5:31:f2:bd:77:f2:c8:71:89:eb:48:f9: 73:c9:1c:51:f1:9f:52:42:c8:3e:38:a0:ac:86:12:83: 80:11:38:23:b3:b7:12:e7:f5:af:1c:7c:54:c1:7a:f6: d7:08:97:35:0a:56:50:19:c7:bf:87:c6:76:f2:5e:46: 5e:cb:f2:c8:9a:a8:91:cd:f6:46:2f:09:51:f8:f6:98: 72:7e:46:3b:ed:b9:d3:0e:39:0d:2c:99:e8:8c:05:7b: 29:0b:dd:07:ce:e6:53:f9:6b:a6:a1:bd:8b:ee:0d:f1: 44:b6:af:57:81:5c:98:c6:2f:e8:be:e0:46:ba:64:b0: 42:2a:15:47:9f:a4:a0:4a:80:2f:f5:69:b4:57:bb:ff Fingerprint (SHA-256): 76:D4:C6:0D:40:F8:35:BB:39:96:E1:FA:F8:9D:B9:74:BC:A5:19:52:1F:A5:5A:2F:C2:78:18:F0:07:31:B6:0E Fingerprint (SHA1): 22:22:7C:8C:8D:DD:8B:2B:7F:76:81:69:E7:DC:97:E6:65:7A:FD:2B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4622: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:4f:cc Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed May 10 12:20:12 2017 Not After : Thu Aug 10 12:20:12 2017 Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:39:7d:a1:d4:9d:37:c9:75:6c:46:3a:3c:4d:31:12: ec:8b:3d:45:5b:34:f2:95:8d:b9:2d:df:f0:89:12:cf: 45:ca:15:45:8c:f1:63:37:3c:a8:fb:76:28:09:5c:46: 65:9b:de:c4:89:ae:f3:f8:55:96:13:2f:e9:da:c5:e7: 21:1c:36:62:5a:09:d7:b9:01:eb:c1:b7:17:fe:1f:b7: d8:2f:56:25:bc:0a:83:f7:72:23:b5:08:bc:33:10:48: 22:4f:b8:65:e4:49:06:50:1c:f4:de:1f:ef:33:6f:7f: 70:6a:d7:28:2b:e1:53:0b:fc:b8:8a:b3:c4:33:d7:b6: 40:8a:8a:19:29:ed:b0:fd:1e:5c:97:aa:7b:0c:0a:09: c9:7b:a4:28:81:65:62:b5:f9:47:ca:c1:b8:79:ce:d7: c9:83:40:93:21:a0:0c:91:3f:49:83:a3:a9:b8:9d:e9: 40:4c:d3:ad:92:c8:81:7a:64:a6:d7:7b:84:a4:5a:36: 88:f0:9d:70:f1:16:f5:b7:16:a0:63:76:5e:2d:58:bc: 99:6f:1a:0b:cc:51:25:6b:6b:f6:85:dd:5e:4b:33:ae: c4:bf:5a:d0:cc:6f:cb:8f:98:81:7b:f2:58:af:5d:39: 2d:c6:cb:8e:71:0f:9a:be:cd:d2:d8:d3:1f:83:94:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c0:80:c6:06:ae:92:b8:c9:fe:16:d8:cf:61:20:43:48: 28:f4:46:de:12:a9:9c:19:40:02:a7:b9:c3:f0:5c:9e: 6e:ce:4f:b7:0d:29:1b:d1:25:e9:98:65:18:85:36:98: 91:0d:d1:c5:e6:95:39:05:4a:11:d2:87:0b:ce:44:07: 9a:36:44:8f:5d:1f:35:ec:ce:7b:2e:62:58:93:7a:70: a0:53:3c:a6:0d:f6:31:e5:04:99:c1:3b:96:27:03:2a: 4e:f9:03:dc:3d:9a:2b:b1:d0:0e:bb:69:94:03:56:96: ef:30:4b:d0:d6:e9:c3:da:cf:15:70:e5:16:19:f0:e4: ac:d9:89:bf:dd:7f:f4:0c:36:6c:59:c3:71:79:32:29: 68:a4:f1:b8:25:23:84:48:05:40:6b:e6:a2:36:75:c2: 91:7d:64:fb:66:94:44:42:65:42:c7:29:09:39:7e:ed: 0e:b8:82:61:a4:ab:98:dd:5c:0d:67:b9:a4:e5:12:69: e7:d8:13:ce:2f:35:0f:81:a6:dd:d0:4d:c1:9d:21:a8: 7e:31:1d:2a:86:ce:f2:fb:c7:12:6a:8a:51:fd:a1:7e: 11:ab:5b:d4:38:a6:1a:33:1e:a6:38:c1:c2:10:9d:8d: a6:70:a8:bf:fd:1b:fc:71:de:6b:6f:f1:95:3e:2b:fd Fingerprint (SHA-256): EF:B4:A7:59:2E:59:11:CB:48:4D:72:EB:53:FF:14:5B:53:CF:99:7E:B4:6E:78:74:0C:1D:5C:E4:B6:17:E4:E0 Fingerprint (SHA1): E6:2A:B3:89:DB:AC:21:43:30:36:51:B2:49:06:1B:81:8C:9F:FA:F3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4623: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #4624: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #4625: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #4626: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:4f:d3 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Wed May 10 12:20:16 2017 Not After : Thu Aug 10 12:20:16 2017 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:0c:cc:c6:24:56:8d:91:99:9e:f0:cb:28:94:1d:64: b3:e9:eb:88:19:ee:04:78:e7:63:c2:b8:03:9c:28:66: 7a:d0:fd:44:3a:94:d2:8a:ab:74:30:85:f8:34:8e:fb: 52:d1:0e:1b:70:20:ce:39:5b:e3:59:f5:c7:68:89:d0: 10:63:83:52:4f:8d:ec:e7:ae:e5:cb:da:97:ff:f1:a9: d9:a1:3e:66:d4:45:dc:b6:db:b9:e3:42:d4:ad:ea:89: 59:e7:23:0b:e6:cc:69:e6:fe:f9:09:53:b2:90:4e:3f: b5:c5:7e:de:74:37:4e:8c:e5:f4:b0:e7:aa:1f:96:5b: 09:96:6a:13:d3:ad:d0:b9:61:d7:95:3f:0e:15:64:d2: 0f:a8:1e:cb:3c:42:17:17:d3:56:38:2e:c3:81:c8:f6: 9d:3e:61:ee:9a:75:5b:32:9e:b7:36:0f:ab:83:92:8f: 27:58:ba:d9:10:11:cf:bd:9e:35:c4:e1:ef:f9:d1:7c: c8:70:5a:4c:7c:9f:50:b3:ee:93:a6:76:71:b7:67:b3: 93:73:6b:c3:1f:3e:68:8c:c7:fe:f9:7f:ec:4b:18:12: 0d:8a:67:9b:5b:ae:3e:50:09:62:1b:f3:de:5a:b2:a3: 42:5b:e9:bf:10:0e:ce:3c:e7:21:3b:92:81:fe:fe:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:0f:55:24:84:58:56:f0:71:f6:61:89:4e:e6:f5:f4: c4:58:f3:05:b5:c8:da:3f:41:12:6d:be:ec:b3:e7:6d: bc:57:ed:7f:4b:79:66:40:21:91:e7:5f:50:72:03:90: fe:7f:e1:dd:00:ee:3b:62:5a:ec:19:85:9a:76:05:97: 43:9e:7a:6e:76:6c:e9:db:16:60:ea:53:6d:7c:a8:39: 22:0d:9f:fb:f4:8b:03:cc:98:57:ed:78:7a:bd:0c:2f: c8:c3:9c:fd:17:1a:63:22:4c:58:98:b6:dd:37:84:9a: 41:99:c8:cc:ec:8d:25:84:e9:33:ad:84:cc:bc:79:5a: 6a:cd:db:b4:a4:d9:eb:e9:29:06:83:4b:68:74:5a:d3: a7:34:e7:ac:8a:05:15:ed:56:02:20:70:a9:48:a9:73: 2e:22:3f:ba:2e:4c:01:76:27:81:df:30:5a:ae:c1:28: 98:87:37:c0:9e:79:f4:83:cb:03:a1:a9:2d:15:c5:57: 8d:39:37:b6:6f:8b:8e:a8:80:f6:19:60:13:d2:89:9b: 7e:03:f8:2c:8d:ef:02:ab:fd:76:f0:af:b7:ea:fe:fd: c4:0f:a5:75:00:7a:c9:e0:09:7a:1e:37:01:e7:e7:ad: e2:40:fe:e9:0c:f5:b1:ef:ea:ec:2e:01:2b:1e:ed:65 Fingerprint (SHA-256): FA:03:C6:B5:DF:97:3F:27:C1:C6:5F:98:76:22:7C:4A:64:7D:F3:0A:E5:95:DF:A9:F9:7A:06:2A:B0:8F:11:BF Fingerprint (SHA1): 33:1C:E4:6F:3C:B2:9B:F6:57:27:1F:A0:AA:2D:F0:4B:C6:4F:57:E3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4627: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der cert.sh: #4628: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #4629: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #4630: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #4631: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #4632: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #4633: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #4634: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:4f:dd Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Wed May 10 12:20:20 2017 Not After : Thu Aug 10 12:20:20 2017 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:b7:72:ee:63:23:16:e0:17:8f:33:aa:38:7d:29:f2: 97:b0:49:3d:c8:f3:52:fb:05:21:de:27:71:8c:5c:16: 51:31:59:06:01:08:e2:c9:16:dd:35:39:a2:ff:88:b4: 62:13:74:cd:cf:a5:6a:54:b2:c6:45:40:b0:31:4b:c0: b4:2f:c5:f3:b3:8d:52:82:ae:88:5d:16:a1:de:3e:bc: cd:c3:a4:46:c4:64:6f:59:a7:5e:16:b5:b1:28:0b:e4: 5f:6e:a1:02:37:a4:ef:49:c6:b1:e1:ac:89:63:36:66: e0:14:b6:16:1b:07:10:d8:b5:45:9a:dd:37:6c:13:f0: fa:12:ca:af:ad:db:d5:c7:14:67:47:26:2b:80:78:ec: c3:6a:63:4c:73:d2:cd:3a:4b:63:dd:42:82:1e:5e:53: 16:a8:ea:d1:72:2a:f7:27:15:b6:10:73:fb:c3:9f:29: 87:64:f0:27:84:99:5e:0c:a4:ee:d4:92:b8:48:0c:b1: b8:0b:0a:15:50:1e:7e:70:a6:e7:4b:58:06:bc:0a:50: 6e:88:00:7c:71:68:69:37:f6:eb:ca:ab:08:06:e0:33: 54:40:6b:63:3d:43:1b:66:52:19:2a:cb:ea:e6:8c:03: 2a:1e:e8:31:02:fa:16:bf:42:aa:b7:85:b1:66:ca:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:a4:ea:f7:ab:a4:b3:01:5e:f7:0b:08:2a:ee:03:f2: 73:85:25:41:b4:68:30:bf:68:47:13:f9:3d:89:f6:43: 27:55:3d:5a:34:52:94:55:99:ef:f4:4c:8a:96:d2:f0: da:f0:27:ae:a5:1b:9d:61:ab:58:bb:fa:74:3f:c7:53: 66:31:0a:46:b7:13:94:b9:44:cc:9e:98:80:03:23:61: 65:10:c2:72:3a:ca:df:96:5c:7a:7d:c4:21:3a:cf:6f: a6:ab:7f:5d:ae:dc:bd:11:6b:42:60:c3:66:3d:53:bc: 31:a4:e6:3e:50:54:17:62:4a:12:e0:f2:cc:33:2c:14: 70:ba:0e:4a:9c:d9:f3:88:7a:bd:f9:8b:da:aa:a0:52: 63:88:23:43:92:88:f7:43:27:7a:f0:77:d2:09:01:1f: 90:8f:fb:dc:4a:ad:76:31:ed:d3:be:3f:77:4b:ce:62: 81:ea:94:0e:75:3e:b8:de:a0:73:6c:87:d2:5b:8f:fd: 9b:92:ff:98:a1:82:ae:f2:e1:8d:ca:0c:9f:fe:6d:45: 3c:c7:02:2b:99:fc:11:d6:25:32:c3:68:77:c1:51:4d: 51:72:37:8e:7a:f5:d8:fc:ec:a1:71:45:2c:7c:f7:92: ad:47:8c:d0:4f:77:f2:a4:aa:9c:26:05:cc:01:9d:73 Fingerprint (SHA-256): A0:37:04:8C:F2:23:F4:F2:42:3E:1C:DE:B2:34:BF:CD:B0:84:B0:91:E4:6F:03:32:7F:4B:F2:DC:27:C3:82:A0 Fingerprint (SHA1): 5D:FF:20:7E:65:88:75:91:35:5C:84:6F:28:C1:C1:60:74:7B:98:CC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4635: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #4636: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #4637: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw cert.sh: #4638: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4639: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4640: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/dbpass -o root.cert cert.sh: #4641: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #4642: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4643: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #4644: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw cert.sh: #4645: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4646: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA.ca.cert cert.sh: #4647: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #4648: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #4649: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4650: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #4651: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4652: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4653: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #4654: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4655: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4656: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #4657: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4658: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4659: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #4660: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4661: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4662: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #4663: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4664: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw cert.sh: #4665: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #4666: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/CA -o root.cert cert.sh: #4667: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #4668: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4669: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #4670: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4671: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #4672: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #4673: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #4674: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #4675: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #4676: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #4677: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #4678: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #4679: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #4680: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #4681: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #4682: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #4683: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #4684: perform selftest - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4685: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #4686: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4687: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4688: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #4689: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4690: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4691: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #4692: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4693: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4694: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #4695: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4696: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4697: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #4698: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4699: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4700: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #4701: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4702: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4703: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #4704: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4705: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4706: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #4707: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4708: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4709: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #4710: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4711: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4712: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #4713: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4714: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4715: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #4716: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4717: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4718: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #4719: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4720: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4721: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #4722: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4723: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4724: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #4725: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4726: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4727: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #4728: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4729: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4730: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #4731: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4732: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4733: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #4734: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4735: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4736: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #4737: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4738: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4739: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #4740: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4741: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4742: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #4743: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4744: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4745: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #4746: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4747: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4748: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #4749: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4750: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4751: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #4752: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4753: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4754: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #4755: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4756: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4757: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #4758: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4759: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4760: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #4761: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4762: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4763: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #4764: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4765: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4766: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #4767: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4768: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4769: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #4770: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4771: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4772: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #4773: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4774: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4775: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #4776: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4777: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4778: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #4779: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4780: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4781: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #4782: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4783: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4784: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #4785: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4786: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4787: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #4788: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4789: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4790: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #4791: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4792: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4793: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #4794: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4795: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4796: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #4797: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4798: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4799: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #4800: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4801: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4802: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #4803: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4804: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4805: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #4806: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4807: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4808: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #4809: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4810: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4811: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #4812: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4813: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4814: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #4815: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4816: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4817: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #4818: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4819: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4820: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #4821: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4822: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4823: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #4824: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4825: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4826: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #4827: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4828: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4829: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #4830: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4831: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4832: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #4833: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4834: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4835: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #4836: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4837: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4838: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #4839: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4840: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4841: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #4842: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4843: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4844: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #4845: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4846: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4847: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #4848: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4849: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4850: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #4851: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4852: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4853: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #4854: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4855: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4856: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #4857: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4858: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4859: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #4860: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4861: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4862: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #4863: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4864: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4865: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #4866: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4867: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4868: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #4869: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4870: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4871: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #4872: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4873: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4874: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #4875: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4876: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4877: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #4878: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #4879: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #4880: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #4881: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #4882: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #4883: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #4884: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #4885: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #4886: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #4887: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #4888: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #4889: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #4890: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #4891: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #4892: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #4893: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #4894: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #4895: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #4896: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Wed May 10 12:21:10 UTC 2017 Running tests for tools TIMESTAMP tools BEGIN: Wed May 10 12:21:10 UTC 2017 tools.sh: Tools Tests with ECC =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4897: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e1:f5:1e:ef:c9:08:7b:b0:2c:17:fd:43:5b:6a:fe:07 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #4898: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4899: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4900: Exporting Alice's email EC cert & key (pk12util -o) - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4901: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bd:3e:89:94:60:36:65:90:4b:0c:ad:b6:ca:e1:92:b4 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed May 10 12:19:25 2017 Not After : Tue May 10 12:19:25 2067 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:af:35:42:b8:a2:46:d6:9e:cc:db:d5:13:9e:1f: a1:0d:aa:0d:f1:9e:7d:d5:73:ae:eb:50:a0:d3:16:94: 9f:9b:de:d9:bd:63:d8:a5:1f:20:ad:e3:4e:72:7e:07: e9:25:98:24:4a:27:86:39:c5:41:ae:b1:b5:8c:7d:a1: ec:64:5c:01:44:ae:ab:00:df:b0:fa:22:d9:e0:9d:d9: 9a:90:8c:a3:3e:65:e5:cf:dc:08:a3:52:4b:09:0b:27: 93:05:5a:1b:a4:c7:06:ef:bc:b0:73:8c:79:be:18:3e: 5d:00:53:01:21:f7:e2:99:24:59:f2:b6:79:20:bc:ee: 78:4e:49:5f:c5 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:88:02:42:01:27:11:15:b1:21:df:71:71:90:f0: 18:52:02:68:cf:fc:e0:a3:5e:e5:5e:d8:25:64:22:dd: a2:64:63:74:b8:f3:09:00:23:57:78:af:e3:a3:5a:e9: 7b:71:3a:c7:14:1e:40:77:d9:15:8a:9d:ca:7e:2f:2a: 71:b7:9f:05:80:7d:89:02:42:00:d6:64:79:fc:8d:9a: ff:7f:8d:66:1a:28:4e:0a:03:1c:a9:e8:de:34:a2:bd: ea:4d:c6:27:c1:90:c1:e2:4a:76:f0:35:07:74:39:a1: 16:8c:b1:11:ab:d8:45:df:a5:dc:70:4f:60:58:da:c1: 0e:3e:52:6d:55:43:2c:fa:e4:94:0b Fingerprint (SHA-256): 3E:98:C5:30:33:62:44:5A:F7:95:AF:87:C2:09:74:6E:20:18:75:C9:C2:FC:3F:DE:4E:FB:B1:DB:21:32:35:58 Fingerprint (SHA1): 8D:F3:8F:5F:31:31:0C:AC:08:42:AD:B5:B2:29:EE:92:01:38:47:EF Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed May 10 12:19:41 2017 Not After : Tue May 10 12:19:41 2022 Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:10:37:3c:82:91:73:f5:a9:dc:d1:d4:37:f4:77:2e: 7e:6f:0e:ad:bf:9e:92:7e:40:ca:1e:2f:c6:1b:d7:59: 70:47:4e:d1:72:e7:93:fb:45:05:46:89:7f:61:47:13: a9:0e:24:9d:5a:d5:93:85:c9:7b:11:51:03:0f:ae:f3: ae:74:e3:6a:59:e3:94:50:1a:05:7f:5e:23:5d:f6:94: 0b:56:29:1a:21:28:85:15:27:90:d3:c1:10:65:f2:95: 7f Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:87:02:41:6e:e7:e4:8c:2b:92:c1:58:91:d1:59: 85:32:8c:ad:52:02:d7:7c:c1:6f:9d:64:cf:15:12:2f: ce:a2:1a:d6:d5:02:0a:a7:93:10:91:a7:7d:bb:eb:16: 64:6f:60:67:5e:5d:d2:53:d2:c1:74:85:98:2d:16:15: f7:e3:50:c0:4a:15:02:42:01:0d:9f:07:5a:de:e1:c2: 33:44:57:56:60:ea:74:44:6d:ad:55:3f:45:05:32:30: a6:9d:be:64:32:4f:40:ff:89:f3:5a:a1:2c:84:f6:08: ec:8a:7d:8d:5d:1b:59:df:2a:ad:03:aa:2a:88:ff:e4: bc:c9:a7:34:d6:90:1b:57:a9:e9 Fingerprint (SHA-256): 2F:A6:76:EB:AE:88:C0:9D:41:60:84:68:82:02:77:30:63:5B:17:F6:EC:27:81:B2:EE:80:00:42:27:E4:B1:51 Fingerprint (SHA1): 02:44:14:C6:20:47:69:F1:57:57:D6:F5:76:36:15:CA:CB:0F:60:91 Friendly Name: Alice-ec tools.sh: #4902: Listing Alice's pk12 EC file (pk12util -l) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4903: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 60:98:13:ef:b3:da:91:c7:02:a1:bb:14:c9:56:e0:2e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #4904: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4905: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4906: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: a8:09:c8:68:46:77:51:51:b0:f7:86:84:02:10:a7:02 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #4907: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4908: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4909: Exporting with [RC2-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: aa:8b:95:8c:23:da:84:71:1e:fd:7f:e6:62:45:57:95 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #4910: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4911: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4912: Exporting with [RC2-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 4a:57:c2:04:71:4b:34:37:7a:66:b1:1a:9c:cc:7f:be Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #4913: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4914: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4915: Exporting with [RC2-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 3a:cd:66:3b:1f:ca:38:79:da:53:b8:f3:3f:bf:44:81 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #4916: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4917: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4918: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: e0:32:34:2f:6c:30:0a:5f:01:08:03:c0:47:1c:62:61 Iteration Count: 2000 (0x7d0) tools.sh: #4919: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4920: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4921: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fe:b2:2c:f8:65:fd:d9:97:6c:3f:20:37:f5:6b:99:14 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #4922: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4923: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4924: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d5:c3:bf:12:5d:29:6c:f5:fe:a5:42:e8:1d:af:6c:82 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #4925: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4926: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4927: Exporting with [DES-EDE3-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 11:92:02:9a:57:80:63:61:43:11:c1:56:83:2b:ed:56 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #4928: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4929: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4930: Exporting with [DES-EDE3-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5a:bc:af:e1:f6:fd:9c:dc:0b:fd:01:7e:0e:47:7a:17 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #4931: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4932: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4933: Exporting with [DES-EDE3-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1c:28:87:2b:24:b5:3f:74:40:ca:24:fc:92:2e:3d:e6 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #4934: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4935: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4936: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7c:6b:0c:f9:05:04:b1:06:99:32:ba:aa:a3:c0:64:31 Iteration Count: 2000 (0x7d0) tools.sh: #4937: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4938: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4939: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a9:15:cc:8b:fc:12:e7:31:88:11:fc:78:ce:06:7a:74 Iteration Count: 2000 (0x7d0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:5f:ff:d4:1c:88:c5:be:5c:86:1d:aa:8a:11:53: 9a:e2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #4940: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4941: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4942: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 17:b9:0d:12:a5:8d:55:5a:f8:e0:eb:c9:16:d4:65:e3 Iteration Count: 2000 (0x7d0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:46:c3:73:d7:ad:ed:dc:ec:66:97:bd:57:64:aa: 2e:75 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #4943: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4944: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4945: Exporting with [AES-128-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 87:30:e2:7e:64:7c:f4:c2:1a:aa:22:37:4c:3f:26:9b Iteration Count: 2000 (0x7d0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:10:88:5a:e6:2e:93:12:87:14:2a:b3:f8:05:02: ad:0c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #4946: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4947: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4948: Exporting with [AES-128-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4f:bb:60:db:83:e4:1a:67:46:c1:8e:95:88:ea:0f:58 Iteration Count: 2000 (0x7d0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:24:0a:fd:d0:eb:4f:fd:ab:06:9e:a6:38:5b:a2: 60:d9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #4949: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4950: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4951: Exporting with [AES-128-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b0:17:0b:65:4f:c9:d5:f8:62:72:40:fa:b9:b5:68:2b Iteration Count: 2000 (0x7d0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:b1:a1:2d:a8:77:6a:a7:98:94:83:bd:8e:17:c7: 5d:12 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #4952: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4953: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4954: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a1:6f:af:83:8d:04:3e:c5:c0:2c:db:19:5c:89:02:4f Iteration Count: 2000 (0x7d0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:8e:83:6e:46:1f:59:49:c4:15:53:97:5f:4d:b4: 75:f4 tools.sh: #4955: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4956: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4957: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 34:12:b9:22:5d:77:08:12:fe:39:6f:40:cb:59:94:9f Iteration Count: 2000 (0x7d0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:57:36:5f:20:cb:ac:d1:d1:ad:26:71:91:50:58: cc:bd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #4958: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4959: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4960: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 72:89:b4:e5:5e:0c:e9:7c:c0:90:ee:79:7b:73:74:97 Iteration Count: 2000 (0x7d0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:26:c4:e1:86:6c:89:05:06:f2:b3:88:c4:e1:07: 16:56 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #4961: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4962: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4963: Exporting with [AES-192-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c3:fe:b4:b0:3b:bb:da:6b:67:76:4a:90:c8:b6:b5:23 Iteration Count: 2000 (0x7d0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:7e:91:61:fc:cd:6a:3b:68:03:f6:7b:4d:c4:67: 59:3a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #4964: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4965: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4966: Exporting with [AES-192-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 66:6f:c4:5b:09:6f:e1:3a:19:de:cb:8b:3f:85:40:c7 Iteration Count: 2000 (0x7d0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:f7:ad:7c:43:83:69:c3:16:2c:b9:9d:78:f3:fb: 87:09 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #4967: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4968: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4969: Exporting with [AES-192-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c7:f8:07:36:e0:96:b8:0a:33:9c:4f:26:9a:ab:a5:75 Iteration Count: 2000 (0x7d0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:10:9a:47:3e:13:31:bb:c0:62:66:36:75:11:93: ba:e7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #4970: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4971: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4972: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1f:6c:08:f3:bc:b6:65:fe:3c:2b:88:60:57:69:f4:d5 Iteration Count: 2000 (0x7d0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:62:d6:45:2b:7f:83:20:2f:9a:ce:be:79:eb:78: a9:ee tools.sh: #4973: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4974: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4975: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 77:f8:fa:4d:8c:20:47:97:e6:f0:32:8e:eb:d1:78:33 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:67:64:d8:46:8d:fa:88:f5:86:57:5a:47:62:8c: 41:25 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #4976: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4977: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4978: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9b:31:f3:8a:c4:b9:33:d1:bd:83:b0:27:0d:d1:9f:05 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:71:fb:c2:3f:04:d3:09:1b:48:ce:5e:e0:a5:d4: d7:b3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #4979: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4980: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4981: Exporting with [AES-256-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 36:44:41:8b:3a:0a:52:d2:53:3f:d6:e1:2c:1e:b5:a7 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:1b:40:c5:66:d2:cd:c2:f2:18:ff:3b:a6:bf:a3: 5f:45 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #4982: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4983: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4984: Exporting with [AES-256-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e7:5d:86:aa:95:39:5f:ea:e0:23:26:9d:1e:b7:ab:ec Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:b9:d1:af:82:25:ba:b1:63:f1:34:ba:23:64:21: 0f:dc Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #4985: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4986: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4987: Exporting with [AES-256-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4e:12:e0:43:92:67:d2:27:00:8a:34:20:61:b0:66:01 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:e0:d5:30:d7:e6:92:b4:10:6a:9a:06:72:73:16: cf:11 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #4988: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4989: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4990: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 02:a1:3c:2e:16:0c:0b:30:c9:cc:ea:95:10:11:c6:a2 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:88:87:75:7d:81:21:8b:33:ba:d1:c4:64:d9:9e: 31:45 tools.sh: #4991: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4992: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4993: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 85:b6:47:fc:f3:14:61:ee:83:52:c8:d4:17:e8:ac:20 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:74:4f:7a:7e:d4:b2:81:3e:7e:6b:71:33:57:89: fe:8d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #4994: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4995: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4996: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 13:2c:96:de:31:28:ba:bb:8d:51:3f:99:bb:cd:32:96 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:28:99:c1:2d:2a:3e:8c:7d:b5:f0:ae:bc:22:da: 1a:56 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #4997: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4998: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4999: Exporting with [CAMELLIA-128-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0d:d7:a7:c0:e6:82:cd:dd:8c:b7:1b:c5:94:20:b2:cd Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:77:82:0a:8e:c4:6d:85:0a:4c:44:1a:96:19:da: c2:0b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5000: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5001: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5002: Exporting with [CAMELLIA-128-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0d:7e:00:f0:85:32:ad:04:2a:33:5a:4b:8f:98:86:bb Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:ed:b3:17:ca:f4:a3:6c:eb:31:c0:31:10:55:48: cb:fc Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5003: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5004: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5005: Exporting with [CAMELLIA-128-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 74:43:f6:ad:b0:cd:cf:c0:db:f3:bf:ee:e3:8a:1c:2d Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:ec:ec:9a:70:a6:75:f2:fa:1e:5f:f2:06:5d:72: 9e:69 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5006: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5007: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5008: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b5:de:73:c4:5f:fe:4d:d6:a4:43:28:16:04:3c:e2:fa Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:2a:f8:7c:9f:1a:9e:ad:4b:c2:e3:3a:84:a5:b6: e2:da tools.sh: #5009: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5010: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5011: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b7:b0:51:d5:74:5f:db:27:38:09:00:56:f1:04:fa:1a Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:b1:f6:3a:64:70:5f:a4:76:93:24:8a:4c:08:c5: 92:6c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5012: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5013: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5014: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b4:86:f6:e4:9e:8b:f8:6c:9d:d9:48:f9:92:83:e3:64 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:9b:df:3d:95:d1:80:4b:90:42:10:44:72:7d:04: 5f:02 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5015: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5016: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5017: Exporting with [CAMELLIA-192-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 70:0b:aa:88:b0:8e:93:f5:95:c3:cd:27:b4:4d:2f:0f Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:7a:df:d0:b8:2d:7e:8b:c8:09:45:7f:b6:de:71: 10:b7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5018: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5019: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5020: Exporting with [CAMELLIA-192-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1c:fd:80:bb:a6:fa:dd:e2:a1:46:bf:3d:cf:f3:a1:dd Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:1b:fe:a4:86:45:02:2d:8c:bb:de:c8:a4:d4:20: c4:f4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5021: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5022: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5023: Exporting with [CAMELLIA-192-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4a:ef:b7:fb:a1:24:62:75:0b:c4:a2:c7:77:23:77:98 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:d0:c4:e3:94:62:17:da:cc:0d:75:ef:e8:17:c5: a6:6c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5024: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5025: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5026: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 72:a0:fb:3b:a1:fd:d7:24:9b:e6:9f:0c:7f:54:ee:74 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:1b:1f:d0:2b:74:91:94:2d:3d:7e:58:2e:80:83: 16:59 tools.sh: #5027: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5028: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5029: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 36:4f:43:70:fe:83:5a:08:42:06:67:fd:b4:97:7d:bb Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:4c:8e:63:04:d2:01:22:03:59:11:73:4a:a4:02: 5b:14 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5030: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5031: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5032: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 49:ba:9a:5e:cc:6b:ba:01:8b:d6:0e:19:92:a6:6e:3f Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:8a:89:04:69:39:09:72:9d:18:18:0d:96:cf:62: e9:b5 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5033: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5034: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5035: Exporting with [CAMELLIA-256-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: db:f4:fe:be:02:14:b8:78:4f:2f:59:98:23:c8:2b:a8 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:f8:b6:95:9c:e1:96:da:c6:6d:9c:97:42:4c:2d: 84:ed Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5036: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5037: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5038: Exporting with [CAMELLIA-256-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0f:fe:04:dc:93:50:52:58:87:03:a4:84:c2:19:e0:8a Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:94:e8:b8:ee:01:e0:e8:62:1d:f2:6c:69:c6:3a: 19:0d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5039: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5040: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5041: Exporting with [CAMELLIA-256-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 84:13:8f:2a:da:ec:8d:d0:73:1f:3a:5c:81:85:61:b8 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:97:23:ef:90:d0:ae:13:f0:9f:b7:d1:55:d2:68: 30:24 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5042: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5043: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5044: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6e:d9:8c:60:5e:74:f0:4a:ae:13:a9:34:fe:00:4f:83 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:24:12:be:e2:80:04:56:d9:44:e2:13:ee:35:fa: da:0b tools.sh: #5045: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5046: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5047: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 61:a5:b1:27:41:5c:9c:7a:52:13:63:3e:8e:cc:29:f0 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5048: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5049: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5050: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 88:0f:3e:45:7c:09:cb:72:98:1f:54:de:1d:fb:1b:33 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5051: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5052: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5053: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 47:17:ac:f4:68:d9:a5:a6:20:9b:97:a0:13:ff:75:28 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5054: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5055: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5056: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: a6:13:9f:13:84:a1:e1:3a:fa:68:d0:19:92:42:06:74 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5057: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5058: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5059: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 1d:24:b7:cf:0f:02:76:e0:9a:a0:0d:9c:58:ce:9f:25 Iteration Count: 2000 (0x7d0) tools.sh: #5060: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5061: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5062: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 5e:15:53:36:5e:8e:90:71:cb:6a:6b:93:4f:36:9a:af Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5063: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5064: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5065: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: eb:49:55:50:87:c0:94:cd:a2:45:40:3a:2c:e2:09:f8 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5066: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5067: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5068: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 46:da:20:15:b0:71:15:46:36:f5:17:a2:59:4d:1f:03 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5069: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5070: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5071: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 45:5a:52:25:82:4f:a8:64:20:ff:d8:1e:06:60:0a:70 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5072: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5073: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5074: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 5c:fc:50:19:21:c8:3a:2b:1f:d6:43:96:f2:b4:38:0e Iteration Count: 2000 (0x7d0) tools.sh: #5075: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5076: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5077: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 47:9d:a2:5c:64:a8:b7:4a:75:d9:d5:ee:67:18:81:7e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5078: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5079: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5080: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f8:54:eb:39:68:a8:da:eb:8f:67:a4:67:2d:c2:43:8c Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5081: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5082: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5083: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 2e:1e:15:2f:e1:23:a3:59:ef:30:1e:a2:7d:53:fe:8d Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5084: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5085: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5086: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ee:04:88:f5:51:71:ec:0f:c0:85:0b:76:52:af:46:d9 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5087: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5088: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5089: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d9:6c:5d:b0:8f:c7:66:db:60:11:47:44:26:a3:de:d0 Iteration Count: 2000 (0x7d0) tools.sh: #5090: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5091: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5092: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7c:7f:19:3f:e6:b8:47:5f:b3:74:79:e1:0c:05:42:47 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5093: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5094: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5095: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5c:a5:41:b2:45:2a:3f:4d:9b:c1:ba:6d:2b:8a:b3:58 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5096: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5097: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5098: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ae:cf:18:0d:b6:35:d1:12:40:70:0a:a5:c5:7a:9a:0b Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5099: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5100: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5101: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6a:f6:de:84:49:17:3f:6c:12:39:c3:48:33:85:a5:6e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5102: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5103: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5104: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e0:de:21:3a:a3:3d:b1:18:1f:51:15:2a:40:14:02:83 Iteration Count: 2000 (0x7d0) tools.sh: #5105: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5106: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5107: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e1:81:c2:44:48:01:c8:f6:94:e8:37:d0:5f:7a:40:1a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5108: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5109: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5110: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9c:97:5c:38:d4:be:86:63:1c:cb:10:8c:07:fa:51:9c Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5111: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5112: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5113: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e3:ed:48:43:63:7b:39:af:28:02:3c:34:ff:6d:41:48 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5114: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5115: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5116: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5d:85:36:98:f6:16:5c:1f:96:1e:a0:51:55:bf:7f:a0 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5117: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5118: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5119: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fa:24:cd:c4:ac:a3:54:68:b4:d2:36:2c:2b:86:7c:a6 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5120: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5121: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5122: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 68:1c:19:08:6f:c8:65:51:8c:45:0b:e1:01:7d:0a:1a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5123: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5124: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5125: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 90:eb:0b:27:be:ec:a6:f0:74:9f:72:d2:0c:44:61:3e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5126: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5127: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5128: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: da:83:2e:4d:a2:9d:3c:03:49:1f:5a:77:e3:89:0c:27 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5129: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5130: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5131: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 37:5b:ba:de:d5:dc:19:69:94:60:d2:40:74:dd:92:68 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5132: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5133: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5134: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d2:6f:87:8c:45:5b:25:a0:10:b9:d1:5d:12:bf:9e:0a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:16 2017 Not After : Tue May 10 12:19:16 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:fe:6a:97:14:ca:94:db:93:4a:2d:6b:4d:a6:7a:13: 8b:79:a5:8e:ad:ef:e9:6e:d9:3c:dc:59:8e:fb:91:c2: a0:91:d6:51:bb:e9:17:b2:3e:97:a5:3d:d1:fd:18:5d: 33:d6:93:d7:b2:bc:7e:00:89:f6:7b:90:18:1f:4a:75: 2f:19:64:f9:c3:de:21:f4:c8:c5:b5:5b:10:f9:15:a1: 4c:78:d8:65:5d:79:65:4d:32:93:b0:ef:aa:f4:58:bc: f5:ed:47:72:a5:7d:bd:3a:2b:10:04:fc:68:b7:ef:e2: 58:17:74:ea:32:01:65:ee:e3:9e:80:56:c5:6f:d9:39: 35:07:00:a9:98:ac:35:61:d5:8c:0c:17:7d:75:92:f1: 9f:18:ed:b7:0a:a5:8f:0e:dd:4b:f6:a1:5c:6e:4f:b7: 40:5f:73:55:35:47:a8:32:3c:d6:b9:bf:a4:1b:6c:c7: 97:00:70:15:eb:0b:ee:d0:a3:1f:e6:e6:ec:89:d3:2b: 75:4f:83:8d:0c:73:9d:08:df:db:7b:5b:56:48:7f:c0: 68:6e:9e:0b:30:20:2e:1f:60:47:06:8f:62:1e:80:2a: 1f:74:f8:52:5a:7e:02:05:82:b2:ef:e0:3d:d2:e6:87: 1e:b5:ed:fc:0c:c5:46:7c:8a:f9:a6:8a:3a:54:f0:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:13:91:2c:cb:73:d7:27:91:33:d1:a6:9b:b7:7a:76: 66:57:75:68:61:31:59:9d:45:18:18:78:28:00:34:8d: 1a:c7:33:40:83:59:90:75:71:c3:60:e9:76:04:fe:ad: 44:37:3a:f4:19:52:73:54:37:f2:f8:b8:51:88:c9:a3: d8:97:43:6c:00:9c:97:45:f0:8c:23:66:90:3c:9f:89: 84:ba:f8:6f:4c:fb:11:c4:9d:56:1d:d4:49:39:fe:29: 1e:8e:02:51:ca:d8:6b:d4:12:f6:d8:86:52:40:5c:d9: 13:bb:83:71:88:95:18:ad:de:b0:fe:46:49:2f:73:2f: cd:0a:60:b5:ce:1d:4d:ac:5f:6e:92:6f:bb:41:c5:0d: a1:0c:ad:88:a1:8b:c5:7e:2a:c6:96:22:87:d7:50:73: 90:7b:3e:e3:21:7b:00:85:50:fc:3e:16:42:51:f2:2e: e5:1e:5a:1d:0e:c5:52:a1:9e:8a:4f:1b:ef:cc:86:8d: ed:a9:12:f7:eb:5c:d3:15:6a:89:fb:6c:b7:ca:58:1b: cf:5f:8d:fd:89:0e:7a:55:b7:f6:02:2f:74:a8:0a:be: 45:41:ce:84:0b:12:c3:79:68:1a:7e:a6:bb:05:87:77: 22:f8:12:76:3f:f0:4a:f8:23:ab:b1:16:c6:51:cb:af Fingerprint (SHA-256): 73:32:E6:F4:82:D4:CB:28:08:C4:E1:8C:10:6B:31:56:19:9C:1F:D0:4A:7A:8C:A8:4E:6A:4A:A8:4C:EB:A2:DF Fingerprint (SHA1): 3D:E8:C4:2A:BA:72:11:51:81:C3:06:16:E9:0D:89:FE:0C:15:20:BC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:19:40 2017 Not After : Tue May 10 12:19:40 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:96:86:1b:40:53:86:63:f1:f3:fc:fb:80:7e:35:eb: ce:51:2a:92:98:f3:13:5d:c0:be:1d:41:82:e3:56:e0: 3d:57:43:a4:41:c6:a4:41:12:f2:b1:64:45:ab:b9:9f: 0d:0f:a2:39:87:96:4e:16:f4:ce:7e:4e:c5:9c:06:1b: 7d:81:eb:a3:8f:c5:8e:31:72:69:68:07:a8:68:78:c9: 0c:56:58:ad:6a:9e:d5:fd:d1:38:f6:25:fe:4f:61:80: 48:42:1f:e3:8b:0d:b1:61:79:76:61:51:8a:a9:22:df: 3c:02:25:cf:0e:9b:bc:ee:31:bf:b4:a8:93:29:f0:33: c5:cf:dd:c1:7f:3a:04:d1:93:af:c4:f0:69:e7:54:63: 6e:72:e5:0d:d2:10:27:22:70:d4:48:48:0e:10:e5:51: ef:89:f1:0e:eb:bc:30:f8:ce:6e:42:de:19:bb:0f:14: fd:18:c8:ca:2b:b8:a2:f0:af:0d:60:69:25:b0:10:cd: 2a:f8:b1:d8:59:bb:3c:d1:e0:12:00:5a:d7:34:34:59: a6:58:a6:41:ab:ed:f8:3b:0c:9d:33:d0:e4:50:93:86: 80:45:4f:c8:23:1b:d9:14:56:5f:87:e0:ef:8a:23:77: 6b:91:78:f3:6a:00:fe:85:11:ac:39:04:3c:7d:55:a1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:9b:bc:79:7a:9c:58:b4:d0:cf:84:bf:01:3b:dd: 18:58:2a:c7:f4:86:c8:49:d3:4e:31:3f:4d:52:45:bf: 68:ee:93:72:de:90:15:93:20:58:68:71:71:28:c5:2f: af:38:83:87:6e:9f:31:20:e2:d1:fb:b8:20:0c:19:7d: 19:59:77:56:23:a8:f7:ac:0d:b0:40:4f:5e:80:33:c3: b1:e7:cd:1f:fa:fc:b2:28:5e:14:50:91:f5:c1:42:fe: 36:87:bd:97:f0:27:ee:02:e6:25:ff:b0:6b:8f:bb:22: b8:96:12:17:48:29:c3:b4:50:83:ea:6f:68:21:d4:c7: a7:49:cc:11:8f:03:0f:97:65:fa:88:2f:94:2b:53:ba: 55:62:d5:6b:03:7d:47:93:28:5d:16:34:f0:7a:54:7a: d5:e4:fd:eb:23:1e:44:49:b8:79:ab:f7:fc:8c:93:3f: 44:f8:c3:50:21:cb:b6:db:7d:75:57:1c:ed:11:dc:59: fb:3e:26:65:f1:0a:8f:a9:4d:8f:17:c4:39:0b:dd:f4: 8f:ef:08:10:81:14:97:45:49:9a:1f:4e:47:4d:a4:0b: 85:56:8d:77:f6:c5:ca:5e:38:fb:27:19:4a:09:0c:6d: 80:92:41:fc:ed:5b:62:f0:bd:ca:c8:61:c9:86:61:77 Fingerprint (SHA-256): 12:43:F3:43:1A:F7:F7:E0:7A:E0:98:23:18:B2:03:52:17:DB:3A:ED:F9:68:C9:1B:EC:FE:A3:F2:C7:C0:27:AE Fingerprint (SHA1): AA:8E:E1:84:61:C3:FE:30:C9:D1:F9:14:A7:35:3D:34:B0:61:E9:13 Friendly Name: Alice tools.sh: #5135: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5136: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #5137: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5138: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #5139: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 37%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) tree "../tools/html" signed successfully tools.sh: #5140: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #5141: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #5142: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html --> sign.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 37%) tree "../tools/html" signed successfully tools.sh: #5143: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #5144: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #5145: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Wed May 10 12:21:24 UTC 2017 Running tests for fips TIMESTAMP fips BEGIN: Wed May 10 12:21:24 UTC 2017 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #5146: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #5147: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 18656cab725af43dcf67081f14d9b14be3f5d5ac NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #5148: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #5149: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #5150: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #5151: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #5152: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #5153: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #5154: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #5155: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #5156: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #5157: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #5158: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 18656cab725af43dcf67081f14d9b14be3f5d5ac FIPS_PUB_140_Test_Certificate fips.sh: #5159: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #5160: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #5161: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #5162: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #5163: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 18656cab725af43dcf67081f14d9b14be3f5d5ac FIPS_PUB_140_Test_Certificate fips.sh: #5164: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #5165: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #5166: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest1.so /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle/libsoftokn3.so -o -8 -b 5 cp /usr/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle Changing byte 0x00033918 (211224): from 01 (1) to 21 (33) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/fips/mangle dbtest -r -d ../fips fips.sh: #5167: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Wed May 10 12:22:00 UTC 2017 Running tests for ssl TIMESTAMP ssl BEGIN: Wed May 10 12:22:00 UTC 2017 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:00 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18154 >/dev/null 2>/dev/null selfserv_9208 with PID 18154 found at Wed May 10 12:22:00 UTC 2017 selfserv_9208 with PID 18154 started at Wed May 10 12:22:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5168: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 18154 at Wed May 10 12:22:00 UTC 2017 kill -USR1 18154 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18154 killed at Wed May 10 12:22:00 UTC 2017 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:01 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18210 >/dev/null 2>/dev/null selfserv_9208 with PID 18210 found at Wed May 10 12:22:01 UTC 2017 selfserv_9208 with PID 18210 started at Wed May 10 12:22:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5169: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 18210 at Wed May 10 12:22:01 UTC 2017 kill -USR1 18210 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18210 killed at Wed May 10 12:22:01 UTC 2017 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:01 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18266 >/dev/null 2>/dev/null selfserv_9208 with PID 18266 found at Wed May 10 12:22:01 UTC 2017 selfserv_9208 with PID 18266 started at Wed May 10 12:22:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5170: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 18266 at Wed May 10 12:22:01 UTC 2017 kill -USR1 18266 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18266 killed at Wed May 10 12:22:01 UTC 2017 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:01 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18334 >/dev/null 2>/dev/null selfserv_9208 with PID 18334 found at Wed May 10 12:22:01 UTC 2017 selfserv_9208 with PID 18334 started at Wed May 10 12:22:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5171: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 18334 at Wed May 10 12:22:02 UTC 2017 kill -USR1 18334 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18334 killed at Wed May 10 12:22:02 UTC 2017 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:02 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18390 >/dev/null 2>/dev/null selfserv_9208 with PID 18390 found at Wed May 10 12:22:02 UTC 2017 selfserv_9208 with PID 18390 started at Wed May 10 12:22:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5172: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 18390 at Wed May 10 12:22:02 UTC 2017 kill -USR1 18390 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18390 killed at Wed May 10 12:22:02 UTC 2017 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:02 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18446 >/dev/null 2>/dev/null selfserv_9208 with PID 18446 found at Wed May 10 12:22:02 UTC 2017 selfserv_9208 with PID 18446 started at Wed May 10 12:22:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5173: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 18446 at Wed May 10 12:22:03 UTC 2017 kill -USR1 18446 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18446 killed at Wed May 10 12:22:03 UTC 2017 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:03 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18514 >/dev/null 2>/dev/null selfserv_9208 with PID 18514 found at Wed May 10 12:22:03 UTC 2017 selfserv_9208 with PID 18514 started at Wed May 10 12:22:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5174: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 18514 at Wed May 10 12:22:03 UTC 2017 kill -USR1 18514 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18514 killed at Wed May 10 12:22:03 UTC 2017 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:03 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18570 >/dev/null 2>/dev/null selfserv_9208 with PID 18570 found at Wed May 10 12:22:03 UTC 2017 selfserv_9208 with PID 18570 started at Wed May 10 12:22:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5175: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 18570 at Wed May 10 12:22:03 UTC 2017 kill -USR1 18570 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18570 killed at Wed May 10 12:22:03 UTC 2017 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:03 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18626 >/dev/null 2>/dev/null selfserv_9208 with PID 18626 found at Wed May 10 12:22:03 UTC 2017 selfserv_9208 with PID 18626 started at Wed May 10 12:22:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5176: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 18626 at Wed May 10 12:22:04 UTC 2017 kill -USR1 18626 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18626 killed at Wed May 10 12:22:04 UTC 2017 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:04 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18694 >/dev/null 2>/dev/null selfserv_9208 with PID 18694 found at Wed May 10 12:22:04 UTC 2017 selfserv_9208 with PID 18694 started at Wed May 10 12:22:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5177: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 18694 at Wed May 10 12:22:04 UTC 2017 kill -USR1 18694 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18694 killed at Wed May 10 12:22:04 UTC 2017 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:04 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18750 >/dev/null 2>/dev/null selfserv_9208 with PID 18750 found at Wed May 10 12:22:04 UTC 2017 selfserv_9208 with PID 18750 started at Wed May 10 12:22:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5178: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 18750 at Wed May 10 12:22:05 UTC 2017 kill -USR1 18750 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18750 killed at Wed May 10 12:22:05 UTC 2017 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:05 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:05 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18806 >/dev/null 2>/dev/null selfserv_9208 with PID 18806 found at Wed May 10 12:22:05 UTC 2017 selfserv_9208 with PID 18806 started at Wed May 10 12:22:05 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5179: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 18806 at Wed May 10 12:22:05 UTC 2017 kill -USR1 18806 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18806 killed at Wed May 10 12:22:05 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:05 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:05 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18874 >/dev/null 2>/dev/null selfserv_9208 with PID 18874 found at Wed May 10 12:22:05 UTC 2017 selfserv_9208 with PID 18874 started at Wed May 10 12:22:05 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5180: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 18874 at Wed May 10 12:22:05 UTC 2017 kill -USR1 18874 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18874 killed at Wed May 10 12:22:05 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:05 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:05 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18930 >/dev/null 2>/dev/null selfserv_9208 with PID 18930 found at Wed May 10 12:22:05 UTC 2017 selfserv_9208 with PID 18930 started at Wed May 10 12:22:05 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5181: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 18930 at Wed May 10 12:22:06 UTC 2017 kill -USR1 18930 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18930 killed at Wed May 10 12:22:06 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:06 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18986 >/dev/null 2>/dev/null selfserv_9208 with PID 18986 found at Wed May 10 12:22:06 UTC 2017 selfserv_9208 with PID 18986 started at Wed May 10 12:22:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5182: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 18986 at Wed May 10 12:22:06 UTC 2017 kill -USR1 18986 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18986 killed at Wed May 10 12:22:06 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:06 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19054 >/dev/null 2>/dev/null selfserv_9208 with PID 19054 found at Wed May 10 12:22:06 UTC 2017 selfserv_9208 with PID 19054 started at Wed May 10 12:22:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5183: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 19054 at Wed May 10 12:22:06 UTC 2017 kill -USR1 19054 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19054 killed at Wed May 10 12:22:06 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:07 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19110 >/dev/null 2>/dev/null selfserv_9208 with PID 19110 found at Wed May 10 12:22:07 UTC 2017 selfserv_9208 with PID 19110 started at Wed May 10 12:22:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5184: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 19110 at Wed May 10 12:22:07 UTC 2017 kill -USR1 19110 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19110 killed at Wed May 10 12:22:07 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:07 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19166 >/dev/null 2>/dev/null selfserv_9208 with PID 19166 found at Wed May 10 12:22:07 UTC 2017 selfserv_9208 with PID 19166 started at Wed May 10 12:22:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5185: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 19166 at Wed May 10 12:22:07 UTC 2017 kill -USR1 19166 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19166 killed at Wed May 10 12:22:07 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:07 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19234 >/dev/null 2>/dev/null selfserv_9208 with PID 19234 found at Wed May 10 12:22:07 UTC 2017 selfserv_9208 with PID 19234 started at Wed May 10 12:22:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5186: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 19234 at Wed May 10 12:22:08 UTC 2017 kill -USR1 19234 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19234 killed at Wed May 10 12:22:08 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:08 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19290 >/dev/null 2>/dev/null selfserv_9208 with PID 19290 found at Wed May 10 12:22:08 UTC 2017 selfserv_9208 with PID 19290 started at Wed May 10 12:22:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5187: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 19290 at Wed May 10 12:22:08 UTC 2017 kill -USR1 19290 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19290 killed at Wed May 10 12:22:08 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:08 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19346 >/dev/null 2>/dev/null selfserv_9208 with PID 19346 found at Wed May 10 12:22:08 UTC 2017 selfserv_9208 with PID 19346 started at Wed May 10 12:22:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5188: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 19346 at Wed May 10 12:22:08 UTC 2017 kill -USR1 19346 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19346 killed at Wed May 10 12:22:08 UTC 2017 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:08 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19414 >/dev/null 2>/dev/null selfserv_9208 with PID 19414 found at Wed May 10 12:22:09 UTC 2017 selfserv_9208 with PID 19414 started at Wed May 10 12:22:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5189: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 19414 at Wed May 10 12:22:09 UTC 2017 kill -USR1 19414 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19414 killed at Wed May 10 12:22:09 UTC 2017 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:09 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19470 >/dev/null 2>/dev/null selfserv_9208 with PID 19470 found at Wed May 10 12:22:09 UTC 2017 selfserv_9208 with PID 19470 started at Wed May 10 12:22:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5190: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 19470 at Wed May 10 12:22:09 UTC 2017 kill -USR1 19470 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19470 killed at Wed May 10 12:22:09 UTC 2017 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:09 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19526 >/dev/null 2>/dev/null selfserv_9208 with PID 19526 found at Wed May 10 12:22:09 UTC 2017 selfserv_9208 with PID 19526 started at Wed May 10 12:22:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5191: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 19526 at Wed May 10 12:22:09 UTC 2017 kill -USR1 19526 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19526 killed at Wed May 10 12:22:09 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:10 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19594 >/dev/null 2>/dev/null selfserv_9208 with PID 19594 found at Wed May 10 12:22:10 UTC 2017 selfserv_9208 with PID 19594 started at Wed May 10 12:22:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5192: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 19594 at Wed May 10 12:22:10 UTC 2017 kill -USR1 19594 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19594 killed at Wed May 10 12:22:10 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:10 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19650 >/dev/null 2>/dev/null selfserv_9208 with PID 19650 found at Wed May 10 12:22:10 UTC 2017 selfserv_9208 with PID 19650 started at Wed May 10 12:22:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5193: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 19650 at Wed May 10 12:22:10 UTC 2017 kill -USR1 19650 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19650 killed at Wed May 10 12:22:10 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:10 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19706 >/dev/null 2>/dev/null selfserv_9208 with PID 19706 found at Wed May 10 12:22:10 UTC 2017 selfserv_9208 with PID 19706 started at Wed May 10 12:22:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5194: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 19706 at Wed May 10 12:22:11 UTC 2017 kill -USR1 19706 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19706 killed at Wed May 10 12:22:11 UTC 2017 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:11 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19774 >/dev/null 2>/dev/null selfserv_9208 with PID 19774 found at Wed May 10 12:22:11 UTC 2017 selfserv_9208 with PID 19774 started at Wed May 10 12:22:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5195: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 19774 at Wed May 10 12:22:11 UTC 2017 kill -USR1 19774 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19774 killed at Wed May 10 12:22:11 UTC 2017 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:11 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19830 >/dev/null 2>/dev/null selfserv_9208 with PID 19830 found at Wed May 10 12:22:11 UTC 2017 selfserv_9208 with PID 19830 started at Wed May 10 12:22:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5196: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 19830 at Wed May 10 12:22:11 UTC 2017 kill -USR1 19830 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19830 killed at Wed May 10 12:22:11 UTC 2017 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:11 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19886 >/dev/null 2>/dev/null selfserv_9208 with PID 19886 found at Wed May 10 12:22:11 UTC 2017 selfserv_9208 with PID 19886 started at Wed May 10 12:22:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5197: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 19886 at Wed May 10 12:22:12 UTC 2017 kill -USR1 19886 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19886 killed at Wed May 10 12:22:12 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:12 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19954 >/dev/null 2>/dev/null selfserv_9208 with PID 19954 found at Wed May 10 12:22:12 UTC 2017 selfserv_9208 with PID 19954 started at Wed May 10 12:22:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5198: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 19954 at Wed May 10 12:22:12 UTC 2017 kill -USR1 19954 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19954 killed at Wed May 10 12:22:12 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:12 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20010 >/dev/null 2>/dev/null selfserv_9208 with PID 20010 found at Wed May 10 12:22:12 UTC 2017 selfserv_9208 with PID 20010 started at Wed May 10 12:22:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5199: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 20010 at Wed May 10 12:22:12 UTC 2017 kill -USR1 20010 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20010 killed at Wed May 10 12:22:12 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:13 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20066 >/dev/null 2>/dev/null selfserv_9208 with PID 20066 found at Wed May 10 12:22:13 UTC 2017 selfserv_9208 with PID 20066 started at Wed May 10 12:22:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5200: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 20066 at Wed May 10 12:22:13 UTC 2017 kill -USR1 20066 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20066 killed at Wed May 10 12:22:13 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:13 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20134 >/dev/null 2>/dev/null selfserv_9208 with PID 20134 found at Wed May 10 12:22:13 UTC 2017 selfserv_9208 with PID 20134 started at Wed May 10 12:22:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5201: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 20134 at Wed May 10 12:22:13 UTC 2017 kill -USR1 20134 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20134 killed at Wed May 10 12:22:13 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:13 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20190 >/dev/null 2>/dev/null selfserv_9208 with PID 20190 found at Wed May 10 12:22:13 UTC 2017 selfserv_9208 with PID 20190 started at Wed May 10 12:22:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5202: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 20190 at Wed May 10 12:22:14 UTC 2017 kill -USR1 20190 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20190 killed at Wed May 10 12:22:14 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:14 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20246 >/dev/null 2>/dev/null selfserv_9208 with PID 20246 found at Wed May 10 12:22:14 UTC 2017 selfserv_9208 with PID 20246 started at Wed May 10 12:22:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5203: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 20246 at Wed May 10 12:22:14 UTC 2017 kill -USR1 20246 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20246 killed at Wed May 10 12:22:14 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:14 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20314 >/dev/null 2>/dev/null selfserv_9208 with PID 20314 found at Wed May 10 12:22:14 UTC 2017 selfserv_9208 with PID 20314 started at Wed May 10 12:22:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5204: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 20314 at Wed May 10 12:22:14 UTC 2017 kill -USR1 20314 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20314 killed at Wed May 10 12:22:14 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:14 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20370 >/dev/null 2>/dev/null selfserv_9208 with PID 20370 found at Wed May 10 12:22:15 UTC 2017 selfserv_9208 with PID 20370 started at Wed May 10 12:22:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5205: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 20370 at Wed May 10 12:22:15 UTC 2017 kill -USR1 20370 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20370 killed at Wed May 10 12:22:15 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:15 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20426 >/dev/null 2>/dev/null selfserv_9208 with PID 20426 found at Wed May 10 12:22:15 UTC 2017 selfserv_9208 with PID 20426 started at Wed May 10 12:22:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5206: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 20426 at Wed May 10 12:22:15 UTC 2017 kill -USR1 20426 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20426 killed at Wed May 10 12:22:15 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:15 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20494 >/dev/null 2>/dev/null selfserv_9208 with PID 20494 found at Wed May 10 12:22:15 UTC 2017 selfserv_9208 with PID 20494 started at Wed May 10 12:22:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5207: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 20494 at Wed May 10 12:22:16 UTC 2017 kill -USR1 20494 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20494 killed at Wed May 10 12:22:16 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:16 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20550 >/dev/null 2>/dev/null selfserv_9208 with PID 20550 found at Wed May 10 12:22:16 UTC 2017 selfserv_9208 with PID 20550 started at Wed May 10 12:22:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5208: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 20550 at Wed May 10 12:22:16 UTC 2017 kill -USR1 20550 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20550 killed at Wed May 10 12:22:16 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:16 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20606 >/dev/null 2>/dev/null selfserv_9208 with PID 20606 found at Wed May 10 12:22:16 UTC 2017 selfserv_9208 with PID 20606 started at Wed May 10 12:22:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5209: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 20606 at Wed May 10 12:22:17 UTC 2017 kill -USR1 20606 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20606 killed at Wed May 10 12:22:17 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:17 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:17 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20674 >/dev/null 2>/dev/null selfserv_9208 with PID 20674 found at Wed May 10 12:22:17 UTC 2017 selfserv_9208 with PID 20674 started at Wed May 10 12:22:17 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5210: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 20674 at Wed May 10 12:22:17 UTC 2017 kill -USR1 20674 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20674 killed at Wed May 10 12:22:17 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:17 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:17 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20730 >/dev/null 2>/dev/null selfserv_9208 with PID 20730 found at Wed May 10 12:22:17 UTC 2017 selfserv_9208 with PID 20730 started at Wed May 10 12:22:17 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5211: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 20730 at Wed May 10 12:22:18 UTC 2017 kill -USR1 20730 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20730 killed at Wed May 10 12:22:18 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:18 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20786 >/dev/null 2>/dev/null selfserv_9208 with PID 20786 found at Wed May 10 12:22:18 UTC 2017 selfserv_9208 with PID 20786 started at Wed May 10 12:22:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5212: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 20786 at Wed May 10 12:22:18 UTC 2017 kill -USR1 20786 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20786 killed at Wed May 10 12:22:18 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:18 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20854 >/dev/null 2>/dev/null selfserv_9208 with PID 20854 found at Wed May 10 12:22:18 UTC 2017 selfserv_9208 with PID 20854 started at Wed May 10 12:22:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5213: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 20854 at Wed May 10 12:22:18 UTC 2017 kill -USR1 20854 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20854 killed at Wed May 10 12:22:18 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:18 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20910 >/dev/null 2>/dev/null selfserv_9208 with PID 20910 found at Wed May 10 12:22:19 UTC 2017 selfserv_9208 with PID 20910 started at Wed May 10 12:22:19 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5214: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 20910 at Wed May 10 12:22:19 UTC 2017 kill -USR1 20910 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20910 killed at Wed May 10 12:22:19 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:19 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:19 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20966 >/dev/null 2>/dev/null selfserv_9208 with PID 20966 found at Wed May 10 12:22:19 UTC 2017 selfserv_9208 with PID 20966 started at Wed May 10 12:22:19 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5215: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 20966 at Wed May 10 12:22:19 UTC 2017 kill -USR1 20966 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20966 killed at Wed May 10 12:22:19 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:19 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:19 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 21034 >/dev/null 2>/dev/null selfserv_9208 with PID 21034 found at Wed May 10 12:22:19 UTC 2017 selfserv_9208 with PID 21034 started at Wed May 10 12:22:19 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5216: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 21034 at Wed May 10 12:22:20 UTC 2017 kill -USR1 21034 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 21034 killed at Wed May 10 12:22:20 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:20 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 21090 >/dev/null 2>/dev/null selfserv_9208 with PID 21090 found at Wed May 10 12:22:20 UTC 2017 selfserv_9208 with PID 21090 started at Wed May 10 12:22:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5217: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 21090 at Wed May 10 12:22:20 UTC 2017 kill -USR1 21090 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 21090 killed at Wed May 10 12:22:20 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:20 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 21146 >/dev/null 2>/dev/null selfserv_9208 with PID 21146 found at Wed May 10 12:22:20 UTC 2017 selfserv_9208 with PID 21146 started at Wed May 10 12:22:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5218: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 21146 at Wed May 10 12:22:21 UTC 2017 kill -USR1 21146 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 21146 killed at Wed May 10 12:22:21 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:21 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 21214 >/dev/null 2>/dev/null selfserv_9208 with PID 21214 found at Wed May 10 12:22:21 UTC 2017 selfserv_9208 with PID 21214 started at Wed May 10 12:22:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5219: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 21214 at Wed May 10 12:22:21 UTC 2017 kill -USR1 21214 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 21214 killed at Wed May 10 12:22:21 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:21 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 21270 >/dev/null 2>/dev/null selfserv_9208 with PID 21270 found at Wed May 10 12:22:21 UTC 2017 selfserv_9208 with PID 21270 started at Wed May 10 12:22:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5220: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 21270 at Wed May 10 12:22:21 UTC 2017 kill -USR1 21270 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 21270 killed at Wed May 10 12:22:21 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:22 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 21326 >/dev/null 2>/dev/null selfserv_9208 with PID 21326 found at Wed May 10 12:22:22 UTC 2017 selfserv_9208 with PID 21326 started at Wed May 10 12:22:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5221: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 21326 at Wed May 10 12:22:22 UTC 2017 kill -USR1 21326 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 21326 killed at Wed May 10 12:22:22 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:22 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 21394 >/dev/null 2>/dev/null selfserv_9208 with PID 21394 found at Wed May 10 12:22:22 UTC 2017 selfserv_9208 with PID 21394 started at Wed May 10 12:22:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5222: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 21394 at Wed May 10 12:22:22 UTC 2017 kill -USR1 21394 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 21394 killed at Wed May 10 12:22:22 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:23 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 21450 >/dev/null 2>/dev/null selfserv_9208 with PID 21450 found at Wed May 10 12:22:23 UTC 2017 selfserv_9208 with PID 21450 started at Wed May 10 12:22:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5223: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 21450 at Wed May 10 12:22:23 UTC 2017 kill -USR1 21450 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 21450 killed at Wed May 10 12:22:23 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:23 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 21506 >/dev/null 2>/dev/null selfserv_9208 with PID 21506 found at Wed May 10 12:22:23 UTC 2017 selfserv_9208 with PID 21506 started at Wed May 10 12:22:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5224: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 21506 at Wed May 10 12:22:23 UTC 2017 kill -USR1 21506 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 21506 killed at Wed May 10 12:22:23 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:24 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:24 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 21574 >/dev/null 2>/dev/null selfserv_9208 with PID 21574 found at Wed May 10 12:22:24 UTC 2017 selfserv_9208 with PID 21574 started at Wed May 10 12:22:24 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5225: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 21574 at Wed May 10 12:22:24 UTC 2017 kill -USR1 21574 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 21574 killed at Wed May 10 12:22:24 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:24 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:24 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 21630 >/dev/null 2>/dev/null selfserv_9208 with PID 21630 found at Wed May 10 12:22:24 UTC 2017 selfserv_9208 with PID 21630 started at Wed May 10 12:22:24 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5226: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 21630 at Wed May 10 12:22:24 UTC 2017 kill -USR1 21630 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 21630 killed at Wed May 10 12:22:24 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:25 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:25 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 21687 >/dev/null 2>/dev/null selfserv_9208 with PID 21687 found at Wed May 10 12:22:25 UTC 2017 selfserv_9208 with PID 21687 started at Wed May 10 12:22:25 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5227: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 21687 at Wed May 10 12:22:25 UTC 2017 kill -USR1 21687 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 21687 killed at Wed May 10 12:22:25 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:25 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:25 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 21755 >/dev/null 2>/dev/null selfserv_9208 with PID 21755 found at Wed May 10 12:22:25 UTC 2017 selfserv_9208 with PID 21755 started at Wed May 10 12:22:25 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5228: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 21755 at Wed May 10 12:22:26 UTC 2017 kill -USR1 21755 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 21755 killed at Wed May 10 12:22:26 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:26 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:26 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 21811 >/dev/null 2>/dev/null selfserv_9208 with PID 21811 found at Wed May 10 12:22:26 UTC 2017 selfserv_9208 with PID 21811 started at Wed May 10 12:22:26 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5229: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 21811 at Wed May 10 12:22:26 UTC 2017 kill -USR1 21811 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 21811 killed at Wed May 10 12:22:26 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:26 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:26 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 21867 >/dev/null 2>/dev/null selfserv_9208 with PID 21867 found at Wed May 10 12:22:26 UTC 2017 selfserv_9208 with PID 21867 started at Wed May 10 12:22:26 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5230: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 21867 at Wed May 10 12:22:27 UTC 2017 kill -USR1 21867 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 21867 killed at Wed May 10 12:22:27 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:27 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:27 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 21935 >/dev/null 2>/dev/null selfserv_9208 with PID 21935 found at Wed May 10 12:22:27 UTC 2017 selfserv_9208 with PID 21935 started at Wed May 10 12:22:27 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5231: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 21935 at Wed May 10 12:22:27 UTC 2017 kill -USR1 21935 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 21935 killed at Wed May 10 12:22:27 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:27 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:27 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 21991 >/dev/null 2>/dev/null selfserv_9208 with PID 21991 found at Wed May 10 12:22:27 UTC 2017 selfserv_9208 with PID 21991 started at Wed May 10 12:22:27 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5232: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 21991 at Wed May 10 12:22:28 UTC 2017 kill -USR1 21991 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 21991 killed at Wed May 10 12:22:28 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:28 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:28 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22047 >/dev/null 2>/dev/null selfserv_9208 with PID 22047 found at Wed May 10 12:22:28 UTC 2017 selfserv_9208 with PID 22047 started at Wed May 10 12:22:28 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5233: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 22047 at Wed May 10 12:22:28 UTC 2017 kill -USR1 22047 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22047 killed at Wed May 10 12:22:28 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:28 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:28 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22115 >/dev/null 2>/dev/null selfserv_9208 with PID 22115 found at Wed May 10 12:22:28 UTC 2017 selfserv_9208 with PID 22115 started at Wed May 10 12:22:28 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5234: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 22115 at Wed May 10 12:22:29 UTC 2017 kill -USR1 22115 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22115 killed at Wed May 10 12:22:29 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:29 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:29 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22171 >/dev/null 2>/dev/null selfserv_9208 with PID 22171 found at Wed May 10 12:22:29 UTC 2017 selfserv_9208 with PID 22171 started at Wed May 10 12:22:29 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5235: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 22171 at Wed May 10 12:22:29 UTC 2017 kill -USR1 22171 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22171 killed at Wed May 10 12:22:29 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:29 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:29 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22227 >/dev/null 2>/dev/null selfserv_9208 with PID 22227 found at Wed May 10 12:22:29 UTC 2017 selfserv_9208 with PID 22227 started at Wed May 10 12:22:29 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5236: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 22227 at Wed May 10 12:22:29 UTC 2017 kill -USR1 22227 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22227 killed at Wed May 10 12:22:29 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:30 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:30 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22295 >/dev/null 2>/dev/null selfserv_9208 with PID 22295 found at Wed May 10 12:22:30 UTC 2017 selfserv_9208 with PID 22295 started at Wed May 10 12:22:30 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5237: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 22295 at Wed May 10 12:22:30 UTC 2017 kill -USR1 22295 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22295 killed at Wed May 10 12:22:30 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:30 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:30 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22351 >/dev/null 2>/dev/null selfserv_9208 with PID 22351 found at Wed May 10 12:22:30 UTC 2017 selfserv_9208 with PID 22351 started at Wed May 10 12:22:30 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5238: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 22351 at Wed May 10 12:22:31 UTC 2017 kill -USR1 22351 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22351 killed at Wed May 10 12:22:31 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:31 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:31 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22407 >/dev/null 2>/dev/null selfserv_9208 with PID 22407 found at Wed May 10 12:22:31 UTC 2017 selfserv_9208 with PID 22407 started at Wed May 10 12:22:31 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5239: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 22407 at Wed May 10 12:22:31 UTC 2017 kill -USR1 22407 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22407 killed at Wed May 10 12:22:31 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:31 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:31 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22475 >/dev/null 2>/dev/null selfserv_9208 with PID 22475 found at Wed May 10 12:22:31 UTC 2017 selfserv_9208 with PID 22475 started at Wed May 10 12:22:31 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5240: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 22475 at Wed May 10 12:22:32 UTC 2017 kill -USR1 22475 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22475 killed at Wed May 10 12:22:32 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:32 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:32 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22531 >/dev/null 2>/dev/null selfserv_9208 with PID 22531 found at Wed May 10 12:22:32 UTC 2017 selfserv_9208 with PID 22531 started at Wed May 10 12:22:32 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5241: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 22531 at Wed May 10 12:22:32 UTC 2017 kill -USR1 22531 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22531 killed at Wed May 10 12:22:32 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:32 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:32 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22587 >/dev/null 2>/dev/null selfserv_9208 with PID 22587 found at Wed May 10 12:22:32 UTC 2017 selfserv_9208 with PID 22587 started at Wed May 10 12:22:32 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5242: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 22587 at Wed May 10 12:22:32 UTC 2017 kill -USR1 22587 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22587 killed at Wed May 10 12:22:32 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:32 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:33 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22657 >/dev/null 2>/dev/null selfserv_9208 with PID 22657 found at Wed May 10 12:22:33 UTC 2017 selfserv_9208 with PID 22657 started at Wed May 10 12:22:33 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5243: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 22657 at Wed May 10 12:22:33 UTC 2017 kill -USR1 22657 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22657 killed at Wed May 10 12:22:33 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:33 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:33 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22713 >/dev/null 2>/dev/null selfserv_9208 with PID 22713 found at Wed May 10 12:22:33 UTC 2017 selfserv_9208 with PID 22713 started at Wed May 10 12:22:33 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5244: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 22713 at Wed May 10 12:22:33 UTC 2017 kill -USR1 22713 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22713 killed at Wed May 10 12:22:33 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:33 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:33 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22769 >/dev/null 2>/dev/null selfserv_9208 with PID 22769 found at Wed May 10 12:22:33 UTC 2017 selfserv_9208 with PID 22769 started at Wed May 10 12:22:33 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5245: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 22769 at Wed May 10 12:22:34 UTC 2017 kill -USR1 22769 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22769 killed at Wed May 10 12:22:34 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:34 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:34 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22837 >/dev/null 2>/dev/null selfserv_9208 with PID 22837 found at Wed May 10 12:22:34 UTC 2017 selfserv_9208 with PID 22837 started at Wed May 10 12:22:34 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5246: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 22837 at Wed May 10 12:22:34 UTC 2017 kill -USR1 22837 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22837 killed at Wed May 10 12:22:34 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:34 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:34 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22895 >/dev/null 2>/dev/null selfserv_9208 with PID 22895 found at Wed May 10 12:22:34 UTC 2017 selfserv_9208 with PID 22895 started at Wed May 10 12:22:34 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5247: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 22895 at Wed May 10 12:22:35 UTC 2017 kill -USR1 22895 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22895 killed at Wed May 10 12:22:35 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:35 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:35 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22951 >/dev/null 2>/dev/null selfserv_9208 with PID 22951 found at Wed May 10 12:22:35 UTC 2017 selfserv_9208 with PID 22951 started at Wed May 10 12:22:35 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5248: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 22951 at Wed May 10 12:22:35 UTC 2017 kill -USR1 22951 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22951 killed at Wed May 10 12:22:35 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:35 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:35 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23019 >/dev/null 2>/dev/null selfserv_9208 with PID 23019 found at Wed May 10 12:22:35 UTC 2017 selfserv_9208 with PID 23019 started at Wed May 10 12:22:35 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5249: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 23019 at Wed May 10 12:22:35 UTC 2017 kill -USR1 23019 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23019 killed at Wed May 10 12:22:35 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:36 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:36 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23075 >/dev/null 2>/dev/null selfserv_9208 with PID 23075 found at Wed May 10 12:22:36 UTC 2017 selfserv_9208 with PID 23075 started at Wed May 10 12:22:36 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5250: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 23075 at Wed May 10 12:22:36 UTC 2017 kill -USR1 23075 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23075 killed at Wed May 10 12:22:36 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:22:36 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:36 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23131 >/dev/null 2>/dev/null selfserv_9208 with PID 23131 found at Wed May 10 12:22:36 UTC 2017 selfserv_9208 with PID 23131 started at Wed May 10 12:22:36 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5251: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 23131 at Wed May 10 12:22:36 UTC 2017 kill -USR1 23131 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23131 killed at Wed May 10 12:22:36 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:36 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:36 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23199 >/dev/null 2>/dev/null selfserv_9208 with PID 23199 found at Wed May 10 12:22:36 UTC 2017 selfserv_9208 with PID 23199 started at Wed May 10 12:22:36 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5252: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 23199 at Wed May 10 12:22:37 UTC 2017 kill -USR1 23199 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23199 killed at Wed May 10 12:22:37 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:37 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:37 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23255 >/dev/null 2>/dev/null selfserv_9208 with PID 23255 found at Wed May 10 12:22:37 UTC 2017 selfserv_9208 with PID 23255 started at Wed May 10 12:22:37 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5253: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 23255 at Wed May 10 12:22:37 UTC 2017 kill -USR1 23255 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23255 killed at Wed May 10 12:22:37 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:37 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:37 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23311 >/dev/null 2>/dev/null selfserv_9208 with PID 23311 found at Wed May 10 12:22:37 UTC 2017 selfserv_9208 with PID 23311 started at Wed May 10 12:22:37 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5254: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 23311 at Wed May 10 12:22:38 UTC 2017 kill -USR1 23311 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23311 killed at Wed May 10 12:22:38 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:38 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:38 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23379 >/dev/null 2>/dev/null selfserv_9208 with PID 23379 found at Wed May 10 12:22:38 UTC 2017 selfserv_9208 with PID 23379 started at Wed May 10 12:22:38 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5255: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 23379 at Wed May 10 12:22:38 UTC 2017 kill -USR1 23379 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23379 killed at Wed May 10 12:22:38 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:38 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:38 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23435 >/dev/null 2>/dev/null selfserv_9208 with PID 23435 found at Wed May 10 12:22:38 UTC 2017 selfserv_9208 with PID 23435 started at Wed May 10 12:22:38 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5256: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 23435 at Wed May 10 12:22:38 UTC 2017 kill -USR1 23435 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23435 killed at Wed May 10 12:22:38 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:39 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:39 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23492 >/dev/null 2>/dev/null selfserv_9208 with PID 23492 found at Wed May 10 12:22:39 UTC 2017 selfserv_9208 with PID 23492 started at Wed May 10 12:22:39 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5257: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 23492 at Wed May 10 12:22:39 UTC 2017 kill -USR1 23492 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23492 killed at Wed May 10 12:22:39 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:39 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:39 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23569 >/dev/null 2>/dev/null selfserv_9208 with PID 23569 found at Wed May 10 12:22:39 UTC 2017 selfserv_9208 with PID 23569 started at Wed May 10 12:22:39 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5258: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 23569 at Wed May 10 12:22:39 UTC 2017 kill -USR1 23569 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23569 killed at Wed May 10 12:22:39 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:39 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:39 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23625 >/dev/null 2>/dev/null selfserv_9208 with PID 23625 found at Wed May 10 12:22:39 UTC 2017 selfserv_9208 with PID 23625 started at Wed May 10 12:22:39 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5259: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 23625 at Wed May 10 12:22:40 UTC 2017 kill -USR1 23625 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23625 killed at Wed May 10 12:22:40 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:40 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:40 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23681 >/dev/null 2>/dev/null selfserv_9208 with PID 23681 found at Wed May 10 12:22:40 UTC 2017 selfserv_9208 with PID 23681 started at Wed May 10 12:22:40 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5260: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 23681 at Wed May 10 12:22:40 UTC 2017 kill -USR1 23681 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23681 killed at Wed May 10 12:22:40 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:40 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:40 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23749 >/dev/null 2>/dev/null selfserv_9208 with PID 23749 found at Wed May 10 12:22:40 UTC 2017 selfserv_9208 with PID 23749 started at Wed May 10 12:22:40 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5261: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 23749 at Wed May 10 12:22:41 UTC 2017 kill -USR1 23749 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23749 killed at Wed May 10 12:22:41 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:41 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:41 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23805 >/dev/null 2>/dev/null selfserv_9208 with PID 23805 found at Wed May 10 12:22:41 UTC 2017 selfserv_9208 with PID 23805 started at Wed May 10 12:22:41 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5262: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 23805 at Wed May 10 12:22:41 UTC 2017 kill -USR1 23805 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23805 killed at Wed May 10 12:22:41 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:41 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:41 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23861 >/dev/null 2>/dev/null selfserv_9208 with PID 23861 found at Wed May 10 12:22:41 UTC 2017 selfserv_9208 with PID 23861 started at Wed May 10 12:22:41 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5263: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 23861 at Wed May 10 12:22:42 UTC 2017 kill -USR1 23861 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23861 killed at Wed May 10 12:22:42 UTC 2017 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:42 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:42 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23929 >/dev/null 2>/dev/null selfserv_9208 with PID 23929 found at Wed May 10 12:22:42 UTC 2017 selfserv_9208 with PID 23929 started at Wed May 10 12:22:42 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5264: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 23929 at Wed May 10 12:22:42 UTC 2017 kill -USR1 23929 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23929 killed at Wed May 10 12:22:42 UTC 2017 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:42 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:42 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23985 >/dev/null 2>/dev/null selfserv_9208 with PID 23985 found at Wed May 10 12:22:42 UTC 2017 selfserv_9208 with PID 23985 started at Wed May 10 12:22:42 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5265: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 23985 at Wed May 10 12:22:42 UTC 2017 kill -USR1 23985 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23985 killed at Wed May 10 12:22:42 UTC 2017 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:42 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:42 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24041 >/dev/null 2>/dev/null selfserv_9208 with PID 24041 found at Wed May 10 12:22:42 UTC 2017 selfserv_9208 with PID 24041 started at Wed May 10 12:22:42 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5266: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 24041 at Wed May 10 12:22:43 UTC 2017 kill -USR1 24041 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24041 killed at Wed May 10 12:22:43 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:43 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:43 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24109 >/dev/null 2>/dev/null selfserv_9208 with PID 24109 found at Wed May 10 12:22:43 UTC 2017 selfserv_9208 with PID 24109 started at Wed May 10 12:22:43 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5267: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 24109 at Wed May 10 12:22:43 UTC 2017 kill -USR1 24109 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24109 killed at Wed May 10 12:22:43 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:43 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:43 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24165 >/dev/null 2>/dev/null selfserv_9208 with PID 24165 found at Wed May 10 12:22:43 UTC 2017 selfserv_9208 with PID 24165 started at Wed May 10 12:22:43 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5268: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 24165 at Wed May 10 12:22:44 UTC 2017 kill -USR1 24165 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24165 killed at Wed May 10 12:22:44 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:44 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:44 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24221 >/dev/null 2>/dev/null selfserv_9208 with PID 24221 found at Wed May 10 12:22:44 UTC 2017 selfserv_9208 with PID 24221 started at Wed May 10 12:22:44 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5269: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 24221 at Wed May 10 12:22:44 UTC 2017 kill -USR1 24221 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24221 killed at Wed May 10 12:22:44 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:44 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:44 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24289 >/dev/null 2>/dev/null selfserv_9208 with PID 24289 found at Wed May 10 12:22:44 UTC 2017 selfserv_9208 with PID 24289 started at Wed May 10 12:22:44 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5270: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 24289 at Wed May 10 12:22:44 UTC 2017 kill -USR1 24289 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24289 killed at Wed May 10 12:22:44 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:44 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:44 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24345 >/dev/null 2>/dev/null selfserv_9208 with PID 24345 found at Wed May 10 12:22:45 UTC 2017 selfserv_9208 with PID 24345 started at Wed May 10 12:22:45 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5271: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 24345 at Wed May 10 12:22:45 UTC 2017 kill -USR1 24345 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24345 killed at Wed May 10 12:22:45 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:45 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:45 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24401 >/dev/null 2>/dev/null selfserv_9208 with PID 24401 found at Wed May 10 12:22:45 UTC 2017 selfserv_9208 with PID 24401 started at Wed May 10 12:22:45 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5272: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 24401 at Wed May 10 12:22:45 UTC 2017 kill -USR1 24401 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24401 killed at Wed May 10 12:22:45 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:45 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:45 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24469 >/dev/null 2>/dev/null selfserv_9208 with PID 24469 found at Wed May 10 12:22:45 UTC 2017 selfserv_9208 with PID 24469 started at Wed May 10 12:22:45 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5273: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 24469 at Wed May 10 12:22:46 UTC 2017 kill -USR1 24469 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24469 killed at Wed May 10 12:22:46 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:46 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:46 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24525 >/dev/null 2>/dev/null selfserv_9208 with PID 24525 found at Wed May 10 12:22:46 UTC 2017 selfserv_9208 with PID 24525 started at Wed May 10 12:22:46 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5274: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 24525 at Wed May 10 12:22:46 UTC 2017 kill -USR1 24525 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24525 killed at Wed May 10 12:22:46 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:46 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:46 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24581 >/dev/null 2>/dev/null selfserv_9208 with PID 24581 found at Wed May 10 12:22:46 UTC 2017 selfserv_9208 with PID 24581 started at Wed May 10 12:22:46 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5275: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 24581 at Wed May 10 12:22:46 UTC 2017 kill -USR1 24581 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24581 killed at Wed May 10 12:22:46 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:47 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:47 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24649 >/dev/null 2>/dev/null selfserv_9208 with PID 24649 found at Wed May 10 12:22:47 UTC 2017 selfserv_9208 with PID 24649 started at Wed May 10 12:22:47 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5276: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 24649 at Wed May 10 12:22:47 UTC 2017 kill -USR1 24649 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24649 killed at Wed May 10 12:22:47 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:47 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:47 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24705 >/dev/null 2>/dev/null selfserv_9208 with PID 24705 found at Wed May 10 12:22:47 UTC 2017 selfserv_9208 with PID 24705 started at Wed May 10 12:22:47 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5277: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 24705 at Wed May 10 12:22:47 UTC 2017 kill -USR1 24705 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24705 killed at Wed May 10 12:22:47 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:47 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:47 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24761 >/dev/null 2>/dev/null selfserv_9208 with PID 24761 found at Wed May 10 12:22:47 UTC 2017 selfserv_9208 with PID 24761 started at Wed May 10 12:22:47 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5278: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 24761 at Wed May 10 12:22:47 UTC 2017 kill -USR1 24761 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24761 killed at Wed May 10 12:22:47 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:48 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24829 >/dev/null 2>/dev/null selfserv_9208 with PID 24829 found at Wed May 10 12:22:48 UTC 2017 selfserv_9208 with PID 24829 started at Wed May 10 12:22:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5279: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 24829 at Wed May 10 12:22:48 UTC 2017 kill -USR1 24829 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24829 killed at Wed May 10 12:22:48 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:48 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24885 >/dev/null 2>/dev/null selfserv_9208 with PID 24885 found at Wed May 10 12:22:48 UTC 2017 selfserv_9208 with PID 24885 started at Wed May 10 12:22:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5280: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 24885 at Wed May 10 12:22:48 UTC 2017 kill -USR1 24885 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24885 killed at Wed May 10 12:22:48 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:48 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24941 >/dev/null 2>/dev/null selfserv_9208 with PID 24941 found at Wed May 10 12:22:48 UTC 2017 selfserv_9208 with PID 24941 started at Wed May 10 12:22:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5281: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 24941 at Wed May 10 12:22:49 UTC 2017 kill -USR1 24941 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24941 killed at Wed May 10 12:22:49 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:49 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:49 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25009 >/dev/null 2>/dev/null selfserv_9208 with PID 25009 found at Wed May 10 12:22:49 UTC 2017 selfserv_9208 with PID 25009 started at Wed May 10 12:22:49 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5282: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 25009 at Wed May 10 12:22:49 UTC 2017 kill -USR1 25009 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25009 killed at Wed May 10 12:22:49 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:49 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:49 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25065 >/dev/null 2>/dev/null selfserv_9208 with PID 25065 found at Wed May 10 12:22:49 UTC 2017 selfserv_9208 with PID 25065 started at Wed May 10 12:22:49 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5283: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 25065 at Wed May 10 12:22:50 UTC 2017 kill -USR1 25065 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25065 killed at Wed May 10 12:22:50 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:50 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:50 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25122 >/dev/null 2>/dev/null selfserv_9208 with PID 25122 found at Wed May 10 12:22:50 UTC 2017 selfserv_9208 with PID 25122 started at Wed May 10 12:22:50 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5284: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 25122 at Wed May 10 12:22:50 UTC 2017 kill -USR1 25122 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25122 killed at Wed May 10 12:22:50 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:50 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:50 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25190 >/dev/null 2>/dev/null selfserv_9208 with PID 25190 found at Wed May 10 12:22:50 UTC 2017 selfserv_9208 with PID 25190 started at Wed May 10 12:22:50 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5285: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 25190 at Wed May 10 12:22:51 UTC 2017 kill -USR1 25190 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25190 killed at Wed May 10 12:22:51 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:51 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:51 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25246 >/dev/null 2>/dev/null selfserv_9208 with PID 25246 found at Wed May 10 12:22:51 UTC 2017 selfserv_9208 with PID 25246 started at Wed May 10 12:22:51 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5286: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 25246 at Wed May 10 12:22:51 UTC 2017 kill -USR1 25246 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25246 killed at Wed May 10 12:22:51 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:51 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:51 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25302 >/dev/null 2>/dev/null selfserv_9208 with PID 25302 found at Wed May 10 12:22:51 UTC 2017 selfserv_9208 with PID 25302 started at Wed May 10 12:22:51 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5287: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 25302 at Wed May 10 12:22:52 UTC 2017 kill -USR1 25302 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25302 killed at Wed May 10 12:22:52 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:52 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:52 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25370 >/dev/null 2>/dev/null selfserv_9208 with PID 25370 found at Wed May 10 12:22:52 UTC 2017 selfserv_9208 with PID 25370 started at Wed May 10 12:22:52 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5288: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 25370 at Wed May 10 12:22:52 UTC 2017 kill -USR1 25370 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25370 killed at Wed May 10 12:22:52 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:52 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:52 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25427 >/dev/null 2>/dev/null selfserv_9208 with PID 25427 found at Wed May 10 12:22:52 UTC 2017 selfserv_9208 with PID 25427 started at Wed May 10 12:22:52 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5289: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 25427 at Wed May 10 12:22:53 UTC 2017 kill -USR1 25427 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25427 killed at Wed May 10 12:22:53 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:53 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25483 >/dev/null 2>/dev/null selfserv_9208 with PID 25483 found at Wed May 10 12:22:53 UTC 2017 selfserv_9208 with PID 25483 started at Wed May 10 12:22:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5290: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 25483 at Wed May 10 12:22:53 UTC 2017 kill -USR1 25483 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25483 killed at Wed May 10 12:22:53 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:53 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25551 >/dev/null 2>/dev/null selfserv_9208 with PID 25551 found at Wed May 10 12:22:53 UTC 2017 selfserv_9208 with PID 25551 started at Wed May 10 12:22:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5291: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 25551 at Wed May 10 12:22:53 UTC 2017 kill -USR1 25551 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25551 killed at Wed May 10 12:22:53 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:54 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:54 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25607 >/dev/null 2>/dev/null selfserv_9208 with PID 25607 found at Wed May 10 12:22:54 UTC 2017 selfserv_9208 with PID 25607 started at Wed May 10 12:22:54 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5292: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 25607 at Wed May 10 12:22:54 UTC 2017 kill -USR1 25607 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25607 killed at Wed May 10 12:22:54 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:54 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:54 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25664 >/dev/null 2>/dev/null selfserv_9208 with PID 25664 found at Wed May 10 12:22:54 UTC 2017 selfserv_9208 with PID 25664 started at Wed May 10 12:22:54 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5293: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 25664 at Wed May 10 12:22:54 UTC 2017 kill -USR1 25664 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25664 killed at Wed May 10 12:22:54 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:55 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25732 >/dev/null 2>/dev/null selfserv_9208 with PID 25732 found at Wed May 10 12:22:55 UTC 2017 selfserv_9208 with PID 25732 started at Wed May 10 12:22:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5294: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 25732 at Wed May 10 12:22:55 UTC 2017 kill -USR1 25732 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25732 killed at Wed May 10 12:22:55 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:55 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25788 >/dev/null 2>/dev/null selfserv_9208 with PID 25788 found at Wed May 10 12:22:55 UTC 2017 selfserv_9208 with PID 25788 started at Wed May 10 12:22:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5295: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 25788 at Wed May 10 12:22:55 UTC 2017 kill -USR1 25788 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25788 killed at Wed May 10 12:22:55 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:56 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25844 >/dev/null 2>/dev/null selfserv_9208 with PID 25844 found at Wed May 10 12:22:56 UTC 2017 selfserv_9208 with PID 25844 started at Wed May 10 12:22:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5296: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 25844 at Wed May 10 12:22:56 UTC 2017 kill -USR1 25844 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25844 killed at Wed May 10 12:22:56 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:56 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25912 >/dev/null 2>/dev/null selfserv_9208 with PID 25912 found at Wed May 10 12:22:56 UTC 2017 selfserv_9208 with PID 25912 started at Wed May 10 12:22:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5297: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 25912 at Wed May 10 12:22:57 UTC 2017 kill -USR1 25912 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25912 killed at Wed May 10 12:22:57 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:57 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25968 >/dev/null 2>/dev/null selfserv_9208 with PID 25968 found at Wed May 10 12:22:57 UTC 2017 selfserv_9208 with PID 25968 started at Wed May 10 12:22:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5298: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 25968 at Wed May 10 12:22:57 UTC 2017 kill -USR1 25968 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25968 killed at Wed May 10 12:22:57 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:57 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26024 >/dev/null 2>/dev/null selfserv_9208 with PID 26024 found at Wed May 10 12:22:57 UTC 2017 selfserv_9208 with PID 26024 started at Wed May 10 12:22:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5299: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 26024 at Wed May 10 12:22:58 UTC 2017 kill -USR1 26024 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26024 killed at Wed May 10 12:22:58 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:58 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26092 >/dev/null 2>/dev/null selfserv_9208 with PID 26092 found at Wed May 10 12:22:58 UTC 2017 selfserv_9208 with PID 26092 started at Wed May 10 12:22:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5300: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 26092 at Wed May 10 12:22:58 UTC 2017 kill -USR1 26092 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26092 killed at Wed May 10 12:22:58 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:58 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26148 >/dev/null 2>/dev/null selfserv_9208 with PID 26148 found at Wed May 10 12:22:58 UTC 2017 selfserv_9208 with PID 26148 started at Wed May 10 12:22:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5301: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 26148 at Wed May 10 12:22:59 UTC 2017 kill -USR1 26148 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26148 killed at Wed May 10 12:22:59 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:22:59 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:59 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26204 >/dev/null 2>/dev/null selfserv_9208 with PID 26204 found at Wed May 10 12:22:59 UTC 2017 selfserv_9208 with PID 26204 started at Wed May 10 12:22:59 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5302: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 26204 at Wed May 10 12:22:59 UTC 2017 kill -USR1 26204 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26204 killed at Wed May 10 12:22:59 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:22:59 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:22:59 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26272 >/dev/null 2>/dev/null selfserv_9208 with PID 26272 found at Wed May 10 12:22:59 UTC 2017 selfserv_9208 with PID 26272 started at Wed May 10 12:22:59 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5303: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 26272 at Wed May 10 12:23:00 UTC 2017 kill -USR1 26272 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26272 killed at Wed May 10 12:23:00 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:23:00 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:23:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26328 >/dev/null 2>/dev/null selfserv_9208 with PID 26328 found at Wed May 10 12:23:00 UTC 2017 selfserv_9208 with PID 26328 started at Wed May 10 12:23:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5304: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 26328 at Wed May 10 12:23:00 UTC 2017 kill -USR1 26328 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26328 killed at Wed May 10 12:23:00 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:23:00 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:23:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26384 >/dev/null 2>/dev/null selfserv_9208 with PID 26384 found at Wed May 10 12:23:00 UTC 2017 selfserv_9208 with PID 26384 started at Wed May 10 12:23:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5305: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 26384 at Wed May 10 12:23:01 UTC 2017 kill -USR1 26384 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26384 killed at Wed May 10 12:23:01 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:23:01 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:23:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26452 >/dev/null 2>/dev/null selfserv_9208 with PID 26452 found at Wed May 10 12:23:01 UTC 2017 selfserv_9208 with PID 26452 started at Wed May 10 12:23:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5306: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 26452 at Wed May 10 12:23:01 UTC 2017 kill -USR1 26452 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26452 killed at Wed May 10 12:23:01 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:23:01 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:23:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26508 >/dev/null 2>/dev/null selfserv_9208 with PID 26508 found at Wed May 10 12:23:01 UTC 2017 selfserv_9208 with PID 26508 started at Wed May 10 12:23:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5307: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 26508 at Wed May 10 12:23:02 UTC 2017 kill -USR1 26508 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26508 killed at Wed May 10 12:23:02 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:23:02 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:23:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26564 >/dev/null 2>/dev/null selfserv_9208 with PID 26564 found at Wed May 10 12:23:02 UTC 2017 selfserv_9208 with PID 26564 started at Wed May 10 12:23:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5308: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 26564 at Wed May 10 12:23:02 UTC 2017 kill -USR1 26564 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26564 killed at Wed May 10 12:23:02 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:23:02 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:23:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26632 >/dev/null 2>/dev/null selfserv_9208 with PID 26632 found at Wed May 10 12:23:02 UTC 2017 selfserv_9208 with PID 26632 started at Wed May 10 12:23:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5309: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 26632 at Wed May 10 12:23:03 UTC 2017 kill -USR1 26632 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26632 killed at Wed May 10 12:23:03 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:23:03 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:23:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26688 >/dev/null 2>/dev/null selfserv_9208 with PID 26688 found at Wed May 10 12:23:03 UTC 2017 selfserv_9208 with PID 26688 started at Wed May 10 12:23:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5310: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 26688 at Wed May 10 12:23:03 UTC 2017 kill -USR1 26688 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26688 killed at Wed May 10 12:23:03 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:23:03 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:23:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26744 >/dev/null 2>/dev/null selfserv_9208 with PID 26744 found at Wed May 10 12:23:03 UTC 2017 selfserv_9208 with PID 26744 started at Wed May 10 12:23:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5311: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 26744 at Wed May 10 12:23:04 UTC 2017 kill -USR1 26744 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26744 killed at Wed May 10 12:23:04 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:23:04 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:23:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26812 >/dev/null 2>/dev/null selfserv_9208 with PID 26812 found at Wed May 10 12:23:04 UTC 2017 selfserv_9208 with PID 26812 started at Wed May 10 12:23:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5312: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 26812 at Wed May 10 12:23:04 UTC 2017 kill -USR1 26812 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26812 killed at Wed May 10 12:23:04 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:23:04 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:23:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26868 >/dev/null 2>/dev/null selfserv_9208 with PID 26868 found at Wed May 10 12:23:04 UTC 2017 selfserv_9208 with PID 26868 started at Wed May 10 12:23:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5313: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 26868 at Wed May 10 12:23:04 UTC 2017 kill -USR1 26868 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26868 killed at Wed May 10 12:23:05 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:23:05 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:23:05 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26924 >/dev/null 2>/dev/null selfserv_9208 with PID 26924 found at Wed May 10 12:23:05 UTC 2017 selfserv_9208 with PID 26924 started at Wed May 10 12:23:05 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #5314: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 26924 at Wed May 10 12:23:05 UTC 2017 kill -USR1 26924 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26924 killed at Wed May 10 12:23:05 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:23:05 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:23:05 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26992 >/dev/null 2>/dev/null selfserv_9208 with PID 26992 found at Wed May 10 12:23:05 UTC 2017 selfserv_9208 with PID 26992 started at Wed May 10 12:23:05 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5315: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 26992 at Wed May 10 12:23:05 UTC 2017 kill -USR1 26992 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26992 killed at Wed May 10 12:23:05 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:23:05 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:23:05 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27048 >/dev/null 2>/dev/null selfserv_9208 with PID 27048 found at Wed May 10 12:23:06 UTC 2017 selfserv_9208 with PID 27048 started at Wed May 10 12:23:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5316: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 27048 at Wed May 10 12:23:06 UTC 2017 kill -USR1 27048 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27048 killed at Wed May 10 12:23:06 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:23:06 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:23:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27104 >/dev/null 2>/dev/null selfserv_9208 with PID 27104 found at Wed May 10 12:23:06 UTC 2017 selfserv_9208 with PID 27104 started at Wed May 10 12:23:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #5317: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 27104 at Wed May 10 12:23:06 UTC 2017 kill -USR1 27104 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27104 killed at Wed May 10 12:23:06 UTC 2017 ssl.sh: Cache CRL SSL Client Tests - with ECC =============================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/authin.tl.tmp 0 selfserv_9208 starting at Wed May 10 12:23:06 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:23:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:06 UTC 2017 selfserv_9208 with PID 27167 started at Wed May 10 12:23:07 UTC 2017 Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:07 UTC 2017 ssl.sh: #5318: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:07 UTC 2017 ssl.sh: #5319: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:07 UTC 2017 ssl.sh: #5320: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:07 UTC 2017 ssl.sh: #5321: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:08 UTC 2017 ssl.sh: #5322: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:08 UTC 2017 ssl.sh: #5323: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:08 UTC 2017 ssl.sh: #5324: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:08 UTC 2017 ssl.sh: #5325: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:09 UTC 2017 ssl.sh: #5326: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:09 UTC 2017 ssl.sh: #5327: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:09 UTC 2017 ssl.sh: #5328: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:09 UTC 2017 ssl.sh: #5329: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:10 UTC 2017 ssl.sh: #5330: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:10 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5331: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:10 UTC 2017 ssl.sh: #5332: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:10 UTC 2017 ssl.sh: #5333: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:10 UTC 2017 ssl.sh: #5334: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:11 UTC 2017 ssl.sh: #5335: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:11 UTC 2017 ssl.sh: #5336: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:11 UTC 2017 ssl.sh: #5337: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:11 UTC 2017 ssl.sh: #5338: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:12 UTC 2017 ssl.sh: #5339: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:12 UTC 2017 ssl.sh: #5340: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:12 UTC 2017 ssl.sh: #5341: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:12 UTC 2017 ssl.sh: #5342: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:13 UTC 2017 ssl.sh: #5343: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:13 UTC 2017 ssl.sh: #5344: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:13 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5345: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:13 UTC 2017 ssl.sh: #5346: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:13 UTC 2017 ssl.sh: #5347: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:14 UTC 2017 ssl.sh: #5348: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:14 UTC 2017 ssl.sh: #5349: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:14 UTC 2017 ssl.sh: #5350: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:14 UTC 2017 ssl.sh: #5351: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:15 UTC 2017 ssl.sh: #5352: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:15 UTC 2017 ssl.sh: #5353: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:15 UTC 2017 ssl.sh: #5354: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:15 UTC 2017 ssl.sh: #5355: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:15 UTC 2017 ssl.sh: #5356: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:16 UTC 2017 ssl.sh: #5357: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27167 >/dev/null 2>/dev/null selfserv_9208 with PID 27167 found at Wed May 10 12:23:16 UTC 2017 ssl.sh: #5358: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 27167 at Wed May 10 12:23:16 UTC 2017 kill -USR1 27167 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27167 killed at Wed May 10 12:23:16 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:23:16 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:23:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:16 UTC 2017 selfserv_9208 with PID 28590 started at Wed May 10 12:23:16 UTC 2017 Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:16 UTC 2017 ssl.sh: #5359: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:17 UTC 2017 ssl.sh: #5360: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:17 UTC 2017 ssl.sh: #5361: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:17 UTC 2017 ssl.sh: #5362: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:17 UTC 2017 ssl.sh: #5363: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:17 UTC 2017 ssl.sh: #5364: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:18 UTC 2017 ssl.sh: #5365: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:18 UTC 2017 ssl.sh: #5366: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:18 UTC 2017 ssl.sh: #5367: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:18 UTC 2017 ssl.sh: #5368: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:19 UTC 2017 ssl.sh: #5369: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:19 UTC 2017 ssl.sh: #5370: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:19 UTC 2017 ssl.sh: #5371: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:19 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5372: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:20 UTC 2017 ssl.sh: #5373: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:20 UTC 2017 ssl.sh: #5374: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:20 UTC 2017 ssl.sh: #5375: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:20 UTC 2017 ssl.sh: #5376: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:20 UTC 2017 ssl.sh: #5377: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:21 UTC 2017 ssl.sh: #5378: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:21 UTC 2017 ssl.sh: #5379: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:21 UTC 2017 ssl.sh: #5380: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:21 UTC 2017 ssl.sh: #5381: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:21 UTC 2017 ssl.sh: #5382: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:22 UTC 2017 ssl.sh: #5383: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:22 UTC 2017 ssl.sh: #5384: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:22 UTC 2017 ssl.sh: #5385: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:22 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5386: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:22 UTC 2017 ssl.sh: #5387: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:23 UTC 2017 ssl.sh: #5388: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:23 UTC 2017 ssl.sh: #5389: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:23 UTC 2017 ssl.sh: #5390: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:23 UTC 2017 ssl.sh: #5391: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:23 UTC 2017 ssl.sh: #5392: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:24 UTC 2017 ssl.sh: #5393: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:24 UTC 2017 ssl.sh: #5394: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:24 UTC 2017 ssl.sh: #5395: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:24 UTC 2017 ssl.sh: #5396: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:25 UTC 2017 ssl.sh: #5397: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:25 UTC 2017 ssl.sh: #5398: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28590 >/dev/null 2>/dev/null selfserv_9208 with PID 28590 found at Wed May 10 12:23:25 UTC 2017 ssl.sh: #5399: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 28590 at Wed May 10 12:23:25 UTC 2017 kill -USR1 28590 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28590 killed at Wed May 10 12:23:25 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:23:25 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:23:25 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:25 UTC 2017 selfserv_9208 with PID 30012 started at Wed May 10 12:23:25 UTC 2017 Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:26 UTC 2017 ssl.sh: #5400: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:26 UTC 2017 ssl.sh: #5401: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:26 UTC 2017 ssl.sh: #5402: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:26 UTC 2017 ssl.sh: #5403: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:27 UTC 2017 ssl.sh: #5404: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:27 UTC 2017 ssl.sh: #5405: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:27 UTC 2017 ssl.sh: #5406: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:27 UTC 2017 ssl.sh: #5407: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:28 UTC 2017 ssl.sh: #5408: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:28 UTC 2017 ssl.sh: #5409: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:28 UTC 2017 ssl.sh: #5410: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:28 UTC 2017 ssl.sh: #5411: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:29 UTC 2017 ssl.sh: #5412: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:29 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5413: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:29 UTC 2017 ssl.sh: #5414: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:29 UTC 2017 ssl.sh: #5415: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:30 UTC 2017 ssl.sh: #5416: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:30 UTC 2017 ssl.sh: #5417: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:30 UTC 2017 ssl.sh: #5418: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:30 UTC 2017 ssl.sh: #5419: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:31 UTC 2017 ssl.sh: #5420: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:31 UTC 2017 ssl.sh: #5421: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:31 UTC 2017 ssl.sh: #5422: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:31 UTC 2017 ssl.sh: #5423: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:32 UTC 2017 ssl.sh: #5424: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:32 UTC 2017 ssl.sh: #5425: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:32 UTC 2017 ssl.sh: #5426: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:32 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5427: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:33 UTC 2017 ssl.sh: #5428: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:33 UTC 2017 ssl.sh: #5429: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:33 UTC 2017 ssl.sh: #5430: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:33 UTC 2017 ssl.sh: #5431: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:34 UTC 2017 ssl.sh: #5432: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:34 UTC 2017 ssl.sh: #5433: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:34 UTC 2017 ssl.sh: #5434: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:34 UTC 2017 ssl.sh: #5435: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:35 UTC 2017 ssl.sh: #5436: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:35 UTC 2017 ssl.sh: #5437: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:35 UTC 2017 ssl.sh: #5438: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:35 UTC 2017 ssl.sh: #5439: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30012 >/dev/null 2>/dev/null selfserv_9208 with PID 30012 found at Wed May 10 12:23:36 UTC 2017 ssl.sh: #5440: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 30012 at Wed May 10 12:23:36 UTC 2017 kill -USR1 30012 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 30012 killed at Wed May 10 12:23:36 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:23:36 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:23:36 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:36 UTC 2017 selfserv_9208 with PID 31434 started at Wed May 10 12:23:36 UTC 2017 Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:36 UTC 2017 ssl.sh: #5441: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:36 UTC 2017 ssl.sh: #5442: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:37 UTC 2017 ssl.sh: #5443: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:37 UTC 2017 ssl.sh: #5444: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:37 UTC 2017 ssl.sh: #5445: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:37 UTC 2017 ssl.sh: #5446: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:38 UTC 2017 ssl.sh: #5447: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:38 UTC 2017 ssl.sh: #5448: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:38 UTC 2017 ssl.sh: #5449: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:38 UTC 2017 ssl.sh: #5450: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:39 UTC 2017 ssl.sh: #5451: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:39 UTC 2017 ssl.sh: #5452: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:39 UTC 2017 ssl.sh: #5453: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:39 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5454: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:40 UTC 2017 ssl.sh: #5455: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:40 UTC 2017 ssl.sh: #5456: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:40 UTC 2017 ssl.sh: #5457: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:40 UTC 2017 ssl.sh: #5458: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:40 UTC 2017 ssl.sh: #5459: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:41 UTC 2017 ssl.sh: #5460: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:41 UTC 2017 ssl.sh: #5461: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:41 UTC 2017 ssl.sh: #5462: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:41 UTC 2017 ssl.sh: #5463: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:42 UTC 2017 ssl.sh: #5464: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:42 UTC 2017 ssl.sh: #5465: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:42 UTC 2017 ssl.sh: #5466: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:43 UTC 2017 ssl.sh: #5467: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:43 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5468: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:43 UTC 2017 ssl.sh: #5469: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:43 UTC 2017 ssl.sh: #5470: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:43 UTC 2017 ssl.sh: #5471: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:44 UTC 2017 ssl.sh: #5472: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:44 UTC 2017 ssl.sh: #5473: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:44 UTC 2017 ssl.sh: #5474: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:44 UTC 2017 ssl.sh: #5475: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:44 UTC 2017 ssl.sh: #5476: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:45 UTC 2017 ssl.sh: #5477: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:45 UTC 2017 ssl.sh: #5478: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:45 UTC 2017 ssl.sh: #5479: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:45 UTC 2017 ssl.sh: #5480: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null selfserv_9208 with PID 31434 found at Wed May 10 12:23:46 UTC 2017 ssl.sh: #5481: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 31434 at Wed May 10 12:23:46 UTC 2017 kill -USR1 31434 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 31434 killed at Wed May 10 12:23:46 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:23:46 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:23:46 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 396 >/dev/null 2>/dev/null selfserv_9208 with PID 396 found at Wed May 10 12:23:46 UTC 2017 selfserv_9208 with PID 396 started at Wed May 10 12:23:46 UTC 2017 trying to kill selfserv_9208 with PID 396 at Wed May 10 12:23:46 UTC 2017 kill -USR1 396 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 396 killed at Wed May 10 12:23:46 UTC 2017 selfserv_9208 starting at Wed May 10 12:23:46 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:23:46 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:46 UTC 2017 selfserv_9208 with PID 441 started at Wed May 10 12:23:46 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:46 UTC 2017 ssl.sh: #5482: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:47 UTC 2017 ssl.sh: #5483: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:47 UTC 2017 ssl.sh: #5484: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:47 UTC 2017 ssl.sh: #5485: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:47 UTC 2017 ssl.sh: #5486: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:48 UTC 2017 ssl.sh: #5487: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:48 UTC 2017 ssl.sh: #5488: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:48 UTC 2017 ssl.sh: #5489: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:48 UTC 2017 ssl.sh: #5490: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:49 UTC 2017 ssl.sh: #5491: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:49 UTC 2017 ssl.sh: #5492: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:49 UTC 2017 ssl.sh: #5493: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:50 UTC 2017 ssl.sh: #5494: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:50 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5495: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:50 UTC 2017 ssl.sh: #5496: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:50 UTC 2017 ssl.sh: #5497: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:51 UTC 2017 ssl.sh: #5498: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:51 UTC 2017 ssl.sh: #5499: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:51 UTC 2017 ssl.sh: #5500: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:51 UTC 2017 ssl.sh: #5501: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:52 UTC 2017 ssl.sh: #5502: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:52 UTC 2017 ssl.sh: #5503: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:52 UTC 2017 ssl.sh: #5504: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:53 UTC 2017 ssl.sh: #5505: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:53 UTC 2017 ssl.sh: #5506: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:53 UTC 2017 ssl.sh: #5507: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:53 UTC 2017 ssl.sh: #5508: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:54 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5509: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:54 UTC 2017 ssl.sh: #5510: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:54 UTC 2017 ssl.sh: #5511: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:54 UTC 2017 ssl.sh: #5512: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:55 UTC 2017 ssl.sh: #5513: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:55 UTC 2017 ssl.sh: #5514: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:55 UTC 2017 ssl.sh: #5515: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:56 UTC 2017 ssl.sh: #5516: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:56 UTC 2017 ssl.sh: #5517: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:56 UTC 2017 ssl.sh: #5518: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:56 UTC 2017 ssl.sh: #5519: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:57 UTC 2017 ssl.sh: #5520: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:57 UTC 2017 ssl.sh: #5521: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 441 >/dev/null 2>/dev/null selfserv_9208 with PID 441 found at Wed May 10 12:23:57 UTC 2017 ssl.sh: #5522: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 441 at Wed May 10 12:23:57 UTC 2017 kill -USR1 441 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 441 killed at Wed May 10 12:23:57 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:23:57 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:23:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:23:57 UTC 2017 selfserv_9208 with PID 1940 started at Wed May 10 12:23:57 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:23:58 UTC 2017 ssl.sh: #5523: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:23:58 UTC 2017 ssl.sh: #5524: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:23:58 UTC 2017 ssl.sh: #5525: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:23:59 UTC 2017 ssl.sh: #5526: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:23:59 UTC 2017 ssl.sh: #5527: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:23:59 UTC 2017 ssl.sh: #5528: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:00 UTC 2017 ssl.sh: #5529: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:00 UTC 2017 ssl.sh: #5530: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:00 UTC 2017 ssl.sh: #5531: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:01 UTC 2017 ssl.sh: #5532: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:01 UTC 2017 ssl.sh: #5533: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:01 UTC 2017 ssl.sh: #5534: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:02 UTC 2017 ssl.sh: #5535: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:02 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5536: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:02 UTC 2017 ssl.sh: #5537: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:03 UTC 2017 ssl.sh: #5538: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:03 UTC 2017 ssl.sh: #5539: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:03 UTC 2017 ssl.sh: #5540: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:04 UTC 2017 ssl.sh: #5541: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:04 UTC 2017 ssl.sh: #5542: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:04 UTC 2017 ssl.sh: #5543: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:04 UTC 2017 ssl.sh: #5544: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:05 UTC 2017 ssl.sh: #5545: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:05 UTC 2017 ssl.sh: #5546: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:05 UTC 2017 ssl.sh: #5547: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:06 UTC 2017 ssl.sh: #5548: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:06 UTC 2017 ssl.sh: #5549: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:06 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5550: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:07 UTC 2017 ssl.sh: #5551: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:07 UTC 2017 ssl.sh: #5552: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:07 UTC 2017 ssl.sh: #5553: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:08 UTC 2017 ssl.sh: #5554: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:08 UTC 2017 ssl.sh: #5555: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:08 UTC 2017 ssl.sh: #5556: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:09 UTC 2017 ssl.sh: #5557: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:09 UTC 2017 ssl.sh: #5558: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:09 UTC 2017 ssl.sh: #5559: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:09 UTC 2017 ssl.sh: #5560: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:10 UTC 2017 ssl.sh: #5561: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:10 UTC 2017 ssl.sh: #5562: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:24:10 UTC 2017 ssl.sh: #5563: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 1940 at Wed May 10 12:24:11 UTC 2017 kill -USR1 1940 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1940 killed at Wed May 10 12:24:11 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:24:11 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:24:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:11 UTC 2017 selfserv_9208 with PID 3362 started at Wed May 10 12:24:11 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:11 UTC 2017 ssl.sh: #5564: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:11 UTC 2017 ssl.sh: #5565: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:12 UTC 2017 ssl.sh: #5566: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:12 UTC 2017 ssl.sh: #5567: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:12 UTC 2017 ssl.sh: #5568: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:12 UTC 2017 ssl.sh: #5569: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:13 UTC 2017 ssl.sh: #5570: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:13 UTC 2017 ssl.sh: #5571: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:13 UTC 2017 ssl.sh: #5572: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:13 UTC 2017 ssl.sh: #5573: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:14 UTC 2017 ssl.sh: #5574: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:14 UTC 2017 ssl.sh: #5575: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:14 UTC 2017 ssl.sh: #5576: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:15 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5577: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:15 UTC 2017 ssl.sh: #5578: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:15 UTC 2017 ssl.sh: #5579: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:15 UTC 2017 ssl.sh: #5580: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:16 UTC 2017 ssl.sh: #5581: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:16 UTC 2017 ssl.sh: #5582: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:16 UTC 2017 ssl.sh: #5583: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:16 UTC 2017 ssl.sh: #5584: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:17 UTC 2017 ssl.sh: #5585: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:17 UTC 2017 ssl.sh: #5586: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:17 UTC 2017 ssl.sh: #5587: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:18 UTC 2017 ssl.sh: #5588: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:18 UTC 2017 ssl.sh: #5589: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:18 UTC 2017 ssl.sh: #5590: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:18 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5591: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:19 UTC 2017 ssl.sh: #5592: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:19 UTC 2017 ssl.sh: #5593: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:19 UTC 2017 ssl.sh: #5594: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:19 UTC 2017 ssl.sh: #5595: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:20 UTC 2017 ssl.sh: #5596: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:20 UTC 2017 ssl.sh: #5597: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:20 UTC 2017 ssl.sh: #5598: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:21 UTC 2017 ssl.sh: #5599: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:21 UTC 2017 ssl.sh: #5600: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:21 UTC 2017 ssl.sh: #5601: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:21 UTC 2017 ssl.sh: #5602: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:22 UTC 2017 ssl.sh: #5603: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3362 >/dev/null 2>/dev/null selfserv_9208 with PID 3362 found at Wed May 10 12:24:22 UTC 2017 ssl.sh: #5604: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 3362 at Wed May 10 12:24:22 UTC 2017 kill -USR1 3362 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 3362 killed at Wed May 10 12:24:22 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:24:22 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:24:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:22 UTC 2017 selfserv_9208 with PID 4785 started at Wed May 10 12:24:22 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:23 UTC 2017 ssl.sh: #5605: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:23 UTC 2017 ssl.sh: #5606: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:23 UTC 2017 ssl.sh: #5607: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:23 UTC 2017 ssl.sh: #5608: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:24 UTC 2017 ssl.sh: #5609: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:24 UTC 2017 ssl.sh: #5610: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:24 UTC 2017 ssl.sh: #5611: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:25 UTC 2017 ssl.sh: #5612: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:25 UTC 2017 ssl.sh: #5613: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:25 UTC 2017 ssl.sh: #5614: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:26 UTC 2017 ssl.sh: #5615: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:26 UTC 2017 ssl.sh: #5616: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:26 UTC 2017 ssl.sh: #5617: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:26 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5618: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:27 UTC 2017 ssl.sh: #5619: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:27 UTC 2017 ssl.sh: #5620: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:27 UTC 2017 ssl.sh: #5621: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:28 UTC 2017 ssl.sh: #5622: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:28 UTC 2017 ssl.sh: #5623: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:28 UTC 2017 ssl.sh: #5624: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:28 UTC 2017 ssl.sh: #5625: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:29 UTC 2017 ssl.sh: #5626: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:29 UTC 2017 ssl.sh: #5627: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:29 UTC 2017 ssl.sh: #5628: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:30 UTC 2017 ssl.sh: #5629: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:30 UTC 2017 ssl.sh: #5630: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:30 UTC 2017 ssl.sh: #5631: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:31 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5632: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:31 UTC 2017 ssl.sh: #5633: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:31 UTC 2017 ssl.sh: #5634: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:31 UTC 2017 ssl.sh: #5635: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:32 UTC 2017 ssl.sh: #5636: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:32 UTC 2017 ssl.sh: #5637: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:32 UTC 2017 ssl.sh: #5638: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:32 UTC 2017 ssl.sh: #5639: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:33 UTC 2017 ssl.sh: #5640: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:33 UTC 2017 ssl.sh: #5641: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:33 UTC 2017 ssl.sh: #5642: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:34 UTC 2017 ssl.sh: #5643: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:34 UTC 2017 ssl.sh: #5644: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4785 >/dev/null 2>/dev/null selfserv_9208 with PID 4785 found at Wed May 10 12:24:34 UTC 2017 ssl.sh: #5645: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 4785 at Wed May 10 12:24:34 UTC 2017 kill -USR1 4785 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 4785 killed at Wed May 10 12:24:34 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:24:34 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:24:34 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:34 UTC 2017 selfserv_9208 with PID 6209 started at Wed May 10 12:24:34 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:35 UTC 2017 ssl.sh: #5646: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:35 UTC 2017 ssl.sh: #5647: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:35 UTC 2017 ssl.sh: #5648: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:36 UTC 2017 ssl.sh: #5649: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:36 UTC 2017 ssl.sh: #5650: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:37 UTC 2017 ssl.sh: #5651: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:37 UTC 2017 ssl.sh: #5652: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:37 UTC 2017 ssl.sh: #5653: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:38 UTC 2017 ssl.sh: #5654: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:38 UTC 2017 ssl.sh: #5655: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:38 UTC 2017 ssl.sh: #5656: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:39 UTC 2017 ssl.sh: #5657: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:39 UTC 2017 ssl.sh: #5658: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:39 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5659: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:40 UTC 2017 ssl.sh: #5660: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:40 UTC 2017 ssl.sh: #5661: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:40 UTC 2017 ssl.sh: #5662: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:41 UTC 2017 ssl.sh: #5663: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:41 UTC 2017 ssl.sh: #5664: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:41 UTC 2017 ssl.sh: #5665: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:42 UTC 2017 ssl.sh: #5666: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:42 UTC 2017 ssl.sh: #5667: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:42 UTC 2017 ssl.sh: #5668: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:43 UTC 2017 ssl.sh: #5669: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:43 UTC 2017 ssl.sh: #5670: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:43 UTC 2017 ssl.sh: #5671: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:44 UTC 2017 ssl.sh: #5672: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:44 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5673: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:44 UTC 2017 ssl.sh: #5674: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:45 UTC 2017 ssl.sh: #5675: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:45 UTC 2017 ssl.sh: #5676: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:45 UTC 2017 ssl.sh: #5677: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:46 UTC 2017 ssl.sh: #5678: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:46 UTC 2017 ssl.sh: #5679: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:46 UTC 2017 ssl.sh: #5680: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:47 UTC 2017 ssl.sh: #5681: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:47 UTC 2017 ssl.sh: #5682: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:47 UTC 2017 ssl.sh: #5683: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:48 UTC 2017 ssl.sh: #5684: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:48 UTC 2017 ssl.sh: #5685: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6209 >/dev/null 2>/dev/null selfserv_9208 with PID 6209 found at Wed May 10 12:24:48 UTC 2017 ssl.sh: #5686: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 6209 at Wed May 10 12:24:48 UTC 2017 kill -USR1 6209 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6209 killed at Wed May 10 12:24:48 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:24:48 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:24:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:48 UTC 2017 selfserv_9208 with PID 7643 started at Wed May 10 12:24:48 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:49 UTC 2017 ssl.sh: #5687: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:49 UTC 2017 ssl.sh: #5688: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:49 UTC 2017 ssl.sh: #5689: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:50 UTC 2017 ssl.sh: #5690: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:50 UTC 2017 ssl.sh: #5691: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:50 UTC 2017 ssl.sh: #5692: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:51 UTC 2017 ssl.sh: #5693: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:51 UTC 2017 ssl.sh: #5694: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:51 UTC 2017 ssl.sh: #5695: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:52 UTC 2017 ssl.sh: #5696: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:52 UTC 2017 ssl.sh: #5697: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:52 UTC 2017 ssl.sh: #5698: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:53 UTC 2017 ssl.sh: #5699: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:53 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5700: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:53 UTC 2017 ssl.sh: #5701: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:53 UTC 2017 ssl.sh: #5702: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:54 UTC 2017 ssl.sh: #5703: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:54 UTC 2017 ssl.sh: #5704: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:54 UTC 2017 ssl.sh: #5705: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:54 UTC 2017 ssl.sh: #5706: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:55 UTC 2017 ssl.sh: #5707: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:55 UTC 2017 ssl.sh: #5708: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:55 UTC 2017 ssl.sh: #5709: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:56 UTC 2017 ssl.sh: #5710: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:56 UTC 2017 ssl.sh: #5711: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:56 UTC 2017 ssl.sh: #5712: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:57 UTC 2017 ssl.sh: #5713: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:57 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5714: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:57 UTC 2017 ssl.sh: #5715: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:57 UTC 2017 ssl.sh: #5716: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:58 UTC 2017 ssl.sh: #5717: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:58 UTC 2017 ssl.sh: #5718: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:58 UTC 2017 ssl.sh: #5719: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:59 UTC 2017 ssl.sh: #5720: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:59 UTC 2017 ssl.sh: #5721: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:59 UTC 2017 ssl.sh: #5722: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:24:59 UTC 2017 ssl.sh: #5723: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:25:00 UTC 2017 ssl.sh: #5724: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:25:00 UTC 2017 ssl.sh: #5725: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:25:00 UTC 2017 ssl.sh: #5726: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7643 >/dev/null 2>/dev/null selfserv_9208 with PID 7643 found at Wed May 10 12:25:01 UTC 2017 ssl.sh: #5727: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 7643 at Wed May 10 12:25:01 UTC 2017 kill -USR1 7643 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7643 killed at Wed May 10 12:25:01 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:25:01 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:25:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 9065 >/dev/null 2>/dev/null selfserv_9208 with PID 9065 found at Wed May 10 12:25:01 UTC 2017 selfserv_9208 with PID 9065 started at Wed May 10 12:25:01 UTC 2017 trying to kill selfserv_9208 with PID 9065 at Wed May 10 12:25:01 UTC 2017 kill -USR1 9065 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 9065 killed at Wed May 10 12:25:01 UTC 2017 selfserv_9208 starting at Wed May 10 12:25:01 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:25:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:01 UTC 2017 selfserv_9208 with PID 9107 started at Wed May 10 12:25:01 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:01 UTC 2017 ssl.sh: #5728: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:01 UTC 2017 ssl.sh: #5729: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:02 UTC 2017 ssl.sh: #5730: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:02 UTC 2017 ssl.sh: #5731: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:02 UTC 2017 ssl.sh: #5732: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:03 UTC 2017 ssl.sh: #5733: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:03 UTC 2017 ssl.sh: #5734: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:03 UTC 2017 ssl.sh: #5735: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:03 UTC 2017 ssl.sh: #5736: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:04 UTC 2017 ssl.sh: #5737: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:04 UTC 2017 ssl.sh: #5738: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:04 UTC 2017 ssl.sh: #5739: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:05 UTC 2017 ssl.sh: #5740: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:05 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5741: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:05 UTC 2017 ssl.sh: #5742: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:05 UTC 2017 ssl.sh: #5743: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:06 UTC 2017 ssl.sh: #5744: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:06 UTC 2017 ssl.sh: #5745: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:06 UTC 2017 ssl.sh: #5746: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:06 UTC 2017 ssl.sh: #5747: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:07 UTC 2017 ssl.sh: #5748: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:07 UTC 2017 ssl.sh: #5749: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:07 UTC 2017 ssl.sh: #5750: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:08 UTC 2017 ssl.sh: #5751: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:08 UTC 2017 ssl.sh: #5752: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:08 UTC 2017 ssl.sh: #5753: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:08 UTC 2017 ssl.sh: #5754: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:09 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5755: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:09 UTC 2017 ssl.sh: #5756: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:09 UTC 2017 ssl.sh: #5757: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:09 UTC 2017 ssl.sh: #5758: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:10 UTC 2017 ssl.sh: #5759: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:10 UTC 2017 ssl.sh: #5760: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:10 UTC 2017 ssl.sh: #5761: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:10 UTC 2017 ssl.sh: #5762: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:11 UTC 2017 ssl.sh: #5763: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:11 UTC 2017 ssl.sh: #5764: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:11 UTC 2017 ssl.sh: #5765: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:12 UTC 2017 ssl.sh: #5766: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:12 UTC 2017 ssl.sh: #5767: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9107 >/dev/null 2>/dev/null selfserv_9208 with PID 9107 found at Wed May 10 12:25:12 UTC 2017 ssl.sh: #5768: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 9107 at Wed May 10 12:25:12 UTC 2017 kill -USR1 9107 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 9107 killed at Wed May 10 12:25:12 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:25:12 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:25:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:12 UTC 2017 selfserv_9208 with PID 10529 started at Wed May 10 12:25:12 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:13 UTC 2017 ssl.sh: #5769: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:13 UTC 2017 ssl.sh: #5770: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:13 UTC 2017 ssl.sh: #5771: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:14 UTC 2017 ssl.sh: #5772: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:14 UTC 2017 ssl.sh: #5773: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:14 UTC 2017 ssl.sh: #5774: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:15 UTC 2017 ssl.sh: #5775: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:15 UTC 2017 ssl.sh: #5776: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:15 UTC 2017 ssl.sh: #5777: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:16 UTC 2017 ssl.sh: #5778: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:16 UTC 2017 ssl.sh: #5779: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:16 UTC 2017 ssl.sh: #5780: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:17 UTC 2017 ssl.sh: #5781: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:17 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5782: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:17 UTC 2017 ssl.sh: #5783: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:18 UTC 2017 ssl.sh: #5784: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:18 UTC 2017 ssl.sh: #5785: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:18 UTC 2017 ssl.sh: #5786: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:18 UTC 2017 ssl.sh: #5787: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:19 UTC 2017 ssl.sh: #5788: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:19 UTC 2017 ssl.sh: #5789: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:19 UTC 2017 ssl.sh: #5790: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:20 UTC 2017 ssl.sh: #5791: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:20 UTC 2017 ssl.sh: #5792: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:20 UTC 2017 ssl.sh: #5793: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:21 UTC 2017 ssl.sh: #5794: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:21 UTC 2017 ssl.sh: #5795: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:21 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5796: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:22 UTC 2017 ssl.sh: #5797: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:22 UTC 2017 ssl.sh: #5798: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:22 UTC 2017 ssl.sh: #5799: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:23 UTC 2017 ssl.sh: #5800: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:23 UTC 2017 ssl.sh: #5801: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:23 UTC 2017 ssl.sh: #5802: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:23 UTC 2017 ssl.sh: #5803: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:24 UTC 2017 ssl.sh: #5804: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:24 UTC 2017 ssl.sh: #5805: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:24 UTC 2017 ssl.sh: #5806: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:25 UTC 2017 ssl.sh: #5807: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:25 UTC 2017 ssl.sh: #5808: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10529 >/dev/null 2>/dev/null selfserv_9208 with PID 10529 found at Wed May 10 12:25:25 UTC 2017 ssl.sh: #5809: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 10529 at Wed May 10 12:25:25 UTC 2017 kill -USR1 10529 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 10529 killed at Wed May 10 12:25:25 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:25:25 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:25:25 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:26 UTC 2017 selfserv_9208 with PID 11951 started at Wed May 10 12:25:26 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:26 UTC 2017 ssl.sh: #5810: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:26 UTC 2017 ssl.sh: #5811: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:26 UTC 2017 ssl.sh: #5812: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:27 UTC 2017 ssl.sh: #5813: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:27 UTC 2017 ssl.sh: #5814: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:27 UTC 2017 ssl.sh: #5815: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:28 UTC 2017 ssl.sh: #5816: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:28 UTC 2017 ssl.sh: #5817: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:28 UTC 2017 ssl.sh: #5818: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:28 UTC 2017 ssl.sh: #5819: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:29 UTC 2017 ssl.sh: #5820: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:29 UTC 2017 ssl.sh: #5821: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:29 UTC 2017 ssl.sh: #5822: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:29 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5823: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:30 UTC 2017 ssl.sh: #5824: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:30 UTC 2017 ssl.sh: #5825: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:30 UTC 2017 ssl.sh: #5826: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:31 UTC 2017 ssl.sh: #5827: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:31 UTC 2017 ssl.sh: #5828: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:31 UTC 2017 ssl.sh: #5829: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:31 UTC 2017 ssl.sh: #5830: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:32 UTC 2017 ssl.sh: #5831: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:32 UTC 2017 ssl.sh: #5832: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:32 UTC 2017 ssl.sh: #5833: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:32 UTC 2017 ssl.sh: #5834: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:33 UTC 2017 ssl.sh: #5835: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:33 UTC 2017 ssl.sh: #5836: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:33 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5837: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:34 UTC 2017 ssl.sh: #5838: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:34 UTC 2017 ssl.sh: #5839: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:34 UTC 2017 ssl.sh: #5840: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:34 UTC 2017 ssl.sh: #5841: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:35 UTC 2017 ssl.sh: #5842: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:35 UTC 2017 ssl.sh: #5843: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:35 UTC 2017 ssl.sh: #5844: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:35 UTC 2017 ssl.sh: #5845: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:36 UTC 2017 ssl.sh: #5846: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:36 UTC 2017 ssl.sh: #5847: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:36 UTC 2017 ssl.sh: #5848: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:37 UTC 2017 ssl.sh: #5849: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11951 >/dev/null 2>/dev/null selfserv_9208 with PID 11951 found at Wed May 10 12:25:37 UTC 2017 ssl.sh: #5850: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 11951 at Wed May 10 12:25:37 UTC 2017 kill -USR1 11951 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 11951 killed at Wed May 10 12:25:37 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:25:37 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:25:37 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:37 UTC 2017 selfserv_9208 with PID 13374 started at Wed May 10 12:25:37 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:37 UTC 2017 ssl.sh: #5851: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:38 UTC 2017 ssl.sh: #5852: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:38 UTC 2017 ssl.sh: #5853: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:38 UTC 2017 ssl.sh: #5854: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:39 UTC 2017 ssl.sh: #5855: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:39 UTC 2017 ssl.sh: #5856: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:39 UTC 2017 ssl.sh: #5857: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:39 UTC 2017 ssl.sh: #5858: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:40 UTC 2017 ssl.sh: #5859: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:40 UTC 2017 ssl.sh: #5860: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:40 UTC 2017 ssl.sh: #5861: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:41 UTC 2017 ssl.sh: #5862: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:41 UTC 2017 ssl.sh: #5863: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:41 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5864: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:42 UTC 2017 ssl.sh: #5865: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:42 UTC 2017 ssl.sh: #5866: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:42 UTC 2017 ssl.sh: #5867: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:42 UTC 2017 ssl.sh: #5868: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:43 UTC 2017 ssl.sh: #5869: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:43 UTC 2017 ssl.sh: #5870: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:43 UTC 2017 ssl.sh: #5871: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:44 UTC 2017 ssl.sh: #5872: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:44 UTC 2017 ssl.sh: #5873: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:44 UTC 2017 ssl.sh: #5874: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:44 UTC 2017 ssl.sh: #5875: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:45 UTC 2017 ssl.sh: #5876: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:45 UTC 2017 ssl.sh: #5877: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:45 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5878: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:46 UTC 2017 ssl.sh: #5879: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:46 UTC 2017 ssl.sh: #5880: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:46 UTC 2017 ssl.sh: #5881: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:46 UTC 2017 ssl.sh: #5882: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:47 UTC 2017 ssl.sh: #5883: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:47 UTC 2017 ssl.sh: #5884: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:47 UTC 2017 ssl.sh: #5885: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:48 UTC 2017 ssl.sh: #5886: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:48 UTC 2017 ssl.sh: #5887: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:48 UTC 2017 ssl.sh: #5888: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:48 UTC 2017 ssl.sh: #5889: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:49 UTC 2017 ssl.sh: #5890: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13374 >/dev/null 2>/dev/null selfserv_9208 with PID 13374 found at Wed May 10 12:25:49 UTC 2017 ssl.sh: #5891: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 13374 at Wed May 10 12:25:49 UTC 2017 kill -USR1 13374 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 13374 killed at Wed May 10 12:25:49 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:25:49 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:25:49 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:49 UTC 2017 selfserv_9208 with PID 14796 started at Wed May 10 12:25:49 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:50 UTC 2017 ssl.sh: #5892: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:50 UTC 2017 ssl.sh: #5893: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:50 UTC 2017 ssl.sh: #5894: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:51 UTC 2017 ssl.sh: #5895: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:51 UTC 2017 ssl.sh: #5896: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:51 UTC 2017 ssl.sh: #5897: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:52 UTC 2017 ssl.sh: #5898: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:52 UTC 2017 ssl.sh: #5899: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:52 UTC 2017 ssl.sh: #5900: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:53 UTC 2017 ssl.sh: #5901: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:53 UTC 2017 ssl.sh: #5902: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:54 UTC 2017 ssl.sh: #5903: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:54 UTC 2017 ssl.sh: #5904: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:54 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5905: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:55 UTC 2017 ssl.sh: #5906: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:55 UTC 2017 ssl.sh: #5907: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:55 UTC 2017 ssl.sh: #5908: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:55 UTC 2017 ssl.sh: #5909: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:56 UTC 2017 ssl.sh: #5910: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:56 UTC 2017 ssl.sh: #5911: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:56 UTC 2017 ssl.sh: #5912: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:57 UTC 2017 ssl.sh: #5913: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:57 UTC 2017 ssl.sh: #5914: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:57 UTC 2017 ssl.sh: #5915: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:58 UTC 2017 ssl.sh: #5916: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:58 UTC 2017 ssl.sh: #5917: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:59 UTC 2017 ssl.sh: #5918: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:59 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5919: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:59 UTC 2017 ssl.sh: #5920: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:25:59 UTC 2017 ssl.sh: #5921: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:26:00 UTC 2017 ssl.sh: #5922: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:26:00 UTC 2017 ssl.sh: #5923: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:26:00 UTC 2017 ssl.sh: #5924: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:26:01 UTC 2017 ssl.sh: #5925: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:26:01 UTC 2017 ssl.sh: #5926: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:26:01 UTC 2017 ssl.sh: #5927: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:26:02 UTC 2017 ssl.sh: #5928: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:26:02 UTC 2017 ssl.sh: #5929: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:26:02 UTC 2017 ssl.sh: #5930: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:26:03 UTC 2017 ssl.sh: #5931: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14796 >/dev/null 2>/dev/null selfserv_9208 with PID 14796 found at Wed May 10 12:26:03 UTC 2017 ssl.sh: #5932: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 14796 at Wed May 10 12:26:03 UTC 2017 kill -USR1 14796 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14796 killed at Wed May 10 12:26:03 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:26:03 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:26:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:03 UTC 2017 selfserv_9208 with PID 16218 started at Wed May 10 12:26:03 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:04 UTC 2017 ssl.sh: #5933: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:04 UTC 2017 ssl.sh: #5934: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:04 UTC 2017 ssl.sh: #5935: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:04 UTC 2017 ssl.sh: #5936: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:05 UTC 2017 ssl.sh: #5937: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:05 UTC 2017 ssl.sh: #5938: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:05 UTC 2017 ssl.sh: #5939: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:06 UTC 2017 ssl.sh: #5940: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:06 UTC 2017 ssl.sh: #5941: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:06 UTC 2017 ssl.sh: #5942: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:07 UTC 2017 ssl.sh: #5943: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:07 UTC 2017 ssl.sh: #5944: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:07 UTC 2017 ssl.sh: #5945: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:08 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5946: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:08 UTC 2017 ssl.sh: #5947: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:08 UTC 2017 ssl.sh: #5948: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:08 UTC 2017 ssl.sh: #5949: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:09 UTC 2017 ssl.sh: #5950: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:09 UTC 2017 ssl.sh: #5951: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:09 UTC 2017 ssl.sh: #5952: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:10 UTC 2017 ssl.sh: #5953: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:10 UTC 2017 ssl.sh: #5954: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:10 UTC 2017 ssl.sh: #5955: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:10 UTC 2017 ssl.sh: #5956: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:11 UTC 2017 ssl.sh: #5957: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:11 UTC 2017 ssl.sh: #5958: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:11 UTC 2017 ssl.sh: #5959: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:12 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #5960: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:12 UTC 2017 ssl.sh: #5961: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:12 UTC 2017 ssl.sh: #5962: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:12 UTC 2017 ssl.sh: #5963: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:13 UTC 2017 ssl.sh: #5964: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:13 UTC 2017 ssl.sh: #5965: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:13 UTC 2017 ssl.sh: #5966: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:14 UTC 2017 ssl.sh: #5967: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:14 UTC 2017 ssl.sh: #5968: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:14 UTC 2017 ssl.sh: #5969: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:14 UTC 2017 ssl.sh: #5970: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:15 UTC 2017 ssl.sh: #5971: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:15 UTC 2017 ssl.sh: #5972: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16218 >/dev/null 2>/dev/null selfserv_9208 with PID 16218 found at Wed May 10 12:26:15 UTC 2017 ssl.sh: #5973: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 16218 at Wed May 10 12:26:15 UTC 2017 kill -USR1 16218 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 16218 killed at Wed May 10 12:26:15 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:26:16 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:26:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17643 >/dev/null 2>/dev/null selfserv_9208 with PID 17643 found at Wed May 10 12:26:16 UTC 2017 selfserv_9208 with PID 17643 started at Wed May 10 12:26:16 UTC 2017 trying to kill selfserv_9208 with PID 17643 at Wed May 10 12:26:16 UTC 2017 kill -USR1 17643 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17643 killed at Wed May 10 12:26:16 UTC 2017 TIMESTAMP ssl END: Wed May 10 12:26:16 UTC 2017 Running tests for ocsp TIMESTAMP ocsp BEGIN: Wed May 10 12:26:16 UTC 2017 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Wed May 10 12:26:16 UTC 2017 Running tests for pkits TIMESTAMP pkits BEGIN: Wed May 10 12:26:16 UTC 2017 pkits.sh: PKITS data directory not defined, skipping. TIMESTAMP pkits END: Wed May 10 12:26:16 UTC 2017 Running tests for chains TIMESTAMP chains BEGIN: Wed May 10 12:26:16 UTC 2017 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #5974: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122617 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5975: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #5976: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #5977: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #5978: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5979: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5980: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5981: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #5982: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #5983: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5984: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5985: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5986: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #5987: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #5988: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5989: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9219 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5990: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5991: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #5992: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #5993: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5994: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5995: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5996: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #5997: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5998: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5999: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6000: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #6001: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6002: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #6003: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6004: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #6005: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6006: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #6007: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6008: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #6009: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6010: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9219 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #6011: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6012: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #6013: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6014: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #6015: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6016: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #6017: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6018: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #6019: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6020: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #6021: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6022: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9219 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #6023: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6024: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #6025: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6026: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #6027: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6028: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #6029: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6030: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #6031: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6032: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #6033: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6034: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9219 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #6035: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6036: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20170510122640Z nextupdate=20180510122640Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Wed May 10 12:26:40 2017 Next Update: Thu May 10 12:26:40 2018 CRL Extensions: chains.sh: #6037: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20170510122641Z addcert 2 20170510122641Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Wed May 10 12:26:41 2017 Next Update: Thu May 10 12:26:40 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed May 10 12:26:41 2017 CRL Extensions: chains.sh: #6038: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20170510122641Z nextupdate=20180510122641Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed May 10 12:26:41 2017 Next Update: Thu May 10 12:26:41 2018 CRL Extensions: chains.sh: #6039: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20170510122642Z addcert 2 20170510122642Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed May 10 12:26:42 2017 Next Update: Thu May 10 12:26:41 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed May 10 12:26:42 2017 CRL Extensions: chains.sh: #6040: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20170510122643Z addcert 4 20170510122643Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed May 10 12:26:43 2017 Next Update: Thu May 10 12:26:41 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed May 10 12:26:42 2017 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Wed May 10 12:26:43 2017 CRL Extensions: chains.sh: #6041: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20170510122643Z nextupdate=20180510122643Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed May 10 12:26:43 2017 Next Update: Thu May 10 12:26:43 2018 CRL Extensions: chains.sh: #6042: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20170510122644Z addcert 2 20170510122644Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed May 10 12:26:44 2017 Next Update: Thu May 10 12:26:43 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed May 10 12:26:44 2017 CRL Extensions: chains.sh: #6043: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20170510122645Z addcert 3 20170510122645Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed May 10 12:26:45 2017 Next Update: Thu May 10 12:26:43 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed May 10 12:26:44 2017 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Wed May 10 12:26:45 2017 CRL Extensions: chains.sh: #6044: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20170510122645Z nextupdate=20180510122645Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed May 10 12:26:45 2017 Next Update: Thu May 10 12:26:45 2018 CRL Extensions: chains.sh: #6045: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20170510122646Z addcert 2 20170510122646Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed May 10 12:26:46 2017 Next Update: Thu May 10 12:26:45 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed May 10 12:26:46 2017 CRL Extensions: chains.sh: #6046: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20170510122647Z addcert 3 20170510122647Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed May 10 12:26:47 2017 Next Update: Thu May 10 12:26:45 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed May 10 12:26:46 2017 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Wed May 10 12:26:47 2017 CRL Extensions: chains.sh: #6047: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #6048: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #6049: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #6050: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #6051: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #6052: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #6053: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #6054: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #6055: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #6056: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #6057: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #6058: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #6059: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #6060: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #6061: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #6062: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #6063: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #6064: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #6065: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #6066: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #6067: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #6068: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #6069: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #6070: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #6071: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED httpserv starting at Wed May 10 12:26:49 UTC 2017 httpserv -D -p 9218 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/aiahttp/http_pid.1556 & trying to connect to httpserv at Wed May 10 12:26:49 UTC 2017 tstclnt -p 9218 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9218 (address=::1) tstclnt: exiting with return code 0 kill -0 19095 >/dev/null 2>/dev/null httpserv with PID 19095 found at Wed May 10 12:26:49 UTC 2017 httpserv with PID 19095 started at Wed May 10 12:26:49 UTC 2017 tstclnt -h localhost.localdomain -p 9218 -q -t 20 chains.sh: #6072: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122617 (0x1e67da79) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Wed May 10 12:26:17 2017 Not After : Tue May 10 12:26:17 2067 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9e:5d:0a:fd:74:a3:2b:52:73:55:19:5e:32:07:ce:22: c5:f8:dc:26:6d:ed:cd:45:59:7a:43:75:e2:17:d4:ce: 54:c3:ac:19:71:ff:af:1e:fd:7d:84:ea:22:cc:1a:62: d2:74:36:5e:ac:73:e7:0b:48:d3:14:a0:98:bb:e1:cc: fb:8d:b2:9d:de:2a:85:6e:98:61:c1:0e:6b:60:05:55: 5c:73:25:86:03:e6:70:0a:13:be:fa:84:d5:c0:af:d7: 11:96:27:d4:a3:9c:c8:b1:5b:18:62:50:75:65:b1:90: a9:a3:e7:f3:90:7c:7d:73:54:a1:cb:b3:b6:b0:88:9e: 89:fb:bc:a7:fa:78:2f:e0:64:7e:88:06:37:c8:cb:cb: 93:8c:9d:76:35:8b:c7:d1:4e:0e:09:44:06:1b:e0:0b: 4b:4c:71:11:5c:99:71:ab:88:54:da:83:50:2f:e4:a9: 3b:f6:60:7d:be:e2:28:d7:6b:68:75:28:ed:e9:34:77: 4a:03:e9:ce:c3:55:a8:a8:fc:3f:61:fd:3c:33:cb:3b: ab:44:b8:4e:63:0f:a0:41:ab:57:e1:25:58:dd:52:2b: 33:27:b9:8e:47:f4:56:85:f9:f1:f9:03:74:d2:0f:3b: 40:0f:11:03:ab:07:a6:9a:90:49:0c:f8:18:15:b5:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:27:42:96:38:be:81:84:4e:3a:d7:0d:f4:33:23:09: 50:76:f3:72:ac:62:04:a2:17:e4:b3:c2:2a:03:7d:32: c5:8e:8b:91:75:73:c0:af:c0:43:75:92:50:46:51:78: 83:c3:b8:c2:1d:7b:bd:3a:81:b4:5e:7d:02:c7:fc:47: 80:48:39:ff:7f:6c:6a:9f:08:eb:a0:d4:29:02:5e:c6: f8:e7:f4:27:3c:68:a8:bf:5f:26:b0:a1:fd:fe:45:be: 5a:8b:16:44:4f:2a:53:92:87:5a:4f:b9:18:09:27:0c: 4e:c8:a4:86:50:b6:ff:35:ff:82:74:d4:43:55:77:18: ca:75:65:af:a6:29:9f:68:a4:a6:f1:82:93:10:73:df: 35:3e:a0:0f:d4:73:c9:69:27:41:ce:d9:e4:c0:a1:f1: b8:3d:c6:1a:82:fd:9a:ab:27:4b:44:54:7c:85:cf:05: c5:27:a6:bc:00:f1:eb:0e:bf:04:1c:d3:17:0e:07:f7: 2f:fb:cb:dd:33:ad:d5:1e:2f:ac:ee:97:4e:c6:b8:38: 74:60:3e:64:47:f2:7b:4a:66:d8:39:86:79:3a:ce:c9: 36:e8:7d:b1:d9:80:0f:f4:2f:c3:e1:6a:cb:4c:90:54: 8b:56:30:d3:94:67:9c:4c:f0:99:d0:da:0a:ff:f9:55 Fingerprint (SHA-256): F7:84:FB:30:6A:A6:C9:4A:55:4F:AC:4E:04:62:82:97:1D:71:DB:FF:A0:44:F3:6E:F3:1D:4E:AC:F6:37:BD:85 Fingerprint (SHA1): 8B:05:56:F1:14:CF:54:E6:B2:80:D2:70:11:63:9B:ED:23:A7:E4:BF Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #6073: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #6074: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #6075: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 19095 at Wed May 10 12:26:50 UTC 2017 kill -USR1 19095 httpserv: normal termination httpserv -b -p 9218 2>/dev/null; httpserv with PID 19095 killed at Wed May 10 12:26:50 UTC 2017 httpserv starting at Wed May 10 12:26:50 UTC 2017 httpserv -D -p 9218 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/aiahttp/http_pid.1556 & trying to connect to httpserv at Wed May 10 12:26:50 UTC 2017 tstclnt -p 9218 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9218 (address=::1) tstclnt: exiting with return code 0 kill -0 19264 >/dev/null 2>/dev/null httpserv with PID 19264 found at Wed May 10 12:26:50 UTC 2017 httpserv with PID 19264 started at Wed May 10 12:26:50 UTC 2017 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #6076: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #6077: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #6078: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED tstclnt -h localhost.localdomain -p 9218 -q -t 20 chains.sh: #6079: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122617 (0x1e67da79) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Wed May 10 12:26:17 2017 Not After : Tue May 10 12:26:17 2067 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9e:5d:0a:fd:74:a3:2b:52:73:55:19:5e:32:07:ce:22: c5:f8:dc:26:6d:ed:cd:45:59:7a:43:75:e2:17:d4:ce: 54:c3:ac:19:71:ff:af:1e:fd:7d:84:ea:22:cc:1a:62: d2:74:36:5e:ac:73:e7:0b:48:d3:14:a0:98:bb:e1:cc: fb:8d:b2:9d:de:2a:85:6e:98:61:c1:0e:6b:60:05:55: 5c:73:25:86:03:e6:70:0a:13:be:fa:84:d5:c0:af:d7: 11:96:27:d4:a3:9c:c8:b1:5b:18:62:50:75:65:b1:90: a9:a3:e7:f3:90:7c:7d:73:54:a1:cb:b3:b6:b0:88:9e: 89:fb:bc:a7:fa:78:2f:e0:64:7e:88:06:37:c8:cb:cb: 93:8c:9d:76:35:8b:c7:d1:4e:0e:09:44:06:1b:e0:0b: 4b:4c:71:11:5c:99:71:ab:88:54:da:83:50:2f:e4:a9: 3b:f6:60:7d:be:e2:28:d7:6b:68:75:28:ed:e9:34:77: 4a:03:e9:ce:c3:55:a8:a8:fc:3f:61:fd:3c:33:cb:3b: ab:44:b8:4e:63:0f:a0:41:ab:57:e1:25:58:dd:52:2b: 33:27:b9:8e:47:f4:56:85:f9:f1:f9:03:74:d2:0f:3b: 40:0f:11:03:ab:07:a6:9a:90:49:0c:f8:18:15:b5:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:27:42:96:38:be:81:84:4e:3a:d7:0d:f4:33:23:09: 50:76:f3:72:ac:62:04:a2:17:e4:b3:c2:2a:03:7d:32: c5:8e:8b:91:75:73:c0:af:c0:43:75:92:50:46:51:78: 83:c3:b8:c2:1d:7b:bd:3a:81:b4:5e:7d:02:c7:fc:47: 80:48:39:ff:7f:6c:6a:9f:08:eb:a0:d4:29:02:5e:c6: f8:e7:f4:27:3c:68:a8:bf:5f:26:b0:a1:fd:fe:45:be: 5a:8b:16:44:4f:2a:53:92:87:5a:4f:b9:18:09:27:0c: 4e:c8:a4:86:50:b6:ff:35:ff:82:74:d4:43:55:77:18: ca:75:65:af:a6:29:9f:68:a4:a6:f1:82:93:10:73:df: 35:3e:a0:0f:d4:73:c9:69:27:41:ce:d9:e4:c0:a1:f1: b8:3d:c6:1a:82:fd:9a:ab:27:4b:44:54:7c:85:cf:05: c5:27:a6:bc:00:f1:eb:0e:bf:04:1c:d3:17:0e:07:f7: 2f:fb:cb:dd:33:ad:d5:1e:2f:ac:ee:97:4e:c6:b8:38: 74:60:3e:64:47:f2:7b:4a:66:d8:39:86:79:3a:ce:c9: 36:e8:7d:b1:d9:80:0f:f4:2f:c3:e1:6a:cb:4c:90:54: 8b:56:30:d3:94:67:9c:4c:f0:99:d0:da:0a:ff:f9:55 Fingerprint (SHA-256): F7:84:FB:30:6A:A6:C9:4A:55:4F:AC:4E:04:62:82:97:1D:71:DB:FF:A0:44:F3:6E:F3:1D:4E:AC:F6:37:BD:85 Fingerprint (SHA1): 8B:05:56:F1:14:CF:54:E6:B2:80:D2:70:11:63:9B:ED:23:A7:E4:BF Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #6080: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #6081: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #6082: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 19264 at Wed May 10 12:26:51 UTC 2017 kill -USR1 19264 httpserv: normal termination httpserv -b -p 9218 2>/dev/null; httpserv with PID 19264 killed at Wed May 10 12:26:51 UTC 2017 httpserv starting at Wed May 10 12:26:51 UTC 2017 httpserv -D -p 9218 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/aiahttp/http_pid.1556 & trying to connect to httpserv at Wed May 10 12:26:51 UTC 2017 tstclnt -p 9218 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9218 (address=::1) tstclnt: exiting with return code 0 kill -0 19511 >/dev/null 2>/dev/null httpserv with PID 19511 found at Wed May 10 12:26:51 UTC 2017 httpserv with PID 19511 started at Wed May 10 12:26:51 UTC 2017 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #6083: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #6084: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122618 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6085: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #6086: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #6087: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122619 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6088: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #6089: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #6090: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6091: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 510122620 -7 Bridge@Army < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6092: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6093: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 510122621 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6094: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6095: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #6096: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #6097: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6098: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 510122622 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6099: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6100: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #6101: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #6102: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #6103: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122619 (0x1e67da7b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:26:54 2017 Not After : Tue May 10 12:26:54 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:3e:d7:a2:b9:55:4b:5b:3b:a5:63:32:df:a7:07:e5: 93:2a:02:61:15:84:cb:39:a1:1e:83:44:f2:b5:ad:2d: 3a:f8:20:fd:39:90:99:5c:41:60:fd:af:1e:90:e8:26: 7d:95:71:1a:62:9e:c0:29:17:69:a8:b8:c7:aa:60:d2: 27:5e:65:ad:af:6a:67:41:d8:b2:61:aa:2f:0a:de:34: 27:a4:78:e9:c0:a3:e0:f0:6e:d7:77:e1:86:dd:18:42: d2:37:bd:bf:8c:8a:fe:c8:9d:f1:c6:b8:32:f6:5e:c0: aa:73:10:3f:28:55:89:f4:8d:f0:1a:eb:a3:fd:08:b3: 3a:6b:b4:e5:bf:a6:aa:3c:9d:e2:d4:78:56:78:0b:7a: f4:41:08:86:6e:18:1e:d8:3b:84:c6:1d:da:5a:bb:52: 50:6d:6f:97:7f:06:4f:16:0c:8b:e5:e4:43:0b:e4:7b: f6:c3:5f:98:c7:b8:4c:83:8e:0d:92:62:e9:5a:ea:2b: 2c:67:b7:e4:ca:bb:f9:2a:02:3e:56:9a:5e:8f:2b:e1: 09:b7:d9:03:60:21:6d:63:f3:eb:2f:06:63:a5:53:13: c7:18:54:8c:2a:34:ea:e7:53:0d:ae:ef:ca:23:a6:ff: 32:96:3f:32:71:0e:f0:62:51:a6:7e:b2:bf:ed:59:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:cb:9a:a1:ef:78:d1:cb:2c:54:50:6f:ed:0d:f1:20: 72:6b:4e:a6:cc:1e:e1:8b:df:4c:37:04:ad:2e:ce:71: 04:da:72:b6:0d:e8:58:e7:41:40:8b:49:20:16:4c:00: 1e:cd:23:42:fd:7a:ac:b8:22:e7:bd:bb:71:02:f9:5d: c2:24:a1:d6:25:dd:7d:70:05:69:c1:d4:55:be:7b:1c: a8:de:b5:70:cc:2f:f5:1b:dc:a4:c1:8d:c0:8c:b3:7d: 3e:aa:d0:5c:4f:f2:58:d6:7d:53:60:c5:b9:e4:5e:10: db:1a:dc:47:7e:14:2c:57:d4:e1:d0:9b:e4:34:6b:6a: aa:1b:bc:fa:21:07:41:5b:e3:c5:e7:a9:98:af:fb:5c: bf:56:d1:f9:9b:7d:42:be:bd:42:ef:ec:73:cf:3d:4e: e4:36:47:33:46:8b:b3:c1:bf:3e:7c:b1:54:36:14:89: c9:9e:53:c2:7d:d7:31:ca:4b:66:34:bf:d3:27:bd:a3: 3f:2f:40:00:21:7c:82:2a:89:f3:a3:5e:18:a4:0d:30: 65:0b:94:db:f8:9c:dc:0f:a6:e4:fb:10:75:52:e6:88: 17:6c:31:a1:f0:f7:1b:f5:2c:95:c1:fa:73:e4:cd:2c: 87:78:a4:42:4a:00:91:40:39:d7:3d:a4:0c:87:ee:f6 Fingerprint (SHA-256): 5F:0B:7D:E3:DE:06:E6:7A:C2:A1:66:F2:6B:B1:F3:CA:1E:9C:16:33:3E:55:CE:EC:6A:71:C8:72:A6:5E:35:65 Fingerprint (SHA1): D1:94:10:14:7E:C3:4B:21:57:70:52:66:B5:64:1F:D0:3D:C7:39:56 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #6104: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122618 (0x1e67da7a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 12:26:52 2017 Not After : Tue May 10 12:26:52 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:ed:45:6c:61:16:f4:1b:86:63:43:e1:68:a0:04:d4: 83:90:55:e6:08:c5:32:11:f9:90:d2:75:fd:77:8e:90: 20:41:c4:bb:11:e3:55:5a:c5:fa:00:ec:a5:d4:66:24: 06:7a:5e:c4:be:52:ad:fc:f8:06:99:f2:a2:1c:8f:98: 4d:31:05:33:5a:cc:5f:d0:52:bc:33:84:a0:6f:02:6e: f2:99:18:9b:d9:13:b5:c5:cd:2a:76:e0:29:65:d6:28: dd:cb:ad:81:62:d4:6a:b9:72:42:53:9c:e3:3a:ff:ce: dd:16:6f:f0:f5:8e:2a:c6:7f:7c:6a:6a:b6:85:e2:c3: 94:2f:c7:a5:05:78:05:8f:53:4d:09:9a:41:60:76:33: 08:e7:4d:23:41:1b:bf:db:30:7d:70:ba:7f:b3:9a:57: d1:27:b8:ba:01:5c:98:80:67:f1:92:dc:da:c8:47:2c: 36:f1:1b:ee:b6:41:bc:4f:3a:fa:81:26:06:57:98:ee: 80:39:a4:bb:b2:b5:6f:ac:2d:d4:f8:db:3e:0b:e2:8f: 74:3c:76:87:40:ae:c4:88:fa:14:ef:44:6b:a3:ed:f2: 54:c2:2c:9b:6a:1b:82:ae:c3:da:03:46:b9:dc:43:14: 07:a1:9b:c5:c7:9e:4a:ba:15:b0:97:a9:04:ec:ae:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:aa:0b:a2:02:29:1f:46:8a:b4:8c:92:20:12:5a:66: db:38:4d:ae:8c:bd:fa:8d:4e:8c:c1:c8:65:92:93:3e: 20:4c:d8:23:b1:2c:7a:48:8a:18:d6:d3:d8:44:78:c4: e7:89:d7:c1:db:18:43:2a:4a:b4:2a:45:31:95:d9:0f: d7:8b:08:49:d1:1a:15:6e:e6:bf:4c:de:ed:c6:02:bd: 60:1b:5a:ab:d1:72:81:65:9b:65:bc:02:44:9e:8e:3d: 65:7a:9e:d3:19:92:69:68:35:38:1b:55:67:9e:14:67: 3c:10:e9:4e:c0:1c:b9:de:fc:0d:41:49:95:e3:10:ae: e9:c1:e9:a6:a9:71:32:a1:16:68:9c:71:c5:3c:62:ac: f4:2c:80:a8:02:ce:7a:17:93:4a:62:0f:f6:b8:4a:d9: d6:79:48:b8:cf:fe:8f:37:8a:b7:90:4c:47:f4:c0:f4: 4b:05:36:34:6b:a7:4a:8a:59:2a:28:76:31:4e:b2:b1: d0:71:a4:98:a5:dc:90:fc:58:44:ad:4f:52:5a:5a:2d: 44:f3:9a:ef:4b:72:9c:db:bc:9f:15:11:11:b0:c8:a2: 9e:a8:b5:4e:ee:ea:ed:8c:5c:c0:07:f5:86:b6:b1:e3: 7c:84:1c:5f:ea:c0:85:d2:1e:12:66:22:b2:cc:cc:34 Fingerprint (SHA-256): C0:0D:2B:02:EC:33:9D:B4:D6:59:32:14:70:3C:BB:A1:91:65:80:30:DE:26:BC:32:54:04:E6:1D:05:5F:2F:91 Fingerprint (SHA1): 0B:80:DD:3F:82:28:72:57:F6:4C:F8:9C:06:1F:8D:5C:C3:3C:98:EB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #6105: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #6106: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #6107: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #6108: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122618 (0x1e67da7a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 12:26:52 2017 Not After : Tue May 10 12:26:52 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:ed:45:6c:61:16:f4:1b:86:63:43:e1:68:a0:04:d4: 83:90:55:e6:08:c5:32:11:f9:90:d2:75:fd:77:8e:90: 20:41:c4:bb:11:e3:55:5a:c5:fa:00:ec:a5:d4:66:24: 06:7a:5e:c4:be:52:ad:fc:f8:06:99:f2:a2:1c:8f:98: 4d:31:05:33:5a:cc:5f:d0:52:bc:33:84:a0:6f:02:6e: f2:99:18:9b:d9:13:b5:c5:cd:2a:76:e0:29:65:d6:28: dd:cb:ad:81:62:d4:6a:b9:72:42:53:9c:e3:3a:ff:ce: dd:16:6f:f0:f5:8e:2a:c6:7f:7c:6a:6a:b6:85:e2:c3: 94:2f:c7:a5:05:78:05:8f:53:4d:09:9a:41:60:76:33: 08:e7:4d:23:41:1b:bf:db:30:7d:70:ba:7f:b3:9a:57: d1:27:b8:ba:01:5c:98:80:67:f1:92:dc:da:c8:47:2c: 36:f1:1b:ee:b6:41:bc:4f:3a:fa:81:26:06:57:98:ee: 80:39:a4:bb:b2:b5:6f:ac:2d:d4:f8:db:3e:0b:e2:8f: 74:3c:76:87:40:ae:c4:88:fa:14:ef:44:6b:a3:ed:f2: 54:c2:2c:9b:6a:1b:82:ae:c3:da:03:46:b9:dc:43:14: 07:a1:9b:c5:c7:9e:4a:ba:15:b0:97:a9:04:ec:ae:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:aa:0b:a2:02:29:1f:46:8a:b4:8c:92:20:12:5a:66: db:38:4d:ae:8c:bd:fa:8d:4e:8c:c1:c8:65:92:93:3e: 20:4c:d8:23:b1:2c:7a:48:8a:18:d6:d3:d8:44:78:c4: e7:89:d7:c1:db:18:43:2a:4a:b4:2a:45:31:95:d9:0f: d7:8b:08:49:d1:1a:15:6e:e6:bf:4c:de:ed:c6:02:bd: 60:1b:5a:ab:d1:72:81:65:9b:65:bc:02:44:9e:8e:3d: 65:7a:9e:d3:19:92:69:68:35:38:1b:55:67:9e:14:67: 3c:10:e9:4e:c0:1c:b9:de:fc:0d:41:49:95:e3:10:ae: e9:c1:e9:a6:a9:71:32:a1:16:68:9c:71:c5:3c:62:ac: f4:2c:80:a8:02:ce:7a:17:93:4a:62:0f:f6:b8:4a:d9: d6:79:48:b8:cf:fe:8f:37:8a:b7:90:4c:47:f4:c0:f4: 4b:05:36:34:6b:a7:4a:8a:59:2a:28:76:31:4e:b2:b1: d0:71:a4:98:a5:dc:90:fc:58:44:ad:4f:52:5a:5a:2d: 44:f3:9a:ef:4b:72:9c:db:bc:9f:15:11:11:b0:c8:a2: 9e:a8:b5:4e:ee:ea:ed:8c:5c:c0:07:f5:86:b6:b1:e3: 7c:84:1c:5f:ea:c0:85:d2:1e:12:66:22:b2:cc:cc:34 Fingerprint (SHA-256): C0:0D:2B:02:EC:33:9D:B4:D6:59:32:14:70:3C:BB:A1:91:65:80:30:DE:26:BC:32:54:04:E6:1D:05:5F:2F:91 Fingerprint (SHA1): 0B:80:DD:3F:82:28:72:57:F6:4C:F8:9C:06:1F:8D:5C:C3:3C:98:EB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #6109: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122619 (0x1e67da7b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:26:54 2017 Not After : Tue May 10 12:26:54 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:3e:d7:a2:b9:55:4b:5b:3b:a5:63:32:df:a7:07:e5: 93:2a:02:61:15:84:cb:39:a1:1e:83:44:f2:b5:ad:2d: 3a:f8:20:fd:39:90:99:5c:41:60:fd:af:1e:90:e8:26: 7d:95:71:1a:62:9e:c0:29:17:69:a8:b8:c7:aa:60:d2: 27:5e:65:ad:af:6a:67:41:d8:b2:61:aa:2f:0a:de:34: 27:a4:78:e9:c0:a3:e0:f0:6e:d7:77:e1:86:dd:18:42: d2:37:bd:bf:8c:8a:fe:c8:9d:f1:c6:b8:32:f6:5e:c0: aa:73:10:3f:28:55:89:f4:8d:f0:1a:eb:a3:fd:08:b3: 3a:6b:b4:e5:bf:a6:aa:3c:9d:e2:d4:78:56:78:0b:7a: f4:41:08:86:6e:18:1e:d8:3b:84:c6:1d:da:5a:bb:52: 50:6d:6f:97:7f:06:4f:16:0c:8b:e5:e4:43:0b:e4:7b: f6:c3:5f:98:c7:b8:4c:83:8e:0d:92:62:e9:5a:ea:2b: 2c:67:b7:e4:ca:bb:f9:2a:02:3e:56:9a:5e:8f:2b:e1: 09:b7:d9:03:60:21:6d:63:f3:eb:2f:06:63:a5:53:13: c7:18:54:8c:2a:34:ea:e7:53:0d:ae:ef:ca:23:a6:ff: 32:96:3f:32:71:0e:f0:62:51:a6:7e:b2:bf:ed:59:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:cb:9a:a1:ef:78:d1:cb:2c:54:50:6f:ed:0d:f1:20: 72:6b:4e:a6:cc:1e:e1:8b:df:4c:37:04:ad:2e:ce:71: 04:da:72:b6:0d:e8:58:e7:41:40:8b:49:20:16:4c:00: 1e:cd:23:42:fd:7a:ac:b8:22:e7:bd:bb:71:02:f9:5d: c2:24:a1:d6:25:dd:7d:70:05:69:c1:d4:55:be:7b:1c: a8:de:b5:70:cc:2f:f5:1b:dc:a4:c1:8d:c0:8c:b3:7d: 3e:aa:d0:5c:4f:f2:58:d6:7d:53:60:c5:b9:e4:5e:10: db:1a:dc:47:7e:14:2c:57:d4:e1:d0:9b:e4:34:6b:6a: aa:1b:bc:fa:21:07:41:5b:e3:c5:e7:a9:98:af:fb:5c: bf:56:d1:f9:9b:7d:42:be:bd:42:ef:ec:73:cf:3d:4e: e4:36:47:33:46:8b:b3:c1:bf:3e:7c:b1:54:36:14:89: c9:9e:53:c2:7d:d7:31:ca:4b:66:34:bf:d3:27:bd:a3: 3f:2f:40:00:21:7c:82:2a:89:f3:a3:5e:18:a4:0d:30: 65:0b:94:db:f8:9c:dc:0f:a6:e4:fb:10:75:52:e6:88: 17:6c:31:a1:f0:f7:1b:f5:2c:95:c1:fa:73:e4:cd:2c: 87:78:a4:42:4a:00:91:40:39:d7:3d:a4:0c:87:ee:f6 Fingerprint (SHA-256): 5F:0B:7D:E3:DE:06:E6:7A:C2:A1:66:F2:6B:B1:F3:CA:1E:9C:16:33:3E:55:CE:EC:6A:71:C8:72:A6:5E:35:65 Fingerprint (SHA1): D1:94:10:14:7E:C3:4B:21:57:70:52:66:B5:64:1F:D0:3D:C7:39:56 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #6110: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #6111: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #6112: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #6113: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #6114: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #6115: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122619 (0x1e67da7b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:26:54 2017 Not After : Tue May 10 12:26:54 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:3e:d7:a2:b9:55:4b:5b:3b:a5:63:32:df:a7:07:e5: 93:2a:02:61:15:84:cb:39:a1:1e:83:44:f2:b5:ad:2d: 3a:f8:20:fd:39:90:99:5c:41:60:fd:af:1e:90:e8:26: 7d:95:71:1a:62:9e:c0:29:17:69:a8:b8:c7:aa:60:d2: 27:5e:65:ad:af:6a:67:41:d8:b2:61:aa:2f:0a:de:34: 27:a4:78:e9:c0:a3:e0:f0:6e:d7:77:e1:86:dd:18:42: d2:37:bd:bf:8c:8a:fe:c8:9d:f1:c6:b8:32:f6:5e:c0: aa:73:10:3f:28:55:89:f4:8d:f0:1a:eb:a3:fd:08:b3: 3a:6b:b4:e5:bf:a6:aa:3c:9d:e2:d4:78:56:78:0b:7a: f4:41:08:86:6e:18:1e:d8:3b:84:c6:1d:da:5a:bb:52: 50:6d:6f:97:7f:06:4f:16:0c:8b:e5:e4:43:0b:e4:7b: f6:c3:5f:98:c7:b8:4c:83:8e:0d:92:62:e9:5a:ea:2b: 2c:67:b7:e4:ca:bb:f9:2a:02:3e:56:9a:5e:8f:2b:e1: 09:b7:d9:03:60:21:6d:63:f3:eb:2f:06:63:a5:53:13: c7:18:54:8c:2a:34:ea:e7:53:0d:ae:ef:ca:23:a6:ff: 32:96:3f:32:71:0e:f0:62:51:a6:7e:b2:bf:ed:59:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:cb:9a:a1:ef:78:d1:cb:2c:54:50:6f:ed:0d:f1:20: 72:6b:4e:a6:cc:1e:e1:8b:df:4c:37:04:ad:2e:ce:71: 04:da:72:b6:0d:e8:58:e7:41:40:8b:49:20:16:4c:00: 1e:cd:23:42:fd:7a:ac:b8:22:e7:bd:bb:71:02:f9:5d: c2:24:a1:d6:25:dd:7d:70:05:69:c1:d4:55:be:7b:1c: a8:de:b5:70:cc:2f:f5:1b:dc:a4:c1:8d:c0:8c:b3:7d: 3e:aa:d0:5c:4f:f2:58:d6:7d:53:60:c5:b9:e4:5e:10: db:1a:dc:47:7e:14:2c:57:d4:e1:d0:9b:e4:34:6b:6a: aa:1b:bc:fa:21:07:41:5b:e3:c5:e7:a9:98:af:fb:5c: bf:56:d1:f9:9b:7d:42:be:bd:42:ef:ec:73:cf:3d:4e: e4:36:47:33:46:8b:b3:c1:bf:3e:7c:b1:54:36:14:89: c9:9e:53:c2:7d:d7:31:ca:4b:66:34:bf:d3:27:bd:a3: 3f:2f:40:00:21:7c:82:2a:89:f3:a3:5e:18:a4:0d:30: 65:0b:94:db:f8:9c:dc:0f:a6:e4:fb:10:75:52:e6:88: 17:6c:31:a1:f0:f7:1b:f5:2c:95:c1:fa:73:e4:cd:2c: 87:78:a4:42:4a:00:91:40:39:d7:3d:a4:0c:87:ee:f6 Fingerprint (SHA-256): 5F:0B:7D:E3:DE:06:E6:7A:C2:A1:66:F2:6B:B1:F3:CA:1E:9C:16:33:3E:55:CE:EC:6A:71:C8:72:A6:5E:35:65 Fingerprint (SHA1): D1:94:10:14:7E:C3:4B:21:57:70:52:66:B5:64:1F:D0:3D:C7:39:56 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #6116: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122619 (0x1e67da7b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:26:54 2017 Not After : Tue May 10 12:26:54 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:3e:d7:a2:b9:55:4b:5b:3b:a5:63:32:df:a7:07:e5: 93:2a:02:61:15:84:cb:39:a1:1e:83:44:f2:b5:ad:2d: 3a:f8:20:fd:39:90:99:5c:41:60:fd:af:1e:90:e8:26: 7d:95:71:1a:62:9e:c0:29:17:69:a8:b8:c7:aa:60:d2: 27:5e:65:ad:af:6a:67:41:d8:b2:61:aa:2f:0a:de:34: 27:a4:78:e9:c0:a3:e0:f0:6e:d7:77:e1:86:dd:18:42: d2:37:bd:bf:8c:8a:fe:c8:9d:f1:c6:b8:32:f6:5e:c0: aa:73:10:3f:28:55:89:f4:8d:f0:1a:eb:a3:fd:08:b3: 3a:6b:b4:e5:bf:a6:aa:3c:9d:e2:d4:78:56:78:0b:7a: f4:41:08:86:6e:18:1e:d8:3b:84:c6:1d:da:5a:bb:52: 50:6d:6f:97:7f:06:4f:16:0c:8b:e5:e4:43:0b:e4:7b: f6:c3:5f:98:c7:b8:4c:83:8e:0d:92:62:e9:5a:ea:2b: 2c:67:b7:e4:ca:bb:f9:2a:02:3e:56:9a:5e:8f:2b:e1: 09:b7:d9:03:60:21:6d:63:f3:eb:2f:06:63:a5:53:13: c7:18:54:8c:2a:34:ea:e7:53:0d:ae:ef:ca:23:a6:ff: 32:96:3f:32:71:0e:f0:62:51:a6:7e:b2:bf:ed:59:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:cb:9a:a1:ef:78:d1:cb:2c:54:50:6f:ed:0d:f1:20: 72:6b:4e:a6:cc:1e:e1:8b:df:4c:37:04:ad:2e:ce:71: 04:da:72:b6:0d:e8:58:e7:41:40:8b:49:20:16:4c:00: 1e:cd:23:42:fd:7a:ac:b8:22:e7:bd:bb:71:02:f9:5d: c2:24:a1:d6:25:dd:7d:70:05:69:c1:d4:55:be:7b:1c: a8:de:b5:70:cc:2f:f5:1b:dc:a4:c1:8d:c0:8c:b3:7d: 3e:aa:d0:5c:4f:f2:58:d6:7d:53:60:c5:b9:e4:5e:10: db:1a:dc:47:7e:14:2c:57:d4:e1:d0:9b:e4:34:6b:6a: aa:1b:bc:fa:21:07:41:5b:e3:c5:e7:a9:98:af:fb:5c: bf:56:d1:f9:9b:7d:42:be:bd:42:ef:ec:73:cf:3d:4e: e4:36:47:33:46:8b:b3:c1:bf:3e:7c:b1:54:36:14:89: c9:9e:53:c2:7d:d7:31:ca:4b:66:34:bf:d3:27:bd:a3: 3f:2f:40:00:21:7c:82:2a:89:f3:a3:5e:18:a4:0d:30: 65:0b:94:db:f8:9c:dc:0f:a6:e4:fb:10:75:52:e6:88: 17:6c:31:a1:f0:f7:1b:f5:2c:95:c1:fa:73:e4:cd:2c: 87:78:a4:42:4a:00:91:40:39:d7:3d:a4:0c:87:ee:f6 Fingerprint (SHA-256): 5F:0B:7D:E3:DE:06:E6:7A:C2:A1:66:F2:6B:B1:F3:CA:1E:9C:16:33:3E:55:CE:EC:6A:71:C8:72:A6:5E:35:65 Fingerprint (SHA1): D1:94:10:14:7E:C3:4B:21:57:70:52:66:B5:64:1F:D0:3D:C7:39:56 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #6117: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #6118: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #6119: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #6120: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #6121: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #6122: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122618 (0x1e67da7a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 12:26:52 2017 Not After : Tue May 10 12:26:52 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:ed:45:6c:61:16:f4:1b:86:63:43:e1:68:a0:04:d4: 83:90:55:e6:08:c5:32:11:f9:90:d2:75:fd:77:8e:90: 20:41:c4:bb:11:e3:55:5a:c5:fa:00:ec:a5:d4:66:24: 06:7a:5e:c4:be:52:ad:fc:f8:06:99:f2:a2:1c:8f:98: 4d:31:05:33:5a:cc:5f:d0:52:bc:33:84:a0:6f:02:6e: f2:99:18:9b:d9:13:b5:c5:cd:2a:76:e0:29:65:d6:28: dd:cb:ad:81:62:d4:6a:b9:72:42:53:9c:e3:3a:ff:ce: dd:16:6f:f0:f5:8e:2a:c6:7f:7c:6a:6a:b6:85:e2:c3: 94:2f:c7:a5:05:78:05:8f:53:4d:09:9a:41:60:76:33: 08:e7:4d:23:41:1b:bf:db:30:7d:70:ba:7f:b3:9a:57: d1:27:b8:ba:01:5c:98:80:67:f1:92:dc:da:c8:47:2c: 36:f1:1b:ee:b6:41:bc:4f:3a:fa:81:26:06:57:98:ee: 80:39:a4:bb:b2:b5:6f:ac:2d:d4:f8:db:3e:0b:e2:8f: 74:3c:76:87:40:ae:c4:88:fa:14:ef:44:6b:a3:ed:f2: 54:c2:2c:9b:6a:1b:82:ae:c3:da:03:46:b9:dc:43:14: 07:a1:9b:c5:c7:9e:4a:ba:15:b0:97:a9:04:ec:ae:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:aa:0b:a2:02:29:1f:46:8a:b4:8c:92:20:12:5a:66: db:38:4d:ae:8c:bd:fa:8d:4e:8c:c1:c8:65:92:93:3e: 20:4c:d8:23:b1:2c:7a:48:8a:18:d6:d3:d8:44:78:c4: e7:89:d7:c1:db:18:43:2a:4a:b4:2a:45:31:95:d9:0f: d7:8b:08:49:d1:1a:15:6e:e6:bf:4c:de:ed:c6:02:bd: 60:1b:5a:ab:d1:72:81:65:9b:65:bc:02:44:9e:8e:3d: 65:7a:9e:d3:19:92:69:68:35:38:1b:55:67:9e:14:67: 3c:10:e9:4e:c0:1c:b9:de:fc:0d:41:49:95:e3:10:ae: e9:c1:e9:a6:a9:71:32:a1:16:68:9c:71:c5:3c:62:ac: f4:2c:80:a8:02:ce:7a:17:93:4a:62:0f:f6:b8:4a:d9: d6:79:48:b8:cf:fe:8f:37:8a:b7:90:4c:47:f4:c0:f4: 4b:05:36:34:6b:a7:4a:8a:59:2a:28:76:31:4e:b2:b1: d0:71:a4:98:a5:dc:90:fc:58:44:ad:4f:52:5a:5a:2d: 44:f3:9a:ef:4b:72:9c:db:bc:9f:15:11:11:b0:c8:a2: 9e:a8:b5:4e:ee:ea:ed:8c:5c:c0:07:f5:86:b6:b1:e3: 7c:84:1c:5f:ea:c0:85:d2:1e:12:66:22:b2:cc:cc:34 Fingerprint (SHA-256): C0:0D:2B:02:EC:33:9D:B4:D6:59:32:14:70:3C:BB:A1:91:65:80:30:DE:26:BC:32:54:04:E6:1D:05:5F:2F:91 Fingerprint (SHA1): 0B:80:DD:3F:82:28:72:57:F6:4C:F8:9C:06:1F:8D:5C:C3:3C:98:EB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #6123: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122618 (0x1e67da7a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 12:26:52 2017 Not After : Tue May 10 12:26:52 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:ed:45:6c:61:16:f4:1b:86:63:43:e1:68:a0:04:d4: 83:90:55:e6:08:c5:32:11:f9:90:d2:75:fd:77:8e:90: 20:41:c4:bb:11:e3:55:5a:c5:fa:00:ec:a5:d4:66:24: 06:7a:5e:c4:be:52:ad:fc:f8:06:99:f2:a2:1c:8f:98: 4d:31:05:33:5a:cc:5f:d0:52:bc:33:84:a0:6f:02:6e: f2:99:18:9b:d9:13:b5:c5:cd:2a:76:e0:29:65:d6:28: dd:cb:ad:81:62:d4:6a:b9:72:42:53:9c:e3:3a:ff:ce: dd:16:6f:f0:f5:8e:2a:c6:7f:7c:6a:6a:b6:85:e2:c3: 94:2f:c7:a5:05:78:05:8f:53:4d:09:9a:41:60:76:33: 08:e7:4d:23:41:1b:bf:db:30:7d:70:ba:7f:b3:9a:57: d1:27:b8:ba:01:5c:98:80:67:f1:92:dc:da:c8:47:2c: 36:f1:1b:ee:b6:41:bc:4f:3a:fa:81:26:06:57:98:ee: 80:39:a4:bb:b2:b5:6f:ac:2d:d4:f8:db:3e:0b:e2:8f: 74:3c:76:87:40:ae:c4:88:fa:14:ef:44:6b:a3:ed:f2: 54:c2:2c:9b:6a:1b:82:ae:c3:da:03:46:b9:dc:43:14: 07:a1:9b:c5:c7:9e:4a:ba:15:b0:97:a9:04:ec:ae:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:aa:0b:a2:02:29:1f:46:8a:b4:8c:92:20:12:5a:66: db:38:4d:ae:8c:bd:fa:8d:4e:8c:c1:c8:65:92:93:3e: 20:4c:d8:23:b1:2c:7a:48:8a:18:d6:d3:d8:44:78:c4: e7:89:d7:c1:db:18:43:2a:4a:b4:2a:45:31:95:d9:0f: d7:8b:08:49:d1:1a:15:6e:e6:bf:4c:de:ed:c6:02:bd: 60:1b:5a:ab:d1:72:81:65:9b:65:bc:02:44:9e:8e:3d: 65:7a:9e:d3:19:92:69:68:35:38:1b:55:67:9e:14:67: 3c:10:e9:4e:c0:1c:b9:de:fc:0d:41:49:95:e3:10:ae: e9:c1:e9:a6:a9:71:32:a1:16:68:9c:71:c5:3c:62:ac: f4:2c:80:a8:02:ce:7a:17:93:4a:62:0f:f6:b8:4a:d9: d6:79:48:b8:cf:fe:8f:37:8a:b7:90:4c:47:f4:c0:f4: 4b:05:36:34:6b:a7:4a:8a:59:2a:28:76:31:4e:b2:b1: d0:71:a4:98:a5:dc:90:fc:58:44:ad:4f:52:5a:5a:2d: 44:f3:9a:ef:4b:72:9c:db:bc:9f:15:11:11:b0:c8:a2: 9e:a8:b5:4e:ee:ea:ed:8c:5c:c0:07:f5:86:b6:b1:e3: 7c:84:1c:5f:ea:c0:85:d2:1e:12:66:22:b2:cc:cc:34 Fingerprint (SHA-256): C0:0D:2B:02:EC:33:9D:B4:D6:59:32:14:70:3C:BB:A1:91:65:80:30:DE:26:BC:32:54:04:E6:1D:05:5F:2F:91 Fingerprint (SHA1): 0B:80:DD:3F:82:28:72:57:F6:4C:F8:9C:06:1F:8D:5C:C3:3C:98:EB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #6124: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #6125: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122623 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6126: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #6127: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #6128: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122624 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6129: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #6130: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #6131: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122625 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6132: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #6133: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #6134: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122626 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6135: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #6136: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #6137: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122627 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6138: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #6139: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #6140: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122628 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6141: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #6142: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #6143: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122629 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6144: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #6145: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #6146: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122630 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6147: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #6148: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #6149: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122631 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6150: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #6151: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #6152: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6153: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 510122632 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6154: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6155: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 510122633 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6156: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6157: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 510122634 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6158: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6159: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #6160: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #6161: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6162: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 510122635 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6163: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6164: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 510122636 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6165: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6166: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 510122637 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6167: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6168: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #6169: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #6170: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6171: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 510122638 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6172: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6173: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 510122639 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6174: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6175: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 510122640 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6176: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6177: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #6178: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #6179: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6180: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 510122641 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6181: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6182: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 510122642 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6183: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6184: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 510122643 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6185: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6186: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #6187: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #6188: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6189: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 510122644 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6190: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6191: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #6192: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6193: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510122645 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6194: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6195: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122623 (0x1e67da7f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Wed May 10 12:27:02 2017 Not After : Tue May 10 12:27:02 2067 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:8c:69:b3:ba:70:da:ce:89:77:45:d5:cd:67:ce:cf: 26:05:6c:be:77:aa:4f:42:fe:1d:37:d9:60:ee:3d:5a: 4b:f7:e2:9f:a7:e7:ca:8f:88:4e:c2:0c:0d:fd:f3:87: 9a:a3:8c:bc:37:73:e8:0d:8d:be:3c:40:bc:b1:0c:24: 3a:da:c3:b4:3a:2c:fc:aa:2a:60:4b:80:ae:24:40:87: d3:8f:f0:42:2a:ed:9e:ed:48:a2:f0:eb:04:73:c4:17: fe:52:d9:2f:25:5d:dd:7d:29:43:cb:3c:0a:62:d6:91: 63:bb:cc:5c:f8:ed:9f:17:f6:57:19:e5:b9:d8:10:43: ec:69:a2:e8:ee:e6:e2:c9:d4:6f:14:97:ac:ed:dd:07: 7e:60:7e:c5:2f:11:8f:f3:20:68:01:7e:72:1c:23:6a: 4a:41:44:d4:12:ba:05:68:c7:96:9f:77:70:36:92:bf: 8d:65:4f:97:fd:4f:07:4d:2c:4a:de:cf:24:8d:f4:e7: 18:0b:0f:f5:63:09:25:06:58:76:04:70:25:e3:64:71: e0:69:33:7e:b1:cc:be:14:c5:c7:74:c6:ab:fd:58:e0: 36:19:33:df:89:94:ab:d0:ef:2e:4b:2a:17:cc:ca:96: f2:bf:17:6e:bc:89:30:a1:a6:2e:ac:14:79:00:f7:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:30:55:91:5a:57:82:cb:33:e6:bc:bc:4c:5d:5b:35: 53:d4:a6:9b:9c:8c:45:f6:47:ba:9b:02:4b:0d:89:b7: 43:f0:0d:c1:b1:64:9a:50:7d:c4:61:12:50:ed:bb:31: e0:22:7c:05:f6:38:54:d9:cb:81:4d:6d:e3:39:e3:d2: 96:b5:03:02:eb:4e:63:bf:47:5b:fe:d3:ba:c4:51:e9: 14:23:08:81:ec:ac:e1:d9:06:1a:3d:3e:f9:e5:6b:a2: aa:a6:12:68:6d:95:c2:ac:5d:a6:07:61:8d:3d:c5:f2: 6b:5b:77:e5:56:af:f1:28:d9:4e:76:69:6f:c7:6f:45: 9b:6d:6d:d9:0e:09:65:5b:f5:fc:ce:db:89:a5:70:5a: b0:f8:ae:c3:06:9b:e1:de:57:2b:74:45:e4:33:53:4c: 87:fe:b2:4a:9e:50:4d:f6:38:89:b1:8e:75:c3:68:ec: 39:b6:7d:9d:b2:a0:39:54:97:03:7f:95:c6:01:a4:b9: cf:49:e4:bd:34:88:60:8a:40:4d:ff:90:a5:41:a0:4b: 0a:d4:30:ca:09:01:3c:23:99:1f:55:b3:91:57:d2:1f: df:32:3e:e0:70:5b:a5:df:41:56:83:42:75:db:69:12: 3c:a6:81:55:68:54:08:9e:9f:e3:4d:49:7b:f9:02:06 Fingerprint (SHA-256): 29:02:C2:65:47:3D:99:4C:EB:2D:97:C3:89:1D:C6:98:92:88:18:81:00:E3:A8:E7:AD:1D:95:DB:99:F5:35:FF Fingerprint (SHA1): 78:BA:3F:16:97:86:B4:F1:C5:28:23:09:5D:60:E9:C2:5C:8E:2C:55 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #6196: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122624 (0x1e67da80) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Wed May 10 12:27:03 2017 Not After : Tue May 10 12:27:03 2067 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:88:36:59:1e:c4:29:39:29:91:4a:44:1b:be:70:40: 8f:70:c5:3d:bf:38:3a:85:60:a4:22:33:d1:37:71:7f: 7f:38:db:ad:3a:83:3e:23:30:ce:0c:aa:87:84:6a:fe: 5d:ca:c4:51:01:84:fe:bf:8f:15:4f:60:35:12:25:ac: fd:b5:25:ec:53:41:02:14:58:36:36:de:2b:bb:e4:3d: bc:3a:8b:55:91:41:79:2e:ef:26:3c:e4:7d:02:54:a1: 19:73:83:bc:b8:48:c0:46:29:5d:dc:d7:fd:79:a4:be: 0a:f9:8e:c4:ca:ae:69:05:63:ee:f1:5a:76:f0:72:e0: 34:93:dc:23:ae:31:8e:32:5e:16:4d:6e:5e:38:80:5b: 42:00:b2:c8:eb:35:5f:bc:d7:04:77:e7:7e:4a:f4:8d: 68:fb:c0:68:81:7e:c4:dc:16:c2:77:28:7f:86:10:9a: b9:20:9a:18:35:ec:77:3e:29:14:24:bb:4e:98:73:b4: e8:f3:d1:d7:68:94:41:6f:1e:fb:d8:7a:47:8b:92:f2: c3:b7:dc:0e:32:af:76:7a:f4:bf:c3:45:0f:0a:f5:53: 72:43:b6:24:68:62:83:3b:47:ee:c8:ed:99:e9:f6:af: 80:cc:1d:3e:c4:9a:42:b2:27:17:5e:c8:d7:80:91:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e2:02:e2:56:c1:78:0f:1f:c4:19:08:24:e7:88:93:0d: cb:d1:0c:7a:2e:00:2a:b5:20:95:22:81:26:7d:e0:72: 2a:2c:2d:e4:63:3d:48:47:c3:57:f7:a4:63:92:10:4b: c7:ec:a7:c9:a3:6b:fe:b2:b3:22:11:4a:22:da:56:90: 71:dc:cd:de:2a:cc:53:22:e9:57:09:24:34:24:c9:d1: e1:98:68:89:16:4f:e3:ef:e3:42:34:a0:9d:05:1a:49: 20:7f:f0:69:1d:5a:c2:72:58:ba:e9:a0:58:6e:4b:5d: 37:09:6e:61:9d:03:ac:4f:06:e0:87:45:53:a4:6a:f2: 4a:02:bb:67:fc:ae:73:e1:b2:f2:1c:e9:ed:7d:49:2a: 0d:86:0a:6d:29:12:77:c5:6d:97:7c:03:36:dd:95:84: 36:18:4d:2e:27:98:1a:fa:06:ef:6d:04:ce:ef:b1:3d: 4f:32:ff:fd:35:ef:ba:75:0a:8f:70:fd:be:68:41:71: f8:c8:d4:79:a0:02:aa:87:16:a3:71:14:4f:0e:7a:ca: ed:43:c0:6d:14:3f:88:89:5e:3d:ae:43:f4:76:9a:7d: 68:5d:9b:f4:51:64:f2:6c:a9:88:f0:3e:db:17:77:3d: bc:d0:cd:91:eb:34:c0:95:14:82:e6:fc:2b:70:09:48 Fingerprint (SHA-256): D3:5B:4A:8D:11:88:6D:D6:14:6B:62:89:F6:3E:E2:7D:1A:99:25:76:A2:6C:CB:2E:EC:70:27:4F:A9:86:83:69 Fingerprint (SHA1): 6E:BA:AE:89:C7:23:43:A8:DE:18:D1:4D:21:37:8A:21:4A:FB:45:F8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #6197: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122625 (0x1e67da81) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Wed May 10 12:27:05 2017 Not After : Tue May 10 12:27:05 2067 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:b6:ce:f2:c4:8d:2f:e3:f0:61:bf:5c:d7:c0:1c:bc: 2b:9e:44:80:8f:81:d4:24:26:a8:d2:43:8a:c0:fb:59: 90:e4:c9:7f:12:69:a2:05:51:79:b8:a2:5b:5d:ab:60: c4:70:39:73:a6:e7:8f:fb:65:d9:0e:c2:6c:29:7e:2e: 7b:7d:7c:1c:78:bd:8e:3d:53:f8:8e:b1:2e:55:fc:a0: 3b:c3:b6:0d:8d:77:15:20:c7:c7:e0:21:44:a7:12:b3: a1:0f:e7:b4:fa:83:1d:94:57:4d:41:bf:73:7a:d4:a3: ce:4e:80:84:61:4c:9f:d8:98:9b:dc:20:ae:0b:4b:bb: 59:2e:6a:9e:d4:5c:9d:db:fb:b6:0a:06:79:a3:14:60: f6:dd:66:e6:30:1e:0d:2a:63:f6:f4:1a:00:cc:dd:07: 47:e5:09:f5:4a:f2:ae:c8:8e:e4:79:d5:db:45:40:44: 96:60:a4:69:79:87:2c:fb:3e:e7:0b:91:b6:94:01:29: f3:57:9c:65:58:8b:dc:44:92:f6:30:39:b0:21:a6:6b: 8f:20:18:57:b6:7d:25:73:43:c1:0e:5f:46:5b:01:b7: 79:ce:40:4d:e4:51:20:c0:f9:31:d8:26:31:90:7c:86: 7a:d7:38:17:9a:0c:ce:9a:cf:32:7c:54:f8:c4:8c:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:e0:09:ae:41:c5:e1:af:99:72:cf:49:f1:ed:53:dd: 88:66:c9:49:58:92:9b:91:b5:47:5d:4d:ad:26:10:5a: 99:dd:06:e1:4d:97:24:f7:1c:5d:33:46:45:ca:bb:bb: 27:9f:a9:18:ac:43:3a:a5:d9:c6:11:bd:6b:75:cc:1e: 3a:19:0e:3b:0f:35:d1:da:7a:6c:36:2a:1a:64:77:6d: db:5b:66:38:05:ec:7c:c7:8a:ed:87:0d:f5:84:e1:5b: 01:25:e6:c1:bd:48:97:3e:a3:2f:e0:09:87:d5:e4:f1: fa:3e:83:46:c0:55:44:12:8c:22:f1:8c:21:86:27:db: 28:e0:08:1d:72:dd:20:2a:18:03:51:c9:48:d5:64:7f: b6:a9:e2:08:aa:4a:9a:4e:7d:77:40:1f:79:90:43:f4: 58:9c:99:e9:1f:cb:6c:66:48:ee:d1:37:d0:0e:4b:0a: 1b:d9:69:7a:82:1d:1f:dc:84:b3:dc:89:f3:6d:02:0c: 12:67:57:19:67:fa:e8:ec:e5:ff:66:3b:7d:b9:63:18: 35:a8:4b:6f:75:2e:3a:4d:96:7f:f5:dd:06:19:6f:e5: 85:d7:ec:b2:2c:f5:35:1d:98:19:11:e9:3b:d9:a2:73: 7e:10:00:d3:fc:03:e1:92:a7:f3:c0:78:21:cb:36:34 Fingerprint (SHA-256): B0:4C:36:8F:F2:05:10:E5:03:47:BC:8B:1B:04:52:90:38:E4:77:FC:93:60:98:EE:AD:3A:8E:30:A5:E4:88:8A Fingerprint (SHA1): B9:83:B1:48:8D:F8:6F:3D:78:81:10:C0:ED:5E:B3:2C:B4:C2:8C:51 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #6198: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122626 (0x1e67da82) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Wed May 10 12:27:06 2017 Not After : Tue May 10 12:27:06 2067 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:4c:bc:f4:7b:2f:f4:9e:2c:73:46:4f:43:dd:ff:9e: 43:6e:69:79:7f:d4:94:04:44:fa:07:04:9f:71:2f:27: 9f:5a:75:0a:8c:49:49:c0:0f:aa:64:19:fe:2b:f8:17: 4b:03:9f:df:05:89:6f:25:e4:d9:c5:51:71:b5:3f:47: 7f:83:ad:dd:88:c7:73:45:4c:1e:32:fc:9b:b0:3f:90: dc:44:54:0b:9c:e0:f5:98:48:6f:fa:a5:5d:73:4f:be: 4b:a4:ad:8d:53:0c:1c:d9:e9:ee:be:31:1c:4e:04:5b: 00:81:13:c9:7c:22:15:bb:de:d4:f0:0c:85:b2:4a:a6: 8b:f5:64:47:8a:eb:13:38:16:e4:b8:cb:52:b2:6b:64: 7c:3c:9a:91:14:53:13:65:ff:54:48:28:f8:b8:3e:4c: ba:5f:2a:59:c7:b1:53:f7:23:9c:68:e1:a7:7e:06:12: 0d:9e:fe:43:79:7a:12:b4:22:88:fd:79:2a:38:95:68: 18:1a:a0:8b:f7:78:09:d6:50:29:24:56:a2:ea:27:5f: 73:e1:f8:52:56:0a:69:42:aa:54:27:5f:3e:98:ee:1b: 27:3b:8d:25:b1:f7:72:f2:66:5f:30:9f:79:39:34:97: 1f:cd:ed:ed:54:6a:4f:87:fb:3c:78:dd:88:50:67:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:ed:67:7a:85:c1:be:da:13:41:55:3a:6d:d6:4d:c5: 36:d5:70:27:09:39:bf:9a:7e:fe:5e:81:b4:65:bf:a0: 70:74:5d:25:d6:d9:5a:64:0e:ce:2d:58:35:62:59:aa: 39:2f:02:dc:d5:b1:dd:63:b2:05:46:db:9d:cb:bb:14: 96:76:00:31:40:a0:94:1a:63:f1:3b:24:d4:6b:ee:62: 75:c9:5a:05:b9:0e:7a:af:5b:35:fb:bf:ca:40:da:62: 1d:f5:71:c7:df:6b:2c:4e:c7:db:92:40:13:49:ae:b8: a1:6a:1e:da:91:95:aa:e4:b2:38:27:dd:cb:12:35:93: f7:e5:19:ca:16:71:31:0a:c9:54:52:33:d0:f1:be:64: 58:89:fd:b4:b1:fc:75:53:16:c4:e2:e9:f6:37:91:55: 0b:ca:f6:96:e1:7b:d8:c3:43:11:f9:90:1a:db:82:33: 88:47:55:94:4f:60:d8:bd:d5:85:98:d6:58:5e:7d:8a: 23:50:56:64:a3:4d:29:32:00:40:d0:88:ea:82:ba:20: 9e:5e:0e:f1:44:f5:7e:c1:d0:a6:99:f9:96:9e:72:07: 63:62:ea:3d:02:c6:32:d9:9b:d0:8c:76:cc:c2:f8:1c: 00:b6:65:dd:c2:43:92:da:a7:89:ac:47:e5:dc:04:93 Fingerprint (SHA-256): E4:13:F1:93:43:22:9A:E1:7B:5A:E4:C7:10:E5:D3:64:4A:54:78:A7:7A:65:EE:04:17:42:B3:2C:9B:7F:B1:C5 Fingerprint (SHA1): 10:67:25:EF:87:79:1A:E8:A7:4C:C5:B3:E4:66:B4:FC:10:CA:BC:75 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #6199: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122627 (0x1e67da83) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Wed May 10 12:27:07 2017 Not After : Tue May 10 12:27:07 2067 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:2b:50:89:79:35:5f:2c:3f:26:95:86:cb:17:d4:08: 18:5f:cd:c5:db:80:be:e4:00:15:fd:65:28:8f:d8:f1: d4:e7:ac:85:40:18:07:05:77:b7:2c:d2:86:ac:22:a5: fb:d9:c6:ff:8d:6e:ff:ec:ae:b3:af:f4:26:45:ab:99: c2:71:9c:32:98:24:99:50:df:33:3f:02:a6:e7:12:14: 20:20:40:0f:ab:c7:88:0c:d8:e1:42:a1:e5:d1:2d:ad: 62:b5:a7:af:c4:3d:78:3e:e8:a3:96:ef:d8:a6:88:a7: fa:55:21:2b:8c:ea:a5:f5:51:94:4b:cc:77:dd:ab:b9: c1:90:df:a0:78:d6:04:02:98:fe:a9:e3:e5:9c:f4:77: 43:02:d0:5f:fe:56:7c:8a:28:78:4a:e5:0b:51:5a:99: 99:6d:7e:60:57:91:ee:78:9c:83:58:32:8b:a9:da:55: 28:4f:04:bf:44:a1:1b:f4:b1:05:a3:46:f5:b3:cf:a4: 07:97:42:3c:8f:3f:bf:e4:f6:6a:74:73:7b:a0:25:41: 0f:7f:46:fb:96:13:2a:da:2a:0a:ed:7e:40:50:a2:e6: f7:d8:3f:3c:6e:23:bb:ad:37:7f:63:12:e4:a3:5e:8e: 24:e4:7e:21:ac:9b:14:c7:b4:6d:c8:51:74:1d:b9:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a8:50:3f:99:12:ec:e0:f9:06:67:57:b3:6f:22:0d:a4: 14:2e:79:f0:fb:51:f4:0c:9b:26:42:60:53:e1:3d:bc: 3b:00:94:8f:8e:90:5b:9d:7e:e4:62:11:2b:c3:66:b5: 3d:37:ff:e0:52:e6:ad:a4:cb:cd:c8:7a:80:2f:20:0b: f5:9b:72:89:29:03:7d:3b:c9:b3:99:3f:b1:bf:3a:74: 9f:7c:ba:1b:dd:d1:bf:1f:77:7b:6d:6a:da:67:06:36: bf:b4:b8:42:0a:c9:16:b7:42:06:73:6d:b9:81:bb:5c: 7b:93:88:44:c3:53:a3:3a:dd:19:c6:1a:b2:3e:ca:33: ba:27:4a:0b:98:1a:ad:45:2e:17:6a:7e:d3:45:f9:24: 9d:c3:76:05:8e:de:0e:10:15:05:ef:c7:71:09:43:3f: 69:e3:c3:a8:b4:d2:b6:2e:ab:2d:f2:42:9e:36:7e:95: 64:43:83:01:78:14:12:07:e0:87:a8:d2:4f:44:eb:f5: c9:cc:43:a3:ca:50:96:f7:c0:0b:4e:93:a5:d3:51:ec: f6:1f:3b:ed:ae:1a:b6:cb:f0:ed:e9:05:af:27:b7:80: 58:d6:7c:f1:fc:47:85:c3:6b:a1:73:21:49:f5:11:75: de:46:42:dd:3d:aa:9d:1f:b9:32:f1:d2:03:33:6a:51 Fingerprint (SHA-256): 7B:BD:69:87:DF:D9:20:F5:10:D3:5C:3E:90:95:0A:93:E8:69:E3:1A:F8:8D:24:65:37:DE:F1:D2:1E:BD:AD:B7 Fingerprint (SHA1): 0B:F8:6C:8B:42:D6:08:92:DB:85:D9:75:6D:7D:BF:19:CF:59:F0:88 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #6200: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122628 (0x1e67da84) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Wed May 10 12:27:08 2017 Not After : Tue May 10 12:27:08 2067 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:fa:ee:7e:ff:a1:81:52:57:55:70:a4:d8:28:ac:ef: 1a:86:8e:70:28:fc:ca:ae:e3:d4:a1:ea:05:0a:27:10: 6c:44:57:dc:7f:4b:f1:43:11:46:fd:f4:55:38:eb:e9: a1:a5:fd:28:9c:78:e0:3f:69:8d:e3:a5:2d:03:ae:a3: 8b:99:65:06:54:32:53:50:94:82:81:d6:d6:54:07:56: 03:ce:21:1b:fe:34:6e:af:c7:77:e0:90:84:69:ee:d3: 41:01:ab:d2:8b:23:a5:32:f3:cf:86:fe:78:26:da:01: 16:8c:91:25:52:a4:6f:b0:92:d3:b0:67:4a:d1:a1:12: 2c:66:1c:94:e7:b8:71:03:a0:99:6b:ab:70:be:7a:58: 41:f8:97:c9:82:1e:32:8b:96:63:aa:0b:94:74:0b:5b: 12:8e:94:04:ee:b4:cb:6e:54:c0:a9:18:df:53:18:a4: 78:17:af:03:71:a8:46:1a:06:ea:90:e1:4d:f3:dc:52: 09:f1:79:4b:18:63:a7:17:f2:fb:51:75:7e:49:e0:c0: 8d:20:b0:e5:5d:6b:68:3d:6e:b8:40:57:d9:fb:8e:45: 3a:48:ac:14:5a:d1:0c:44:f6:14:12:19:ff:aa:69:fb: ce:18:82:ed:41:11:02:3a:c4:f0:f1:90:98:7a:ba:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6e:1d:31:72:d7:f2:3b:4a:c9:46:10:02:a2:07:87:f1: 37:b1:e4:ca:ea:99:3e:76:0f:5d:ba:16:dd:a1:62:44: 28:5f:c8:bf:0c:83:6f:1f:32:2f:80:c5:3e:e5:68:01: 59:82:95:f8:25:d9:e8:ff:25:1e:2a:4f:9d:33:6e:84: bc:47:b0:74:32:f8:78:34:41:7b:0c:a0:ff:9f:98:fb: 6b:bb:71:3c:c3:a2:26:fc:4c:1a:4f:1a:6f:5c:49:c3: 40:de:71:ce:0a:fb:67:67:57:d6:a9:78:d9:5c:47:94: cc:2d:f6:ec:d7:2c:ae:cf:2a:e4:7d:55:73:cf:c8:b4: 37:89:b2:08:b1:85:ea:62:dc:3a:20:18:19:40:38:92: 10:29:cf:94:b9:92:32:2f:0a:bd:a6:35:5b:21:38:50: ba:b4:73:97:a2:b5:94:0c:ac:b1:53:c0:58:ae:1f:1e: 64:4b:3a:6b:27:ce:4b:56:32:ea:70:3e:44:83:de:6a: 4e:cd:96:98:17:da:b4:08:f8:2f:59:a7:41:4a:03:6c: f6:eb:cf:8f:51:6e:8d:3b:26:2a:1d:6d:f9:cf:d3:9f: 3a:4c:c5:af:8c:a3:30:00:33:e3:2b:b3:35:55:02:d8: e7:dd:68:05:15:d3:0e:61:20:b2:1d:e2:e9:26:cf:79 Fingerprint (SHA-256): BD:0D:B8:C1:FC:D0:D3:35:01:81:3B:CC:DC:DD:44:98:02:3B:AC:AB:F7:1E:FA:E3:77:D3:F6:32:B3:78:EE:07 Fingerprint (SHA1): 4E:F7:9B:E4:7B:24:AF:5A:27:28:00:40:03:C5:2B:BF:DD:B5:CA:AC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #6201: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122629 (0x1e67da85) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Wed May 10 12:27:09 2017 Not After : Tue May 10 12:27:09 2067 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:cb:8c:e1:f0:f0:40:75:62:e3:d7:01:65:00:6a:77: bf:37:3b:a9:fd:f4:b4:3f:3c:e8:3d:b0:cf:14:b4:63: e4:41:4f:0d:7f:97:28:b1:3b:f9:76:06:ad:2f:78:49: 6d:4d:03:7d:5c:70:c7:a8:67:d2:34:ab:2a:b1:4f:c5: 08:85:99:ee:56:28:f5:9a:a5:72:90:2c:c6:57:49:37: 12:09:42:27:b2:8f:f7:e4:2b:7c:8d:8d:33:dd:02:bb: 5c:fd:9a:c9:76:e5:23:e5:50:35:f4:3e:7f:00:96:73: cb:a8:01:02:d2:e0:43:d1:b2:1f:10:72:70:5a:6d:ad: 3d:95:d3:f4:01:70:13:27:7f:5a:82:af:7b:f0:f6:16: a0:e7:8b:c3:ac:44:c9:a4:4a:83:1b:90:b2:c2:3e:5c: c8:b1:51:4b:aa:fc:06:b4:86:aa:75:95:85:48:f4:6f: da:fa:ef:68:16:d5:78:22:41:83:6f:66:68:a7:28:3f: 0b:0b:e7:90:8b:e4:5a:4d:e7:8e:78:82:a5:28:a0:4c: 89:54:6b:ef:a3:d6:3c:52:a3:ae:a6:70:94:4c:d3:0e: 43:61:96:21:75:f1:3d:8e:c6:16:b3:bf:3b:1b:51:91: 25:18:40:98:6a:22:9e:50:9b:97:78:19:fe:c9:cf:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:81:3b:e3:e1:f4:53:0d:6f:e2:89:39:d1:0d:ed:e3: f2:07:66:5e:75:82:4a:c7:b9:0c:2b:ed:6c:0d:32:65: e7:9b:06:35:9d:fe:8f:ae:33:19:7b:a9:44:ba:a2:9f: dd:52:78:9f:5d:64:c0:52:3f:f2:f7:70:7f:ce:bb:61: 4b:5c:d6:9f:bf:07:4f:ff:ec:5e:e8:ab:a7:84:94:03: 5a:ae:f6:32:65:a3:f4:c6:2c:55:08:5e:3a:c0:33:c5: b1:66:1e:e8:b5:a9:ab:c4:bd:7c:7b:00:27:8b:58:74: 9f:b6:af:ad:5a:5a:79:af:f0:65:d1:c3:35:54:61:ff: 8b:20:0f:34:f4:0f:d8:96:f0:f6:d7:40:ac:3d:75:68: de:46:9c:ed:b1:0c:c4:0e:31:21:a2:e0:22:10:c3:b1: d1:71:b7:54:ea:5c:c4:9d:fc:dd:c0:08:ff:6b:5f:00: 9d:46:d6:89:16:ff:88:bf:17:32:8e:52:9a:00:2f:e7: 98:72:b4:4f:ac:e7:56:d6:95:2c:e6:05:93:42:7c:5a: e3:27:24:08:88:b3:b1:3d:20:91:d6:83:9c:78:a9:1a: cf:c4:33:e7:f4:60:64:eb:f0:e2:85:54:5b:28:02:90: f4:1f:eb:72:d7:14:ee:2f:af:58:66:2f:48:65:40:b1 Fingerprint (SHA-256): 38:10:3A:AC:D8:5C:69:7A:0D:65:64:48:CC:B4:70:D3:66:7E:78:46:41:5B:BC:57:0B:83:23:F4:10:86:1A:03 Fingerprint (SHA1): C0:5B:6D:67:C4:9C:22:88:73:40:00:D3:E8:92:68:90:9A:59:78:9B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #6202: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122630 (0x1e67da86) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Wed May 10 12:27:11 2017 Not After : Tue May 10 12:27:11 2067 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:cb:7f:6b:6a:ac:a9:d1:2e:1c:10:8d:97:49:3e:34: cc:47:be:dd:0a:3f:fb:49:58:9e:49:f4:b7:db:46:81: 52:40:c0:f7:f5:99:1c:c2:0d:04:64:84:ef:5c:2d:7f: 7a:3b:8d:f3:cb:09:83:76:e4:0a:83:6b:f3:ce:a6:c0: 87:a7:ff:3e:ac:22:ce:56:f8:30:5f:d6:6a:fe:40:a2: 47:a1:6a:b1:69:bc:c3:3d:66:f7:8b:45:ba:de:a5:03: d8:ab:f5:de:b3:89:b5:a8:37:ea:03:1b:c0:c2:03:f7: e8:83:8b:c2:05:7a:43:97:07:67:aa:8d:8a:a2:af:f0: d0:90:f7:1e:b8:3a:a2:e7:c2:be:a4:52:2e:ff:2a:e9: 12:90:5b:ea:b4:9d:f0:4a:4d:71:65:b1:28:cd:80:c4: 93:b3:50:f8:13:e8:7f:c5:fe:90:8c:cb:fe:e0:71:0b: bc:df:57:50:6d:3c:71:7c:54:6c:72:6a:66:f1:2c:f1: 0a:77:9d:a9:78:db:a0:fa:03:07:bb:20:3d:16:d7:24: 5e:a4:5a:f5:41:77:e3:b7:38:b3:79:43:62:44:fe:2a: 75:f9:8e:7b:0b:2c:29:40:f7:d2:56:10:32:03:04:89: d9:2f:7a:5d:89:f3:16:b7:16:33:f1:c2:5a:dc:9b:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:14:32:02:4f:06:fe:a7:e4:43:13:c9:3a:de:44:f6: 58:5f:e9:7b:8f:20:39:91:ec:1a:6e:f3:52:5c:5b:84: b6:b1:1a:ed:c7:ba:92:96:a1:b7:c8:f1:e4:b0:a2:85: 15:f2:51:17:72:23:e6:c6:04:b8:b5:70:50:91:e2:b0: d3:13:2f:08:f0:7e:eb:2d:c1:01:88:d7:8e:c9:6a:a4: 7a:02:54:29:4c:c0:ac:6e:13:a9:30:4b:bc:e7:06:ef: 4a:bb:48:f7:f8:5c:66:83:31:39:79:92:ef:0d:a3:ef: 71:16:dd:43:5f:1c:18:09:4e:c9:ce:4a:62:fb:1e:28: 39:ef:47:55:0f:f4:14:d4:53:32:10:cc:ba:38:89:11: 5b:1e:6d:96:e4:95:74:c3:49:26:8e:48:d8:02:5c:d9: 91:b6:be:01:cb:d7:fb:3b:16:6e:a8:74:25:f0:20:84: 9c:a8:48:d5:78:33:aa:04:03:72:fb:a8:27:5a:3d:35: bf:dc:a1:bc:fe:9a:8e:1b:01:9c:0c:c3:86:36:6c:47: b6:3b:15:53:66:f3:20:f7:bd:ae:66:36:16:a2:bc:61: 16:9d:99:fd:b2:7f:3f:18:8b:c0:b3:7a:78:67:8f:bc: 87:44:f8:0d:48:89:bd:67:37:48:32:5e:e2:93:b8:e4 Fingerprint (SHA-256): E4:D2:24:3F:BF:97:CC:23:FC:1D:FA:63:E5:97:DE:5E:7D:F2:8C:19:3D:42:CD:44:CD:D5:71:0F:94:73:BC:78 Fingerprint (SHA1): EE:1F:1D:7F:B1:59:A7:57:2A:00:83:A0:FB:EB:9B:43:27:58:85:37 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #6203: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122631 (0x1e67da87) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Wed May 10 12:27:11 2017 Not After : Tue May 10 12:27:11 2067 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:df:2a:fd:02:2d:e1:a3:23:c4:96:8f:8d:b0:3f:e9: b4:54:63:6e:72:de:e3:0e:22:4a:ca:59:f7:b6:52:c6: 4e:27:aa:a9:1f:eb:3e:eb:17:f4:8d:9d:d0:8c:79:fa: c4:c5:7b:fd:ea:7e:a5:01:59:f7:15:38:42:81:b9:85: e2:25:25:2c:f5:d8:c1:d6:a6:35:b8:ca:95:83:3a:9b: b2:5e:47:4a:eb:ea:04:db:e5:e0:32:a2:0e:cf:f4:81: 2c:73:a3:3b:cf:6a:f4:1e:89:f3:52:f8:e2:43:84:39: 83:2d:6c:15:15:4e:40:80:c0:c5:29:fd:fe:86:ec:6a: 94:81:38:14:69:b9:f6:69:02:d7:21:cf:b6:e4:9f:ca: 61:34:12:75:61:6e:31:1a:0c:9b:98:62:4b:6d:cc:2a: 79:18:f6:18:a7:15:58:5a:2c:be:36:93:90:55:76:49: 67:f9:42:1e:4b:2c:37:f1:23:ab:0e:da:35:fe:1d:c1: 16:f1:0f:fa:f4:d3:02:12:f6:d6:5a:f3:8d:4d:c0:4c: f4:e2:e6:a3:66:8e:49:d3:c0:b6:58:e3:77:24:21:76: fd:a9:36:83:0c:d8:67:57:f7:c8:69:b9:c2:94:a5:7a: 90:c5:57:b5:a4:bd:35:7c:1d:65:f6:55:35:36:b3:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:f4:e1:c0:9d:a7:0f:bb:83:ec:99:e4:63:15:12:2f: 72:1f:2a:a1:f5:cd:46:a7:25:95:78:d9:71:eb:96:cf: 7b:96:0d:d3:71:3c:44:7c:11:d3:e4:f5:ca:ec:af:6e: 8f:63:b0:ae:34:5f:eb:e6:e3:44:50:b0:f6:63:27:6b: e6:42:fe:f6:01:d5:d4:6e:fe:21:f4:9b:7b:d4:17:5b: cf:32:c0:cb:54:58:bd:55:14:e0:1c:bf:73:b8:b2:76: 43:d4:e1:24:8a:0e:77:82:17:44:cc:2b:f6:b2:31:c4: 25:d0:3c:7e:d0:6d:54:1f:5b:4c:56:19:b1:0a:9d:cc: 4e:81:cb:c8:72:9f:ed:07:50:ca:9d:b8:c1:c3:58:2b: 68:dc:3f:0b:17:ba:1f:ae:d5:8f:33:ca:71:a1:aa:fe: 1f:e8:ba:25:28:9d:1c:15:2c:e9:8a:ea:07:ad:bc:1f: 40:d0:e3:7b:3a:75:da:66:29:48:49:86:c3:88:b8:ef: 38:36:62:a9:a6:2a:05:35:30:d3:65:34:97:c6:e4:64: 12:c4:a7:07:d0:78:57:27:20:0a:9d:e0:b0:87:f2:d2: e4:2a:f1:5a:b1:8f:1e:92:23:77:f8:48:bd:cb:84:59: 82:88:c4:c9:ef:e5:fc:62:88:ba:b2:97:55:7b:eb:9d Fingerprint (SHA-256): 0A:28:0C:C0:BC:B6:D9:B8:E5:F7:07:6C:45:8A:18:49:95:5D:3A:9F:1F:A0:FC:73:24:EE:45:5E:DB:6C:BC:EB Fingerprint (SHA1): 20:E6:0C:82:EC:1F:50:77:A7:A9:DE:C4:8A:7E:72:87:1A:B7:77:D7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #6204: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #6205: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122646 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6206: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #6207: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #6208: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6209: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510122647 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6210: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6211: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #6212: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6213: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510122648 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6214: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6215: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #6216: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6217: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 510122649 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6218: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6219: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #6220: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122646 (0x1e67da96) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:27:24 2017 Not After : Tue May 10 12:27:24 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:56:93:fb:9f:e3:0d:8b:40:03:c8:9a:4a:59:88:5d: b5:a8:e7:93:f1:a0:fe:4b:66:4f:51:bf:64:b4:cb:e5: c8:ad:ac:00:01:13:0f:e6:64:c7:b2:0f:ee:06:c1:45: 0a:eb:3a:ca:ff:c2:7b:1d:0d:e2:f1:f2:f0:76:05:f0: 53:66:b0:7a:8a:d6:8e:f4:91:33:9a:14:7e:de:64:b5: 13:0c:a0:61:48:cd:e8:b2:88:df:6e:fb:24:eb:1c:c5: a0:db:0c:0a:13:ba:a5:a7:ad:51:49:04:b6:24:99:66: 94:23:d3:10:98:df:f5:77:d5:ab:5f:ae:9c:a1:57:45: a5:be:ad:bf:3a:85:ce:7c:a0:b2:be:8e:cd:86:fb:8e: 95:e5:ad:4c:fb:81:60:77:e0:4e:be:3e:8f:0b:c1:52: 8a:5b:92:17:08:31:82:5f:77:53:d2:58:03:3e:47:ad: 05:1d:b6:f0:93:db:2d:e3:4c:bd:1f:dd:60:9b:ea:3e: d4:b3:00:3e:82:28:8d:e9:b3:02:4d:99:1e:75:8a:3b: 11:46:27:83:13:6d:5e:61:48:a6:ee:bf:6a:2b:4d:8c: ee:5f:26:27:21:e3:a1:1d:3c:14:07:50:45:71:71:25: a0:94:7d:57:82:75:b1:23:15:f4:f0:d9:1c:87:be:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:a8:ff:37:fb:f3:0b:dd:be:9b:d3:a6:bf:41:f7:31: ee:8e:73:07:a3:45:b2:80:d0:f6:e7:9c:2e:7f:ea:b0: 7a:1b:11:a1:51:10:2d:23:fe:50:44:a4:9c:90:eb:35: 36:22:d2:d1:19:81:15:b8:a8:ee:cf:50:2b:1e:54:94: 6c:8e:96:8e:fe:75:5b:9c:7e:8a:d6:d9:8e:3f:f7:14: 98:54:e0:3a:b4:a9:8d:be:a6:74:5e:62:46:44:dc:e2: f5:85:2d:c7:93:8e:ba:18:75:ac:f0:53:81:80:6d:fd: 68:39:f7:3e:75:97:55:e7:70:61:6b:8b:b8:0d:a1:c3: 61:16:e4:6f:17:24:82:b7:79:79:dc:a5:5c:02:87:f4: 23:8b:02:88:23:1e:d5:e2:85:c6:43:09:4d:01:27:7f: 69:9c:66:ed:2e:76:74:d0:22:96:d2:56:23:32:f6:90: e9:0a:ec:36:ea:19:03:95:5b:4b:8e:d1:78:99:c0:02: 9d:c1:50:c7:0b:6a:3f:91:e0:d9:2f:2c:00:70:e6:60: bf:7d:d4:19:9e:3d:54:ac:f4:29:82:55:1d:11:c3:81: 85:de:85:33:a1:18:d4:21:16:e4:1c:64:f1:9b:30:b8: 11:74:9c:50:8b:6c:a7:fa:27:12:ee:60:fc:a0:89:50 Fingerprint (SHA-256): 14:63:F9:C4:5A:CB:49:09:34:8E:B1:74:29:67:C4:D9:23:0D:AE:9F:E4:9D:82:04:5F:0C:C6:97:DE:7A:8C:5D Fingerprint (SHA1): BD:0F:53:47:27:8A:34:DC:D7:37:A4:A5:33:51:66:0C:D4:D6:7F:4E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6221: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6222: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122647 (0x1e67da97) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:27:26 2017 Not After : Tue May 10 12:27:26 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:b0:0d:de:c9:6b:99:32:1c:a5:bd:37:dc:32:8e:8a: 9c:bb:b7:03:47:6f:02:32:49:f4:d6:7a:28:72:42:2d: d7:14:28:d1:69:26:da:fe:e5:dc:dd:ad:6b:52:e8:1b: bf:9c:7c:02:5d:cc:b0:42:ee:88:7c:b3:f7:81:4b:1e: ee:12:10:72:6a:52:4c:d7:82:74:88:b2:24:72:c6:dd: 48:a7:fb:7f:39:13:aa:04:89:3d:0f:4a:82:72:d9:74: 80:d6:7e:26:15:80:91:a0:4c:66:92:94:c7:23:af:4d: 6b:47:c0:2d:0c:35:65:25:e4:49:4e:2d:6e:7f:c3:66: 32:4d:25:d2:27:88:7b:71:42:2c:10:ea:8b:7e:27:61: 70:cc:c2:be:31:45:25:71:b0:29:71:79:e3:4e:19:62: cf:0d:a7:42:71:2b:f2:c0:29:d6:9d:c1:76:7a:39:06: 5f:0a:4a:66:4d:df:4f:95:7f:aa:5a:35:2e:33:32:25: 41:e9:a6:74:97:61:75:ad:df:92:b1:ef:5c:6c:56:d0: d0:af:89:31:91:37:2d:b9:60:08:6d:b7:2a:55:f0:10: eb:62:cc:5f:a8:8e:fa:77:1e:ed:c2:41:4b:49:56:dd: 81:7d:0d:73:ab:69:a0:3a:cf:87:2f:49:a5:98:51:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:73:1c:cb:36:35:91:6a:48:4d:27:87:c5:66:ab:06: c4:92:a4:36:d4:c8:c2:6e:2e:18:3c:69:2f:10:39:ce: 06:78:f1:a1:cf:d3:5d:94:82:a7:ad:6b:82:27:aa:cc: a7:62:d2:1b:24:10:56:e8:14:49:30:69:0c:b7:e8:67: fc:a5:f0:04:67:d1:56:31:3e:68:bb:6e:5b:24:4e:f1: 98:c7:26:f9:7a:10:ee:ab:d3:1e:6b:ba:6b:5a:3d:da: 7a:9e:96:41:ef:ed:f4:b3:b0:0e:28:2e:cd:0c:7f:df: b7:a0:54:f9:6a:b5:35:0e:33:29:8f:67:01:b6:25:6f: b5:54:e9:e6:f6:78:cf:87:a0:80:de:5f:bc:c6:7b:f2: 78:70:c8:6d:5c:82:79:be:07:64:93:be:76:a1:37:e2: 6e:7d:57:63:aa:8e:bc:21:b0:02:e6:fd:ee:b7:1e:25: 87:21:2e:21:cd:e2:18:ca:cb:9e:4c:45:0f:91:46:bc: 0a:df:ca:28:b9:f6:60:64:f5:a3:e7:16:e5:25:24:1a: c2:c3:99:4c:f0:f6:83:79:d2:0f:0b:95:a4:38:f1:cb: a4:19:f3:c9:60:33:e8:6c:9e:76:a3:6e:38:5c:93:a9: c6:93:82:39:45:e8:d7:41:7f:e9:cb:09:60:65:15:fc Fingerprint (SHA-256): 54:A5:3A:0B:0D:73:46:BE:C2:16:34:75:A5:9E:40:6C:F2:B3:12:76:4D:CB:0A:FD:8C:1A:6D:AC:B6:74:CC:B0 Fingerprint (SHA1): 6E:6A:FF:90:9B:C1:4A:40:EA:B5:58:AF:42:BD:3A:DA:72:57:C5:58 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #6223: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6224: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122648 (0x1e67da98) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:27:27 2017 Not After : Tue May 10 12:27:27 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:e4:e4:6a:b5:df:57:64:7c:7a:f8:09:92:a9:4c:3f: 7a:64:c9:91:cd:ca:a7:be:6a:77:0b:94:55:b4:75:42: a1:38:58:b0:72:53:42:12:d7:ea:dd:c5:9a:9c:b2:4d: 17:f5:ea:21:d6:dc:3d:1b:93:d1:f5:b4:cc:d6:32:af: ac:3a:d0:0e:83:6b:97:f2:81:5d:1e:80:b7:36:92:d3: 94:2c:3e:7d:ba:1d:b3:1f:c0:f0:1f:91:4e:6e:43:41: 8d:79:8d:01:7d:5b:73:e6:6f:5e:63:ba:e1:90:2b:6c: cd:86:bd:ae:b5:51:0c:f1:df:c7:eb:9d:03:7a:97:cf: 35:6b:88:a9:86:a9:cd:0c:b7:02:e7:02:54:d2:b2:c4: 0d:3f:20:c7:bd:c2:9d:cb:68:39:69:12:d8:a9:77:e8: f1:6d:18:48:bc:f4:51:bb:84:78:db:45:14:fe:ec:28: bc:cd:18:a0:c0:3d:f1:4a:46:8f:06:dd:9d:5a:cb:69: f5:c8:d7:13:cb:de:b2:27:50:13:3a:a5:b7:f9:32:2c: 71:d0:c9:df:77:c6:53:a0:fc:a2:2b:b2:2e:2d:0e:d0: 07:72:d9:ac:d9:24:03:84:bd:3e:72:9f:a9:57:68:0e: 24:fb:8b:d8:a8:af:4a:83:90:f6:bc:8e:1b:51:b9:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:13:aa:81:45:4e:a9:b5:2c:d0:65:c7:94:6f:54:01: ad:aa:c6:49:36:8b:f0:a9:6e:1f:26:19:27:7b:6c:f3: ae:8c:ad:aa:f7:87:de:e3:1d:85:55:12:06:d5:05:4a: 6e:77:8c:80:df:af:f1:5b:e3:eb:8f:28:83:ea:96:0e: a9:70:cf:c1:04:d4:06:a5:1f:08:e5:d4:53:12:97:9f: fc:74:80:51:66:05:93:14:06:0c:f5:db:b7:7c:df:8b: 22:ab:34:08:1d:6d:2a:44:b6:de:55:e5:de:21:20:72: 05:c7:08:9a:99:31:bf:86:11:24:06:ed:0c:be:28:6f: ff:a0:41:2e:0f:a5:98:54:96:7b:28:ac:7a:d9:4e:03: 70:8d:4d:85:6c:8e:ef:8a:38:12:ad:ad:cf:37:0c:0f: 35:8b:1a:0e:ab:56:a4:f8:c6:e1:27:56:55:ba:c5:ce: ac:d3:1e:ae:1d:51:97:53:97:c7:53:55:b3:e4:d1:41: fc:51:65:f2:27:90:4b:0d:25:31:de:79:39:60:42:12: 06:1b:9c:7d:08:d7:db:dc:39:45:f8:80:a5:fb:6e:b2: c3:e7:af:88:3b:fc:f7:c0:ff:22:a5:c2:85:89:70:18: a3:bb:4d:99:0d:9a:44:f9:08:66:cf:5e:f9:46:0d:e3 Fingerprint (SHA-256): 81:63:49:21:58:6A:25:02:9F:9F:37:1E:B1:84:A5:5F:F1:C2:1E:23:3F:E9:DF:B2:5C:17:11:BC:E3:90:65:B4 Fingerprint (SHA1): 2C:10:5A:89:F9:BA:28:BC:D7:59:32:10:F4:45:F2:E0:EB:F9:AB:FC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #6225: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6226: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #6227: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #6228: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #6229: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122646 (0x1e67da96) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:27:24 2017 Not After : Tue May 10 12:27:24 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:56:93:fb:9f:e3:0d:8b:40:03:c8:9a:4a:59:88:5d: b5:a8:e7:93:f1:a0:fe:4b:66:4f:51:bf:64:b4:cb:e5: c8:ad:ac:00:01:13:0f:e6:64:c7:b2:0f:ee:06:c1:45: 0a:eb:3a:ca:ff:c2:7b:1d:0d:e2:f1:f2:f0:76:05:f0: 53:66:b0:7a:8a:d6:8e:f4:91:33:9a:14:7e:de:64:b5: 13:0c:a0:61:48:cd:e8:b2:88:df:6e:fb:24:eb:1c:c5: a0:db:0c:0a:13:ba:a5:a7:ad:51:49:04:b6:24:99:66: 94:23:d3:10:98:df:f5:77:d5:ab:5f:ae:9c:a1:57:45: a5:be:ad:bf:3a:85:ce:7c:a0:b2:be:8e:cd:86:fb:8e: 95:e5:ad:4c:fb:81:60:77:e0:4e:be:3e:8f:0b:c1:52: 8a:5b:92:17:08:31:82:5f:77:53:d2:58:03:3e:47:ad: 05:1d:b6:f0:93:db:2d:e3:4c:bd:1f:dd:60:9b:ea:3e: d4:b3:00:3e:82:28:8d:e9:b3:02:4d:99:1e:75:8a:3b: 11:46:27:83:13:6d:5e:61:48:a6:ee:bf:6a:2b:4d:8c: ee:5f:26:27:21:e3:a1:1d:3c:14:07:50:45:71:71:25: a0:94:7d:57:82:75:b1:23:15:f4:f0:d9:1c:87:be:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:a8:ff:37:fb:f3:0b:dd:be:9b:d3:a6:bf:41:f7:31: ee:8e:73:07:a3:45:b2:80:d0:f6:e7:9c:2e:7f:ea:b0: 7a:1b:11:a1:51:10:2d:23:fe:50:44:a4:9c:90:eb:35: 36:22:d2:d1:19:81:15:b8:a8:ee:cf:50:2b:1e:54:94: 6c:8e:96:8e:fe:75:5b:9c:7e:8a:d6:d9:8e:3f:f7:14: 98:54:e0:3a:b4:a9:8d:be:a6:74:5e:62:46:44:dc:e2: f5:85:2d:c7:93:8e:ba:18:75:ac:f0:53:81:80:6d:fd: 68:39:f7:3e:75:97:55:e7:70:61:6b:8b:b8:0d:a1:c3: 61:16:e4:6f:17:24:82:b7:79:79:dc:a5:5c:02:87:f4: 23:8b:02:88:23:1e:d5:e2:85:c6:43:09:4d:01:27:7f: 69:9c:66:ed:2e:76:74:d0:22:96:d2:56:23:32:f6:90: e9:0a:ec:36:ea:19:03:95:5b:4b:8e:d1:78:99:c0:02: 9d:c1:50:c7:0b:6a:3f:91:e0:d9:2f:2c:00:70:e6:60: bf:7d:d4:19:9e:3d:54:ac:f4:29:82:55:1d:11:c3:81: 85:de:85:33:a1:18:d4:21:16:e4:1c:64:f1:9b:30:b8: 11:74:9c:50:8b:6c:a7:fa:27:12:ee:60:fc:a0:89:50 Fingerprint (SHA-256): 14:63:F9:C4:5A:CB:49:09:34:8E:B1:74:29:67:C4:D9:23:0D:AE:9F:E4:9D:82:04:5F:0C:C6:97:DE:7A:8C:5D Fingerprint (SHA1): BD:0F:53:47:27:8A:34:DC:D7:37:A4:A5:33:51:66:0C:D4:D6:7F:4E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6230: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6231: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122647 (0x1e67da97) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:27:26 2017 Not After : Tue May 10 12:27:26 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:b0:0d:de:c9:6b:99:32:1c:a5:bd:37:dc:32:8e:8a: 9c:bb:b7:03:47:6f:02:32:49:f4:d6:7a:28:72:42:2d: d7:14:28:d1:69:26:da:fe:e5:dc:dd:ad:6b:52:e8:1b: bf:9c:7c:02:5d:cc:b0:42:ee:88:7c:b3:f7:81:4b:1e: ee:12:10:72:6a:52:4c:d7:82:74:88:b2:24:72:c6:dd: 48:a7:fb:7f:39:13:aa:04:89:3d:0f:4a:82:72:d9:74: 80:d6:7e:26:15:80:91:a0:4c:66:92:94:c7:23:af:4d: 6b:47:c0:2d:0c:35:65:25:e4:49:4e:2d:6e:7f:c3:66: 32:4d:25:d2:27:88:7b:71:42:2c:10:ea:8b:7e:27:61: 70:cc:c2:be:31:45:25:71:b0:29:71:79:e3:4e:19:62: cf:0d:a7:42:71:2b:f2:c0:29:d6:9d:c1:76:7a:39:06: 5f:0a:4a:66:4d:df:4f:95:7f:aa:5a:35:2e:33:32:25: 41:e9:a6:74:97:61:75:ad:df:92:b1:ef:5c:6c:56:d0: d0:af:89:31:91:37:2d:b9:60:08:6d:b7:2a:55:f0:10: eb:62:cc:5f:a8:8e:fa:77:1e:ed:c2:41:4b:49:56:dd: 81:7d:0d:73:ab:69:a0:3a:cf:87:2f:49:a5:98:51:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:73:1c:cb:36:35:91:6a:48:4d:27:87:c5:66:ab:06: c4:92:a4:36:d4:c8:c2:6e:2e:18:3c:69:2f:10:39:ce: 06:78:f1:a1:cf:d3:5d:94:82:a7:ad:6b:82:27:aa:cc: a7:62:d2:1b:24:10:56:e8:14:49:30:69:0c:b7:e8:67: fc:a5:f0:04:67:d1:56:31:3e:68:bb:6e:5b:24:4e:f1: 98:c7:26:f9:7a:10:ee:ab:d3:1e:6b:ba:6b:5a:3d:da: 7a:9e:96:41:ef:ed:f4:b3:b0:0e:28:2e:cd:0c:7f:df: b7:a0:54:f9:6a:b5:35:0e:33:29:8f:67:01:b6:25:6f: b5:54:e9:e6:f6:78:cf:87:a0:80:de:5f:bc:c6:7b:f2: 78:70:c8:6d:5c:82:79:be:07:64:93:be:76:a1:37:e2: 6e:7d:57:63:aa:8e:bc:21:b0:02:e6:fd:ee:b7:1e:25: 87:21:2e:21:cd:e2:18:ca:cb:9e:4c:45:0f:91:46:bc: 0a:df:ca:28:b9:f6:60:64:f5:a3:e7:16:e5:25:24:1a: c2:c3:99:4c:f0:f6:83:79:d2:0f:0b:95:a4:38:f1:cb: a4:19:f3:c9:60:33:e8:6c:9e:76:a3:6e:38:5c:93:a9: c6:93:82:39:45:e8:d7:41:7f:e9:cb:09:60:65:15:fc Fingerprint (SHA-256): 54:A5:3A:0B:0D:73:46:BE:C2:16:34:75:A5:9E:40:6C:F2:B3:12:76:4D:CB:0A:FD:8C:1A:6D:AC:B6:74:CC:B0 Fingerprint (SHA1): 6E:6A:FF:90:9B:C1:4A:40:EA:B5:58:AF:42:BD:3A:DA:72:57:C5:58 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #6232: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6233: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122648 (0x1e67da98) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:27:27 2017 Not After : Tue May 10 12:27:27 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:e4:e4:6a:b5:df:57:64:7c:7a:f8:09:92:a9:4c:3f: 7a:64:c9:91:cd:ca:a7:be:6a:77:0b:94:55:b4:75:42: a1:38:58:b0:72:53:42:12:d7:ea:dd:c5:9a:9c:b2:4d: 17:f5:ea:21:d6:dc:3d:1b:93:d1:f5:b4:cc:d6:32:af: ac:3a:d0:0e:83:6b:97:f2:81:5d:1e:80:b7:36:92:d3: 94:2c:3e:7d:ba:1d:b3:1f:c0:f0:1f:91:4e:6e:43:41: 8d:79:8d:01:7d:5b:73:e6:6f:5e:63:ba:e1:90:2b:6c: cd:86:bd:ae:b5:51:0c:f1:df:c7:eb:9d:03:7a:97:cf: 35:6b:88:a9:86:a9:cd:0c:b7:02:e7:02:54:d2:b2:c4: 0d:3f:20:c7:bd:c2:9d:cb:68:39:69:12:d8:a9:77:e8: f1:6d:18:48:bc:f4:51:bb:84:78:db:45:14:fe:ec:28: bc:cd:18:a0:c0:3d:f1:4a:46:8f:06:dd:9d:5a:cb:69: f5:c8:d7:13:cb:de:b2:27:50:13:3a:a5:b7:f9:32:2c: 71:d0:c9:df:77:c6:53:a0:fc:a2:2b:b2:2e:2d:0e:d0: 07:72:d9:ac:d9:24:03:84:bd:3e:72:9f:a9:57:68:0e: 24:fb:8b:d8:a8:af:4a:83:90:f6:bc:8e:1b:51:b9:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:13:aa:81:45:4e:a9:b5:2c:d0:65:c7:94:6f:54:01: ad:aa:c6:49:36:8b:f0:a9:6e:1f:26:19:27:7b:6c:f3: ae:8c:ad:aa:f7:87:de:e3:1d:85:55:12:06:d5:05:4a: 6e:77:8c:80:df:af:f1:5b:e3:eb:8f:28:83:ea:96:0e: a9:70:cf:c1:04:d4:06:a5:1f:08:e5:d4:53:12:97:9f: fc:74:80:51:66:05:93:14:06:0c:f5:db:b7:7c:df:8b: 22:ab:34:08:1d:6d:2a:44:b6:de:55:e5:de:21:20:72: 05:c7:08:9a:99:31:bf:86:11:24:06:ed:0c:be:28:6f: ff:a0:41:2e:0f:a5:98:54:96:7b:28:ac:7a:d9:4e:03: 70:8d:4d:85:6c:8e:ef:8a:38:12:ad:ad:cf:37:0c:0f: 35:8b:1a:0e:ab:56:a4:f8:c6:e1:27:56:55:ba:c5:ce: ac:d3:1e:ae:1d:51:97:53:97:c7:53:55:b3:e4:d1:41: fc:51:65:f2:27:90:4b:0d:25:31:de:79:39:60:42:12: 06:1b:9c:7d:08:d7:db:dc:39:45:f8:80:a5:fb:6e:b2: c3:e7:af:88:3b:fc:f7:c0:ff:22:a5:c2:85:89:70:18: a3:bb:4d:99:0d:9a:44:f9:08:66:cf:5e:f9:46:0d:e3 Fingerprint (SHA-256): 81:63:49:21:58:6A:25:02:9F:9F:37:1E:B1:84:A5:5F:F1:C2:1E:23:3F:E9:DF:B2:5C:17:11:BC:E3:90:65:B4 Fingerprint (SHA1): 2C:10:5A:89:F9:BA:28:BC:D7:59:32:10:F4:45:F2:E0:EB:F9:AB:FC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #6234: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6235: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #6236: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122650 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6237: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #6238: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #6239: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6240: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510122651 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6241: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6242: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #6243: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6244: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510122652 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6245: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6246: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #6247: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6248: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 510122653 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6249: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6250: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #6251: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6252: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 510122654 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6253: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6254: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #6255: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122650 (0x1e67da9a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:27:32 2017 Not After : Tue May 10 12:27:32 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:a3:75:43:fc:c4:d8:ad:6c:77:30:61:a8:04:37:b3: f0:b8:bc:92:b0:be:34:03:f7:3c:79:91:2b:88:9a:72: 68:ae:ba:e4:a6:43:22:ff:c4:16:4d:11:ed:1e:7a:c2: 1c:f9:6c:f0:ec:85:7b:02:bf:57:70:01:d0:98:4b:cf: 44:23:c9:19:a8:8d:4f:6d:20:c5:15:14:67:88:ef:1b: 78:48:c4:5c:28:af:c2:f1:1d:9f:1d:91:f7:fb:a5:c1: 2f:35:54:c7:e6:71:e6:c1:cb:84:f6:35:86:c4:9e:53: 69:a1:7f:e1:9e:15:7a:0a:70:b5:57:dc:94:f6:74:f6: bf:d2:44:72:7d:17:26:e3:6f:71:a7:54:50:4e:71:43: cf:8a:94:07:68:5b:c1:f4:14:d2:9a:e0:11:86:b4:5f: ff:1b:b7:d6:94:92:cc:cd:b4:5a:6e:61:f2:de:d5:22: d9:85:0a:40:ef:cd:aa:d5:7a:65:80:13:90:55:33:46: d1:bb:28:12:e9:a9:63:d6:85:61:20:f6:dc:ae:d5:ef: 67:3d:24:39:c3:39:81:e4:15:a9:1d:a9:3a:d7:64:71: 6e:80:99:a1:51:55:2f:af:f1:03:14:06:31:d1:0d:e0: 5c:c7:d9:43:10:92:26:7d:87:f4:a9:2d:16:e6:c2:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:3d:9c:43:5c:fa:86:ff:83:48:93:d8:b0:b3:5c:5d: 6a:f0:b2:0d:dc:db:eb:c2:f2:dd:93:0a:22:92:50:82: d3:5f:f8:f4:2a:52:05:8c:e3:2f:f8:3f:83:5a:a0:e8: d6:46:9e:69:0d:54:1b:f6:32:22:2e:c5:82:f3:e4:2d: 0f:23:b5:9d:dc:64:67:4e:ab:fa:51:0d:28:cc:8d:ce: b9:14:ce:cb:f3:93:8c:18:b7:01:60:ce:94:79:d6:c6: 28:50:97:e4:39:a2:d7:03:f8:1e:05:3b:ec:bb:26:cd: 7d:03:85:4e:e8:bb:3a:04:9e:93:33:e8:d7:7b:93:9e: 86:20:d2:c1:0d:cb:7b:8d:5b:79:18:ce:52:fe:fb:1c: bd:88:ef:7b:96:3c:33:25:45:9f:b2:86:ab:a7:cf:45: f0:fa:c2:36:8d:8c:c9:e7:a1:fc:73:55:0b:f0:19:0b: 34:e9:96:95:01:3e:22:19:d3:ad:ab:51:43:6c:b3:28: b4:58:08:8f:5d:d8:57:1d:0b:92:c1:e8:6b:e1:04:ce: c6:0b:aa:71:7a:73:78:83:c1:71:69:7c:64:85:31:fa: 85:eb:39:44:c5:4a:4e:73:97:fe:17:ad:7a:77:e1:6c: 40:7a:5d:56:21:e6:a6:f0:9c:9d:b5:64:eb:4e:04:90 Fingerprint (SHA-256): BD:FD:5B:1F:13:02:5B:CB:E9:6C:BD:97:A7:2C:50:50:13:B1:7E:D5:41:80:26:5B:3A:3C:07:D6:06:17:27:30 Fingerprint (SHA1): A5:5A:69:E2:69:15:C4:7E:ED:6D:BD:94:C8:0F:6B:4A:19:19:B9:6E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6256: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6257: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122651 (0x1e67da9b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:27:33 2017 Not After : Tue May 10 12:27:33 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:ab:d0:19:77:d6:95:b2:16:a8:19:08:dc:04:3c:1e: 2d:35:65:2a:5e:2b:31:33:c9:b8:2e:aa:fb:06:ab:d6: 5f:e2:cd:bd:4f:28:e8:22:8a:f8:56:ac:46:5a:21:73: 77:39:b8:9b:5b:08:7f:1b:1c:a3:5c:4f:28:ae:0b:b0: 7e:94:39:90:c4:07:83:42:8f:fe:39:d3:32:66:04:5f: 51:74:af:76:60:02:14:ec:22:a9:f7:7c:09:1f:60:35: b1:36:81:46:82:70:87:d8:ab:4c:14:51:da:9b:43:d5: 5b:f9:da:3f:7c:e6:cd:b5:f1:5b:81:3f:31:79:60:d1: e4:05:9a:78:01:ac:ca:65:3e:60:a1:18:1c:4e:94:19: f0:b0:1c:33:b6:f7:f1:7a:c5:81:6f:d9:21:aa:6d:9f: 89:e4:29:d0:79:67:ff:2f:a7:42:0f:9c:07:dd:ba:a6: 49:de:c3:8c:6a:7c:19:c2:ad:14:9b:6a:44:65:22:c2: 7d:24:f4:cf:7e:16:dd:0c:81:73:b8:a7:e3:9a:93:69: c8:ac:3e:46:23:5b:28:24:f6:c2:8b:1b:ad:f3:0f:99: 58:16:9d:fc:4c:3f:cf:0c:79:60:b7:c8:44:88:e5:1e: c9:0a:83:b1:6c:12:dc:80:41:ca:5a:fc:fe:84:39:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:24:23:b1:61:c9:75:e8:d0:9b:0c:1a:76:ae:6a:56: be:14:6b:ea:ca:4f:60:d7:ab:72:7f:82:d3:bc:68:18: 11:30:c8:ff:29:64:e0:44:1a:a0:24:09:48:5a:d2:bc: 3c:b9:c6:57:9d:6e:14:8f:a7:d7:08:e2:9b:fb:51:c6: 6b:d8:de:ae:56:b5:e9:a2:56:76:d8:71:3d:dd:c1:73: 41:5f:4f:c5:9e:6a:4e:5e:f2:f9:c2:a6:04:49:80:88: 46:d6:99:81:e1:0e:c5:0a:68:70:63:1d:91:95:d2:93: e3:0c:dc:e0:41:36:80:bd:42:4d:6a:a3:4f:d8:7e:e6: e4:4a:26:82:19:2b:5f:ae:60:ec:3a:a8:e5:1f:06:d7: 65:53:b7:b4:9a:17:41:af:9d:80:61:5f:45:11:ea:54: f1:b2:f3:40:22:0d:51:66:26:35:16:37:c4:d1:d7:58: 74:f0:c1:9d:71:02:e7:de:84:b8:2c:1a:b8:f5:9b:55: b6:86:f6:39:f4:a8:c6:51:1d:e5:e4:0f:b7:98:d1:b8: d0:46:24:f5:17:76:35:34:e0:50:31:1a:d2:4b:70:c6: 88:ec:c0:30:0b:c4:87:c4:36:82:c3:25:d4:39:04:d4: 2e:19:49:12:22:3c:2f:26:ba:d8:46:6c:8b:f6:06:d9 Fingerprint (SHA-256): 6F:B1:92:79:2F:98:EA:37:2A:12:62:4B:46:6A:6A:46:E5:A8:6C:4E:47:1E:85:7A:8A:F5:0D:74:CB:48:F5:20 Fingerprint (SHA1): E0:43:21:F2:DC:74:57:98:48:F2:2B:E7:B9:FE:BE:AD:8C:0C:21:0A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #6258: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6259: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122652 (0x1e67da9c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:27:36 2017 Not After : Tue May 10 12:27:36 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 99:61:13:de:54:c2:d5:ae:1c:8e:da:9c:d6:ee:80:b7: 9e:df:b2:10:46:c8:13:3c:26:b1:18:b4:2d:85:1a:ec: 28:30:cc:cd:27:c1:e8:ce:0d:12:19:d6:bc:c7:ae:6e: 65:56:5d:b1:27:ec:df:80:9b:9d:c8:28:13:06:1b:19: 4e:90:fb:01:3d:80:0b:30:db:cf:ab:d9:9e:5d:d0:a6: 9e:6c:4d:07:a4:a1:f9:b1:23:92:9c:5c:4e:84:04:e1: 37:cc:31:c6:fb:1a:58:fe:55:ee:4e:f2:7c:5d:d0:f2: 02:2d:d3:45:12:38:a1:8f:a2:cf:79:f0:01:45:a0:55: 6f:1d:01:f2:b8:07:47:f7:7c:cc:c8:9f:f5:9a:c6:9e: 03:14:56:b5:ed:cc:ae:ea:df:ac:a3:c8:ee:70:90:87: 6c:94:3d:f3:8f:63:b5:54:13:e9:93:dd:cd:06:9c:38: 5f:43:57:c0:c3:71:0b:9b:a0:d7:dd:79:ca:9d:cd:4b: aa:1d:b7:1a:35:3f:77:9c:06:f2:61:31:8a:27:be:70: 55:c6:50:0e:43:18:48:d9:66:3c:94:63:7e:5a:47:42: 60:be:93:ba:83:e6:fe:26:29:61:01:fb:14:ec:e6:f3: 64:4c:1e:53:e3:4a:8e:3c:dd:58:1e:dd:c8:d8:0d:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:11:97:3a:94:44:61:67:47:00:c4:df:d4:85:d6:df: 6f:6a:2a:e4:a1:28:9b:7e:88:0d:71:0c:32:8d:80:b3: 11:17:0d:80:d0:3c:b7:ee:32:a9:74:b6:23:51:90:05: f9:74:ce:03:1a:05:b6:fe:5c:f3:3a:32:48:dd:82:c1: 2d:a1:ce:8d:89:89:ba:33:50:e1:aa:08:f0:67:ae:3c: 25:71:55:de:ad:6f:08:58:6c:93:96:9e:92:84:3b:c2: ee:63:d0:a4:e1:8a:ad:85:24:1c:c5:c6:b8:69:3e:bd: 3c:8c:4f:49:39:d9:bf:7c:74:e3:65:66:33:b3:bf:9a: dc:3e:41:ee:43:3d:77:32:9f:76:e6:38:ee:ad:95:31: 7c:8b:2f:72:c6:57:b0:e7:fc:f2:16:ed:ca:74:7f:d6: f2:15:de:33:6a:f1:fe:ca:4d:33:ef:1e:7c:f7:e0:93: 50:92:75:1d:7d:fc:59:20:81:34:a6:f9:bb:fb:d3:f2: db:48:bd:1e:14:1c:80:40:62:76:06:03:40:96:92:2f: 6b:b7:6a:c9:28:66:03:69:b2:8b:0e:1a:ce:68:05:25: 35:04:5a:a7:a4:37:83:3b:12:3c:2b:eb:96:d9:14:66: ad:61:65:a5:f0:50:16:e3:92:af:ce:18:ac:7d:ac:4c Fingerprint (SHA-256): A5:E0:C5:90:46:C8:16:31:6B:3D:D6:A3:60:CF:8C:7A:1D:75:15:E4:95:1B:E9:CE:C1:1D:DD:60:2C:57:F8:24 Fingerprint (SHA1): DA:B2:97:34:0C:8D:45:CC:24:50:D5:92:21:53:80:23:BB:35:E1:41 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #6260: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6261: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #6262: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #6263: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #6264: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122650 (0x1e67da9a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:27:32 2017 Not After : Tue May 10 12:27:32 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:a3:75:43:fc:c4:d8:ad:6c:77:30:61:a8:04:37:b3: f0:b8:bc:92:b0:be:34:03:f7:3c:79:91:2b:88:9a:72: 68:ae:ba:e4:a6:43:22:ff:c4:16:4d:11:ed:1e:7a:c2: 1c:f9:6c:f0:ec:85:7b:02:bf:57:70:01:d0:98:4b:cf: 44:23:c9:19:a8:8d:4f:6d:20:c5:15:14:67:88:ef:1b: 78:48:c4:5c:28:af:c2:f1:1d:9f:1d:91:f7:fb:a5:c1: 2f:35:54:c7:e6:71:e6:c1:cb:84:f6:35:86:c4:9e:53: 69:a1:7f:e1:9e:15:7a:0a:70:b5:57:dc:94:f6:74:f6: bf:d2:44:72:7d:17:26:e3:6f:71:a7:54:50:4e:71:43: cf:8a:94:07:68:5b:c1:f4:14:d2:9a:e0:11:86:b4:5f: ff:1b:b7:d6:94:92:cc:cd:b4:5a:6e:61:f2:de:d5:22: d9:85:0a:40:ef:cd:aa:d5:7a:65:80:13:90:55:33:46: d1:bb:28:12:e9:a9:63:d6:85:61:20:f6:dc:ae:d5:ef: 67:3d:24:39:c3:39:81:e4:15:a9:1d:a9:3a:d7:64:71: 6e:80:99:a1:51:55:2f:af:f1:03:14:06:31:d1:0d:e0: 5c:c7:d9:43:10:92:26:7d:87:f4:a9:2d:16:e6:c2:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:3d:9c:43:5c:fa:86:ff:83:48:93:d8:b0:b3:5c:5d: 6a:f0:b2:0d:dc:db:eb:c2:f2:dd:93:0a:22:92:50:82: d3:5f:f8:f4:2a:52:05:8c:e3:2f:f8:3f:83:5a:a0:e8: d6:46:9e:69:0d:54:1b:f6:32:22:2e:c5:82:f3:e4:2d: 0f:23:b5:9d:dc:64:67:4e:ab:fa:51:0d:28:cc:8d:ce: b9:14:ce:cb:f3:93:8c:18:b7:01:60:ce:94:79:d6:c6: 28:50:97:e4:39:a2:d7:03:f8:1e:05:3b:ec:bb:26:cd: 7d:03:85:4e:e8:bb:3a:04:9e:93:33:e8:d7:7b:93:9e: 86:20:d2:c1:0d:cb:7b:8d:5b:79:18:ce:52:fe:fb:1c: bd:88:ef:7b:96:3c:33:25:45:9f:b2:86:ab:a7:cf:45: f0:fa:c2:36:8d:8c:c9:e7:a1:fc:73:55:0b:f0:19:0b: 34:e9:96:95:01:3e:22:19:d3:ad:ab:51:43:6c:b3:28: b4:58:08:8f:5d:d8:57:1d:0b:92:c1:e8:6b:e1:04:ce: c6:0b:aa:71:7a:73:78:83:c1:71:69:7c:64:85:31:fa: 85:eb:39:44:c5:4a:4e:73:97:fe:17:ad:7a:77:e1:6c: 40:7a:5d:56:21:e6:a6:f0:9c:9d:b5:64:eb:4e:04:90 Fingerprint (SHA-256): BD:FD:5B:1F:13:02:5B:CB:E9:6C:BD:97:A7:2C:50:50:13:B1:7E:D5:41:80:26:5B:3A:3C:07:D6:06:17:27:30 Fingerprint (SHA1): A5:5A:69:E2:69:15:C4:7E:ED:6D:BD:94:C8:0F:6B:4A:19:19:B9:6E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6265: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6266: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122651 (0x1e67da9b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:27:33 2017 Not After : Tue May 10 12:27:33 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:ab:d0:19:77:d6:95:b2:16:a8:19:08:dc:04:3c:1e: 2d:35:65:2a:5e:2b:31:33:c9:b8:2e:aa:fb:06:ab:d6: 5f:e2:cd:bd:4f:28:e8:22:8a:f8:56:ac:46:5a:21:73: 77:39:b8:9b:5b:08:7f:1b:1c:a3:5c:4f:28:ae:0b:b0: 7e:94:39:90:c4:07:83:42:8f:fe:39:d3:32:66:04:5f: 51:74:af:76:60:02:14:ec:22:a9:f7:7c:09:1f:60:35: b1:36:81:46:82:70:87:d8:ab:4c:14:51:da:9b:43:d5: 5b:f9:da:3f:7c:e6:cd:b5:f1:5b:81:3f:31:79:60:d1: e4:05:9a:78:01:ac:ca:65:3e:60:a1:18:1c:4e:94:19: f0:b0:1c:33:b6:f7:f1:7a:c5:81:6f:d9:21:aa:6d:9f: 89:e4:29:d0:79:67:ff:2f:a7:42:0f:9c:07:dd:ba:a6: 49:de:c3:8c:6a:7c:19:c2:ad:14:9b:6a:44:65:22:c2: 7d:24:f4:cf:7e:16:dd:0c:81:73:b8:a7:e3:9a:93:69: c8:ac:3e:46:23:5b:28:24:f6:c2:8b:1b:ad:f3:0f:99: 58:16:9d:fc:4c:3f:cf:0c:79:60:b7:c8:44:88:e5:1e: c9:0a:83:b1:6c:12:dc:80:41:ca:5a:fc:fe:84:39:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:24:23:b1:61:c9:75:e8:d0:9b:0c:1a:76:ae:6a:56: be:14:6b:ea:ca:4f:60:d7:ab:72:7f:82:d3:bc:68:18: 11:30:c8:ff:29:64:e0:44:1a:a0:24:09:48:5a:d2:bc: 3c:b9:c6:57:9d:6e:14:8f:a7:d7:08:e2:9b:fb:51:c6: 6b:d8:de:ae:56:b5:e9:a2:56:76:d8:71:3d:dd:c1:73: 41:5f:4f:c5:9e:6a:4e:5e:f2:f9:c2:a6:04:49:80:88: 46:d6:99:81:e1:0e:c5:0a:68:70:63:1d:91:95:d2:93: e3:0c:dc:e0:41:36:80:bd:42:4d:6a:a3:4f:d8:7e:e6: e4:4a:26:82:19:2b:5f:ae:60:ec:3a:a8:e5:1f:06:d7: 65:53:b7:b4:9a:17:41:af:9d:80:61:5f:45:11:ea:54: f1:b2:f3:40:22:0d:51:66:26:35:16:37:c4:d1:d7:58: 74:f0:c1:9d:71:02:e7:de:84:b8:2c:1a:b8:f5:9b:55: b6:86:f6:39:f4:a8:c6:51:1d:e5:e4:0f:b7:98:d1:b8: d0:46:24:f5:17:76:35:34:e0:50:31:1a:d2:4b:70:c6: 88:ec:c0:30:0b:c4:87:c4:36:82:c3:25:d4:39:04:d4: 2e:19:49:12:22:3c:2f:26:ba:d8:46:6c:8b:f6:06:d9 Fingerprint (SHA-256): 6F:B1:92:79:2F:98:EA:37:2A:12:62:4B:46:6A:6A:46:E5:A8:6C:4E:47:1E:85:7A:8A:F5:0D:74:CB:48:F5:20 Fingerprint (SHA1): E0:43:21:F2:DC:74:57:98:48:F2:2B:E7:B9:FE:BE:AD:8C:0C:21:0A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #6267: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6268: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122652 (0x1e67da9c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:27:36 2017 Not After : Tue May 10 12:27:36 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 99:61:13:de:54:c2:d5:ae:1c:8e:da:9c:d6:ee:80:b7: 9e:df:b2:10:46:c8:13:3c:26:b1:18:b4:2d:85:1a:ec: 28:30:cc:cd:27:c1:e8:ce:0d:12:19:d6:bc:c7:ae:6e: 65:56:5d:b1:27:ec:df:80:9b:9d:c8:28:13:06:1b:19: 4e:90:fb:01:3d:80:0b:30:db:cf:ab:d9:9e:5d:d0:a6: 9e:6c:4d:07:a4:a1:f9:b1:23:92:9c:5c:4e:84:04:e1: 37:cc:31:c6:fb:1a:58:fe:55:ee:4e:f2:7c:5d:d0:f2: 02:2d:d3:45:12:38:a1:8f:a2:cf:79:f0:01:45:a0:55: 6f:1d:01:f2:b8:07:47:f7:7c:cc:c8:9f:f5:9a:c6:9e: 03:14:56:b5:ed:cc:ae:ea:df:ac:a3:c8:ee:70:90:87: 6c:94:3d:f3:8f:63:b5:54:13:e9:93:dd:cd:06:9c:38: 5f:43:57:c0:c3:71:0b:9b:a0:d7:dd:79:ca:9d:cd:4b: aa:1d:b7:1a:35:3f:77:9c:06:f2:61:31:8a:27:be:70: 55:c6:50:0e:43:18:48:d9:66:3c:94:63:7e:5a:47:42: 60:be:93:ba:83:e6:fe:26:29:61:01:fb:14:ec:e6:f3: 64:4c:1e:53:e3:4a:8e:3c:dd:58:1e:dd:c8:d8:0d:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:11:97:3a:94:44:61:67:47:00:c4:df:d4:85:d6:df: 6f:6a:2a:e4:a1:28:9b:7e:88:0d:71:0c:32:8d:80:b3: 11:17:0d:80:d0:3c:b7:ee:32:a9:74:b6:23:51:90:05: f9:74:ce:03:1a:05:b6:fe:5c:f3:3a:32:48:dd:82:c1: 2d:a1:ce:8d:89:89:ba:33:50:e1:aa:08:f0:67:ae:3c: 25:71:55:de:ad:6f:08:58:6c:93:96:9e:92:84:3b:c2: ee:63:d0:a4:e1:8a:ad:85:24:1c:c5:c6:b8:69:3e:bd: 3c:8c:4f:49:39:d9:bf:7c:74:e3:65:66:33:b3:bf:9a: dc:3e:41:ee:43:3d:77:32:9f:76:e6:38:ee:ad:95:31: 7c:8b:2f:72:c6:57:b0:e7:fc:f2:16:ed:ca:74:7f:d6: f2:15:de:33:6a:f1:fe:ca:4d:33:ef:1e:7c:f7:e0:93: 50:92:75:1d:7d:fc:59:20:81:34:a6:f9:bb:fb:d3:f2: db:48:bd:1e:14:1c:80:40:62:76:06:03:40:96:92:2f: 6b:b7:6a:c9:28:66:03:69:b2:8b:0e:1a:ce:68:05:25: 35:04:5a:a7:a4:37:83:3b:12:3c:2b:eb:96:d9:14:66: ad:61:65:a5:f0:50:16:e3:92:af:ce:18:ac:7d:ac:4c Fingerprint (SHA-256): A5:E0:C5:90:46:C8:16:31:6B:3D:D6:A3:60:CF:8C:7A:1D:75:15:E4:95:1B:E9:CE:C1:1D:DD:60:2C:57:F8:24 Fingerprint (SHA1): DA:B2:97:34:0C:8D:45:CC:24:50:D5:92:21:53:80:23:BB:35:E1:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #6269: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6270: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122650 (0x1e67da9a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:27:32 2017 Not After : Tue May 10 12:27:32 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:a3:75:43:fc:c4:d8:ad:6c:77:30:61:a8:04:37:b3: f0:b8:bc:92:b0:be:34:03:f7:3c:79:91:2b:88:9a:72: 68:ae:ba:e4:a6:43:22:ff:c4:16:4d:11:ed:1e:7a:c2: 1c:f9:6c:f0:ec:85:7b:02:bf:57:70:01:d0:98:4b:cf: 44:23:c9:19:a8:8d:4f:6d:20:c5:15:14:67:88:ef:1b: 78:48:c4:5c:28:af:c2:f1:1d:9f:1d:91:f7:fb:a5:c1: 2f:35:54:c7:e6:71:e6:c1:cb:84:f6:35:86:c4:9e:53: 69:a1:7f:e1:9e:15:7a:0a:70:b5:57:dc:94:f6:74:f6: bf:d2:44:72:7d:17:26:e3:6f:71:a7:54:50:4e:71:43: cf:8a:94:07:68:5b:c1:f4:14:d2:9a:e0:11:86:b4:5f: ff:1b:b7:d6:94:92:cc:cd:b4:5a:6e:61:f2:de:d5:22: d9:85:0a:40:ef:cd:aa:d5:7a:65:80:13:90:55:33:46: d1:bb:28:12:e9:a9:63:d6:85:61:20:f6:dc:ae:d5:ef: 67:3d:24:39:c3:39:81:e4:15:a9:1d:a9:3a:d7:64:71: 6e:80:99:a1:51:55:2f:af:f1:03:14:06:31:d1:0d:e0: 5c:c7:d9:43:10:92:26:7d:87:f4:a9:2d:16:e6:c2:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:3d:9c:43:5c:fa:86:ff:83:48:93:d8:b0:b3:5c:5d: 6a:f0:b2:0d:dc:db:eb:c2:f2:dd:93:0a:22:92:50:82: d3:5f:f8:f4:2a:52:05:8c:e3:2f:f8:3f:83:5a:a0:e8: d6:46:9e:69:0d:54:1b:f6:32:22:2e:c5:82:f3:e4:2d: 0f:23:b5:9d:dc:64:67:4e:ab:fa:51:0d:28:cc:8d:ce: b9:14:ce:cb:f3:93:8c:18:b7:01:60:ce:94:79:d6:c6: 28:50:97:e4:39:a2:d7:03:f8:1e:05:3b:ec:bb:26:cd: 7d:03:85:4e:e8:bb:3a:04:9e:93:33:e8:d7:7b:93:9e: 86:20:d2:c1:0d:cb:7b:8d:5b:79:18:ce:52:fe:fb:1c: bd:88:ef:7b:96:3c:33:25:45:9f:b2:86:ab:a7:cf:45: f0:fa:c2:36:8d:8c:c9:e7:a1:fc:73:55:0b:f0:19:0b: 34:e9:96:95:01:3e:22:19:d3:ad:ab:51:43:6c:b3:28: b4:58:08:8f:5d:d8:57:1d:0b:92:c1:e8:6b:e1:04:ce: c6:0b:aa:71:7a:73:78:83:c1:71:69:7c:64:85:31:fa: 85:eb:39:44:c5:4a:4e:73:97:fe:17:ad:7a:77:e1:6c: 40:7a:5d:56:21:e6:a6:f0:9c:9d:b5:64:eb:4e:04:90 Fingerprint (SHA-256): BD:FD:5B:1F:13:02:5B:CB:E9:6C:BD:97:A7:2C:50:50:13:B1:7E:D5:41:80:26:5B:3A:3C:07:D6:06:17:27:30 Fingerprint (SHA1): A5:5A:69:E2:69:15:C4:7E:ED:6D:BD:94:C8:0F:6B:4A:19:19:B9:6E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6271: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122650 (0x1e67da9a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:27:32 2017 Not After : Tue May 10 12:27:32 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:a3:75:43:fc:c4:d8:ad:6c:77:30:61:a8:04:37:b3: f0:b8:bc:92:b0:be:34:03:f7:3c:79:91:2b:88:9a:72: 68:ae:ba:e4:a6:43:22:ff:c4:16:4d:11:ed:1e:7a:c2: 1c:f9:6c:f0:ec:85:7b:02:bf:57:70:01:d0:98:4b:cf: 44:23:c9:19:a8:8d:4f:6d:20:c5:15:14:67:88:ef:1b: 78:48:c4:5c:28:af:c2:f1:1d:9f:1d:91:f7:fb:a5:c1: 2f:35:54:c7:e6:71:e6:c1:cb:84:f6:35:86:c4:9e:53: 69:a1:7f:e1:9e:15:7a:0a:70:b5:57:dc:94:f6:74:f6: bf:d2:44:72:7d:17:26:e3:6f:71:a7:54:50:4e:71:43: cf:8a:94:07:68:5b:c1:f4:14:d2:9a:e0:11:86:b4:5f: ff:1b:b7:d6:94:92:cc:cd:b4:5a:6e:61:f2:de:d5:22: d9:85:0a:40:ef:cd:aa:d5:7a:65:80:13:90:55:33:46: d1:bb:28:12:e9:a9:63:d6:85:61:20:f6:dc:ae:d5:ef: 67:3d:24:39:c3:39:81:e4:15:a9:1d:a9:3a:d7:64:71: 6e:80:99:a1:51:55:2f:af:f1:03:14:06:31:d1:0d:e0: 5c:c7:d9:43:10:92:26:7d:87:f4:a9:2d:16:e6:c2:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:3d:9c:43:5c:fa:86:ff:83:48:93:d8:b0:b3:5c:5d: 6a:f0:b2:0d:dc:db:eb:c2:f2:dd:93:0a:22:92:50:82: d3:5f:f8:f4:2a:52:05:8c:e3:2f:f8:3f:83:5a:a0:e8: d6:46:9e:69:0d:54:1b:f6:32:22:2e:c5:82:f3:e4:2d: 0f:23:b5:9d:dc:64:67:4e:ab:fa:51:0d:28:cc:8d:ce: b9:14:ce:cb:f3:93:8c:18:b7:01:60:ce:94:79:d6:c6: 28:50:97:e4:39:a2:d7:03:f8:1e:05:3b:ec:bb:26:cd: 7d:03:85:4e:e8:bb:3a:04:9e:93:33:e8:d7:7b:93:9e: 86:20:d2:c1:0d:cb:7b:8d:5b:79:18:ce:52:fe:fb:1c: bd:88:ef:7b:96:3c:33:25:45:9f:b2:86:ab:a7:cf:45: f0:fa:c2:36:8d:8c:c9:e7:a1:fc:73:55:0b:f0:19:0b: 34:e9:96:95:01:3e:22:19:d3:ad:ab:51:43:6c:b3:28: b4:58:08:8f:5d:d8:57:1d:0b:92:c1:e8:6b:e1:04:ce: c6:0b:aa:71:7a:73:78:83:c1:71:69:7c:64:85:31:fa: 85:eb:39:44:c5:4a:4e:73:97:fe:17:ad:7a:77:e1:6c: 40:7a:5d:56:21:e6:a6:f0:9c:9d:b5:64:eb:4e:04:90 Fingerprint (SHA-256): BD:FD:5B:1F:13:02:5B:CB:E9:6C:BD:97:A7:2C:50:50:13:B1:7E:D5:41:80:26:5B:3A:3C:07:D6:06:17:27:30 Fingerprint (SHA1): A5:5A:69:E2:69:15:C4:7E:ED:6D:BD:94:C8:0F:6B:4A:19:19:B9:6E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6272: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122651 (0x1e67da9b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:27:33 2017 Not After : Tue May 10 12:27:33 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:ab:d0:19:77:d6:95:b2:16:a8:19:08:dc:04:3c:1e: 2d:35:65:2a:5e:2b:31:33:c9:b8:2e:aa:fb:06:ab:d6: 5f:e2:cd:bd:4f:28:e8:22:8a:f8:56:ac:46:5a:21:73: 77:39:b8:9b:5b:08:7f:1b:1c:a3:5c:4f:28:ae:0b:b0: 7e:94:39:90:c4:07:83:42:8f:fe:39:d3:32:66:04:5f: 51:74:af:76:60:02:14:ec:22:a9:f7:7c:09:1f:60:35: b1:36:81:46:82:70:87:d8:ab:4c:14:51:da:9b:43:d5: 5b:f9:da:3f:7c:e6:cd:b5:f1:5b:81:3f:31:79:60:d1: e4:05:9a:78:01:ac:ca:65:3e:60:a1:18:1c:4e:94:19: f0:b0:1c:33:b6:f7:f1:7a:c5:81:6f:d9:21:aa:6d:9f: 89:e4:29:d0:79:67:ff:2f:a7:42:0f:9c:07:dd:ba:a6: 49:de:c3:8c:6a:7c:19:c2:ad:14:9b:6a:44:65:22:c2: 7d:24:f4:cf:7e:16:dd:0c:81:73:b8:a7:e3:9a:93:69: c8:ac:3e:46:23:5b:28:24:f6:c2:8b:1b:ad:f3:0f:99: 58:16:9d:fc:4c:3f:cf:0c:79:60:b7:c8:44:88:e5:1e: c9:0a:83:b1:6c:12:dc:80:41:ca:5a:fc:fe:84:39:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:24:23:b1:61:c9:75:e8:d0:9b:0c:1a:76:ae:6a:56: be:14:6b:ea:ca:4f:60:d7:ab:72:7f:82:d3:bc:68:18: 11:30:c8:ff:29:64:e0:44:1a:a0:24:09:48:5a:d2:bc: 3c:b9:c6:57:9d:6e:14:8f:a7:d7:08:e2:9b:fb:51:c6: 6b:d8:de:ae:56:b5:e9:a2:56:76:d8:71:3d:dd:c1:73: 41:5f:4f:c5:9e:6a:4e:5e:f2:f9:c2:a6:04:49:80:88: 46:d6:99:81:e1:0e:c5:0a:68:70:63:1d:91:95:d2:93: e3:0c:dc:e0:41:36:80:bd:42:4d:6a:a3:4f:d8:7e:e6: e4:4a:26:82:19:2b:5f:ae:60:ec:3a:a8:e5:1f:06:d7: 65:53:b7:b4:9a:17:41:af:9d:80:61:5f:45:11:ea:54: f1:b2:f3:40:22:0d:51:66:26:35:16:37:c4:d1:d7:58: 74:f0:c1:9d:71:02:e7:de:84:b8:2c:1a:b8:f5:9b:55: b6:86:f6:39:f4:a8:c6:51:1d:e5:e4:0f:b7:98:d1:b8: d0:46:24:f5:17:76:35:34:e0:50:31:1a:d2:4b:70:c6: 88:ec:c0:30:0b:c4:87:c4:36:82:c3:25:d4:39:04:d4: 2e:19:49:12:22:3c:2f:26:ba:d8:46:6c:8b:f6:06:d9 Fingerprint (SHA-256): 6F:B1:92:79:2F:98:EA:37:2A:12:62:4B:46:6A:6A:46:E5:A8:6C:4E:47:1E:85:7A:8A:F5:0D:74:CB:48:F5:20 Fingerprint (SHA1): E0:43:21:F2:DC:74:57:98:48:F2:2B:E7:B9:FE:BE:AD:8C:0C:21:0A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #6273: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122651 (0x1e67da9b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:27:33 2017 Not After : Tue May 10 12:27:33 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:ab:d0:19:77:d6:95:b2:16:a8:19:08:dc:04:3c:1e: 2d:35:65:2a:5e:2b:31:33:c9:b8:2e:aa:fb:06:ab:d6: 5f:e2:cd:bd:4f:28:e8:22:8a:f8:56:ac:46:5a:21:73: 77:39:b8:9b:5b:08:7f:1b:1c:a3:5c:4f:28:ae:0b:b0: 7e:94:39:90:c4:07:83:42:8f:fe:39:d3:32:66:04:5f: 51:74:af:76:60:02:14:ec:22:a9:f7:7c:09:1f:60:35: b1:36:81:46:82:70:87:d8:ab:4c:14:51:da:9b:43:d5: 5b:f9:da:3f:7c:e6:cd:b5:f1:5b:81:3f:31:79:60:d1: e4:05:9a:78:01:ac:ca:65:3e:60:a1:18:1c:4e:94:19: f0:b0:1c:33:b6:f7:f1:7a:c5:81:6f:d9:21:aa:6d:9f: 89:e4:29:d0:79:67:ff:2f:a7:42:0f:9c:07:dd:ba:a6: 49:de:c3:8c:6a:7c:19:c2:ad:14:9b:6a:44:65:22:c2: 7d:24:f4:cf:7e:16:dd:0c:81:73:b8:a7:e3:9a:93:69: c8:ac:3e:46:23:5b:28:24:f6:c2:8b:1b:ad:f3:0f:99: 58:16:9d:fc:4c:3f:cf:0c:79:60:b7:c8:44:88:e5:1e: c9:0a:83:b1:6c:12:dc:80:41:ca:5a:fc:fe:84:39:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:24:23:b1:61:c9:75:e8:d0:9b:0c:1a:76:ae:6a:56: be:14:6b:ea:ca:4f:60:d7:ab:72:7f:82:d3:bc:68:18: 11:30:c8:ff:29:64:e0:44:1a:a0:24:09:48:5a:d2:bc: 3c:b9:c6:57:9d:6e:14:8f:a7:d7:08:e2:9b:fb:51:c6: 6b:d8:de:ae:56:b5:e9:a2:56:76:d8:71:3d:dd:c1:73: 41:5f:4f:c5:9e:6a:4e:5e:f2:f9:c2:a6:04:49:80:88: 46:d6:99:81:e1:0e:c5:0a:68:70:63:1d:91:95:d2:93: e3:0c:dc:e0:41:36:80:bd:42:4d:6a:a3:4f:d8:7e:e6: e4:4a:26:82:19:2b:5f:ae:60:ec:3a:a8:e5:1f:06:d7: 65:53:b7:b4:9a:17:41:af:9d:80:61:5f:45:11:ea:54: f1:b2:f3:40:22:0d:51:66:26:35:16:37:c4:d1:d7:58: 74:f0:c1:9d:71:02:e7:de:84:b8:2c:1a:b8:f5:9b:55: b6:86:f6:39:f4:a8:c6:51:1d:e5:e4:0f:b7:98:d1:b8: d0:46:24:f5:17:76:35:34:e0:50:31:1a:d2:4b:70:c6: 88:ec:c0:30:0b:c4:87:c4:36:82:c3:25:d4:39:04:d4: 2e:19:49:12:22:3c:2f:26:ba:d8:46:6c:8b:f6:06:d9 Fingerprint (SHA-256): 6F:B1:92:79:2F:98:EA:37:2A:12:62:4B:46:6A:6A:46:E5:A8:6C:4E:47:1E:85:7A:8A:F5:0D:74:CB:48:F5:20 Fingerprint (SHA1): E0:43:21:F2:DC:74:57:98:48:F2:2B:E7:B9:FE:BE:AD:8C:0C:21:0A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #6274: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122652 (0x1e67da9c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:27:36 2017 Not After : Tue May 10 12:27:36 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 99:61:13:de:54:c2:d5:ae:1c:8e:da:9c:d6:ee:80:b7: 9e:df:b2:10:46:c8:13:3c:26:b1:18:b4:2d:85:1a:ec: 28:30:cc:cd:27:c1:e8:ce:0d:12:19:d6:bc:c7:ae:6e: 65:56:5d:b1:27:ec:df:80:9b:9d:c8:28:13:06:1b:19: 4e:90:fb:01:3d:80:0b:30:db:cf:ab:d9:9e:5d:d0:a6: 9e:6c:4d:07:a4:a1:f9:b1:23:92:9c:5c:4e:84:04:e1: 37:cc:31:c6:fb:1a:58:fe:55:ee:4e:f2:7c:5d:d0:f2: 02:2d:d3:45:12:38:a1:8f:a2:cf:79:f0:01:45:a0:55: 6f:1d:01:f2:b8:07:47:f7:7c:cc:c8:9f:f5:9a:c6:9e: 03:14:56:b5:ed:cc:ae:ea:df:ac:a3:c8:ee:70:90:87: 6c:94:3d:f3:8f:63:b5:54:13:e9:93:dd:cd:06:9c:38: 5f:43:57:c0:c3:71:0b:9b:a0:d7:dd:79:ca:9d:cd:4b: aa:1d:b7:1a:35:3f:77:9c:06:f2:61:31:8a:27:be:70: 55:c6:50:0e:43:18:48:d9:66:3c:94:63:7e:5a:47:42: 60:be:93:ba:83:e6:fe:26:29:61:01:fb:14:ec:e6:f3: 64:4c:1e:53:e3:4a:8e:3c:dd:58:1e:dd:c8:d8:0d:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:11:97:3a:94:44:61:67:47:00:c4:df:d4:85:d6:df: 6f:6a:2a:e4:a1:28:9b:7e:88:0d:71:0c:32:8d:80:b3: 11:17:0d:80:d0:3c:b7:ee:32:a9:74:b6:23:51:90:05: f9:74:ce:03:1a:05:b6:fe:5c:f3:3a:32:48:dd:82:c1: 2d:a1:ce:8d:89:89:ba:33:50:e1:aa:08:f0:67:ae:3c: 25:71:55:de:ad:6f:08:58:6c:93:96:9e:92:84:3b:c2: ee:63:d0:a4:e1:8a:ad:85:24:1c:c5:c6:b8:69:3e:bd: 3c:8c:4f:49:39:d9:bf:7c:74:e3:65:66:33:b3:bf:9a: dc:3e:41:ee:43:3d:77:32:9f:76:e6:38:ee:ad:95:31: 7c:8b:2f:72:c6:57:b0:e7:fc:f2:16:ed:ca:74:7f:d6: f2:15:de:33:6a:f1:fe:ca:4d:33:ef:1e:7c:f7:e0:93: 50:92:75:1d:7d:fc:59:20:81:34:a6:f9:bb:fb:d3:f2: db:48:bd:1e:14:1c:80:40:62:76:06:03:40:96:92:2f: 6b:b7:6a:c9:28:66:03:69:b2:8b:0e:1a:ce:68:05:25: 35:04:5a:a7:a4:37:83:3b:12:3c:2b:eb:96:d9:14:66: ad:61:65:a5:f0:50:16:e3:92:af:ce:18:ac:7d:ac:4c Fingerprint (SHA-256): A5:E0:C5:90:46:C8:16:31:6B:3D:D6:A3:60:CF:8C:7A:1D:75:15:E4:95:1B:E9:CE:C1:1D:DD:60:2C:57:F8:24 Fingerprint (SHA1): DA:B2:97:34:0C:8D:45:CC:24:50:D5:92:21:53:80:23:BB:35:E1:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #6275: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122652 (0x1e67da9c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:27:36 2017 Not After : Tue May 10 12:27:36 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 99:61:13:de:54:c2:d5:ae:1c:8e:da:9c:d6:ee:80:b7: 9e:df:b2:10:46:c8:13:3c:26:b1:18:b4:2d:85:1a:ec: 28:30:cc:cd:27:c1:e8:ce:0d:12:19:d6:bc:c7:ae:6e: 65:56:5d:b1:27:ec:df:80:9b:9d:c8:28:13:06:1b:19: 4e:90:fb:01:3d:80:0b:30:db:cf:ab:d9:9e:5d:d0:a6: 9e:6c:4d:07:a4:a1:f9:b1:23:92:9c:5c:4e:84:04:e1: 37:cc:31:c6:fb:1a:58:fe:55:ee:4e:f2:7c:5d:d0:f2: 02:2d:d3:45:12:38:a1:8f:a2:cf:79:f0:01:45:a0:55: 6f:1d:01:f2:b8:07:47:f7:7c:cc:c8:9f:f5:9a:c6:9e: 03:14:56:b5:ed:cc:ae:ea:df:ac:a3:c8:ee:70:90:87: 6c:94:3d:f3:8f:63:b5:54:13:e9:93:dd:cd:06:9c:38: 5f:43:57:c0:c3:71:0b:9b:a0:d7:dd:79:ca:9d:cd:4b: aa:1d:b7:1a:35:3f:77:9c:06:f2:61:31:8a:27:be:70: 55:c6:50:0e:43:18:48:d9:66:3c:94:63:7e:5a:47:42: 60:be:93:ba:83:e6:fe:26:29:61:01:fb:14:ec:e6:f3: 64:4c:1e:53:e3:4a:8e:3c:dd:58:1e:dd:c8:d8:0d:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:11:97:3a:94:44:61:67:47:00:c4:df:d4:85:d6:df: 6f:6a:2a:e4:a1:28:9b:7e:88:0d:71:0c:32:8d:80:b3: 11:17:0d:80:d0:3c:b7:ee:32:a9:74:b6:23:51:90:05: f9:74:ce:03:1a:05:b6:fe:5c:f3:3a:32:48:dd:82:c1: 2d:a1:ce:8d:89:89:ba:33:50:e1:aa:08:f0:67:ae:3c: 25:71:55:de:ad:6f:08:58:6c:93:96:9e:92:84:3b:c2: ee:63:d0:a4:e1:8a:ad:85:24:1c:c5:c6:b8:69:3e:bd: 3c:8c:4f:49:39:d9:bf:7c:74:e3:65:66:33:b3:bf:9a: dc:3e:41:ee:43:3d:77:32:9f:76:e6:38:ee:ad:95:31: 7c:8b:2f:72:c6:57:b0:e7:fc:f2:16:ed:ca:74:7f:d6: f2:15:de:33:6a:f1:fe:ca:4d:33:ef:1e:7c:f7:e0:93: 50:92:75:1d:7d:fc:59:20:81:34:a6:f9:bb:fb:d3:f2: db:48:bd:1e:14:1c:80:40:62:76:06:03:40:96:92:2f: 6b:b7:6a:c9:28:66:03:69:b2:8b:0e:1a:ce:68:05:25: 35:04:5a:a7:a4:37:83:3b:12:3c:2b:eb:96:d9:14:66: ad:61:65:a5:f0:50:16:e3:92:af:ce:18:ac:7d:ac:4c Fingerprint (SHA-256): A5:E0:C5:90:46:C8:16:31:6B:3D:D6:A3:60:CF:8C:7A:1D:75:15:E4:95:1B:E9:CE:C1:1D:DD:60:2C:57:F8:24 Fingerprint (SHA1): DA:B2:97:34:0C:8D:45:CC:24:50:D5:92:21:53:80:23:BB:35:E1:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #6276: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #6277: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122655 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6278: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #6279: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #6280: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6281: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 510122656 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6282: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6283: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #6284: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6285: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510122657 --extCP --extIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #6286: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6287: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #6288: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6289: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 510122658 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6290: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6291: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #6292: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6293: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 510122659 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6294: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6295: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #6296: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6297: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 510122660 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6298: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6299: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #6300: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6301: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 510122661 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6302: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6303: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #6304: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #6305: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #6306: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #6307: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #6308: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122655 (0x1e67da9f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:27:43 2017 Not After : Tue May 10 12:27:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:1d:22:9c:f4:ae:11:8a:ba:ec:de:f2:5a:a3:2c:6f: 33:8d:70:53:cf:6c:98:38:74:80:a1:0b:73:1a:ee:36: df:90:22:3a:69:87:1c:5e:cf:de:c5:a2:69:68:2c:b8: e1:58:f5:ce:44:8a:92:32:e8:52:9c:38:2e:81:49:4b: 7d:24:2a:cf:dc:af:7d:db:63:3d:a2:6e:4a:85:d3:24: a0:dc:eb:e4:1e:28:ef:b0:78:14:57:77:10:d7:f4:4f: 6d:b1:7c:fd:ae:0c:73:c9:09:67:c1:2f:e7:79:f0:9f: 6b:b2:a2:d8:7a:7f:83:65:e8:0d:90:e3:f8:c6:6a:4b: 13:e2:ac:a2:3a:46:15:97:eb:f8:39:c1:1c:f5:69:09: f8:54:62:74:f3:50:24:bd:9a:27:e4:53:45:28:ed:54: ef:25:a1:a3:92:96:2f:fb:0f:81:fa:f9:e4:2d:29:0b: 4e:28:ff:77:82:5b:9a:a8:a5:4d:06:d7:d5:c8:6e:c2: db:56:63:c8:8c:6b:a5:bf:25:9c:80:0f:f3:1d:2c:4a: f2:3d:17:60:8b:a6:5f:a7:f6:78:31:34:6a:a9:34:67: cd:f3:f0:ab:72:fb:79:f9:eb:c1:86:85:bc:d2:64:93: cb:10:95:2e:7d:30:e9:12:a9:65:57:a7:6b:30:59:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:dd:61:10:01:a0:c6:95:7b:ae:40:f5:96:a8:e4:5d: d5:da:19:d7:58:9f:e7:af:90:f2:72:b5:00:18:5a:4a: 7f:2f:ac:7a:a9:3a:52:d6:8b:6d:54:32:23:56:46:3f: 79:79:75:37:75:d9:92:fb:a3:af:b7:c5:24:02:44:72: ce:2e:62:a5:6f:2c:63:b7:ba:32:f1:87:fb:ae:15:db: d5:fd:6e:be:c6:82:5e:f6:a1:1c:0a:58:50:ac:e7:5d: 26:7e:6c:f4:f3:e7:87:1d:c9:12:4c:ce:9a:26:37:51: c7:ed:20:04:3d:37:54:b3:de:0c:60:da:cc:f4:5e:ed: 2b:6f:07:2f:62:09:a3:15:4a:4c:e9:31:3c:02:ed:b4: 95:3e:56:78:f9:36:0e:3a:b3:55:13:11:3a:b3:38:2f: ae:32:86:83:26:74:91:08:04:3d:35:93:64:c4:42:21: 3a:fe:36:53:5c:3d:ef:e1:05:b1:83:4c:78:df:41:8b: 4d:c4:96:2f:ff:28:b8:be:b4:84:bf:af:a7:86:9f:ed: 26:be:dc:69:30:b7:39:46:66:38:8f:d8:b4:07:3c:a4: 51:10:59:76:94:45:ea:ba:d2:d0:e9:6c:84:80:6b:f9: 36:c6:d4:f6:d0:c2:a4:be:17:fe:53:20:b8:2c:bb:9d Fingerprint (SHA-256): E9:B1:FD:17:8F:5D:8A:4F:13:F0:45:2A:35:18:E1:AB:6B:43:60:11:5E:3F:82:CC:B9:0F:BB:67:E9:3C:BA:D2 Fingerprint (SHA1): AD:5E:10:C3:4D:29:0F:C0:D2:92:B4:02:25:3D:4C:06:00:7F:C5:EA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6309: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6310: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6311: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6312: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122655 (0x1e67da9f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:27:43 2017 Not After : Tue May 10 12:27:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:1d:22:9c:f4:ae:11:8a:ba:ec:de:f2:5a:a3:2c:6f: 33:8d:70:53:cf:6c:98:38:74:80:a1:0b:73:1a:ee:36: df:90:22:3a:69:87:1c:5e:cf:de:c5:a2:69:68:2c:b8: e1:58:f5:ce:44:8a:92:32:e8:52:9c:38:2e:81:49:4b: 7d:24:2a:cf:dc:af:7d:db:63:3d:a2:6e:4a:85:d3:24: a0:dc:eb:e4:1e:28:ef:b0:78:14:57:77:10:d7:f4:4f: 6d:b1:7c:fd:ae:0c:73:c9:09:67:c1:2f:e7:79:f0:9f: 6b:b2:a2:d8:7a:7f:83:65:e8:0d:90:e3:f8:c6:6a:4b: 13:e2:ac:a2:3a:46:15:97:eb:f8:39:c1:1c:f5:69:09: f8:54:62:74:f3:50:24:bd:9a:27:e4:53:45:28:ed:54: ef:25:a1:a3:92:96:2f:fb:0f:81:fa:f9:e4:2d:29:0b: 4e:28:ff:77:82:5b:9a:a8:a5:4d:06:d7:d5:c8:6e:c2: db:56:63:c8:8c:6b:a5:bf:25:9c:80:0f:f3:1d:2c:4a: f2:3d:17:60:8b:a6:5f:a7:f6:78:31:34:6a:a9:34:67: cd:f3:f0:ab:72:fb:79:f9:eb:c1:86:85:bc:d2:64:93: cb:10:95:2e:7d:30:e9:12:a9:65:57:a7:6b:30:59:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:dd:61:10:01:a0:c6:95:7b:ae:40:f5:96:a8:e4:5d: d5:da:19:d7:58:9f:e7:af:90:f2:72:b5:00:18:5a:4a: 7f:2f:ac:7a:a9:3a:52:d6:8b:6d:54:32:23:56:46:3f: 79:79:75:37:75:d9:92:fb:a3:af:b7:c5:24:02:44:72: ce:2e:62:a5:6f:2c:63:b7:ba:32:f1:87:fb:ae:15:db: d5:fd:6e:be:c6:82:5e:f6:a1:1c:0a:58:50:ac:e7:5d: 26:7e:6c:f4:f3:e7:87:1d:c9:12:4c:ce:9a:26:37:51: c7:ed:20:04:3d:37:54:b3:de:0c:60:da:cc:f4:5e:ed: 2b:6f:07:2f:62:09:a3:15:4a:4c:e9:31:3c:02:ed:b4: 95:3e:56:78:f9:36:0e:3a:b3:55:13:11:3a:b3:38:2f: ae:32:86:83:26:74:91:08:04:3d:35:93:64:c4:42:21: 3a:fe:36:53:5c:3d:ef:e1:05:b1:83:4c:78:df:41:8b: 4d:c4:96:2f:ff:28:b8:be:b4:84:bf:af:a7:86:9f:ed: 26:be:dc:69:30:b7:39:46:66:38:8f:d8:b4:07:3c:a4: 51:10:59:76:94:45:ea:ba:d2:d0:e9:6c:84:80:6b:f9: 36:c6:d4:f6:d0:c2:a4:be:17:fe:53:20:b8:2c:bb:9d Fingerprint (SHA-256): E9:B1:FD:17:8F:5D:8A:4F:13:F0:45:2A:35:18:E1:AB:6B:43:60:11:5E:3F:82:CC:B9:0F:BB:67:E9:3C:BA:D2 Fingerprint (SHA1): AD:5E:10:C3:4D:29:0F:C0:D2:92:B4:02:25:3D:4C:06:00:7F:C5:EA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6313: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6314: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #6315: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122662 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6316: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #6317: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #6318: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6319: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 510122663 --extCP --extIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #6320: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6321: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #6322: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6323: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 510122664 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6324: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6325: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #6326: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6327: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 510122665 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6328: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6329: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #6330: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6331: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 510122666 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6332: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6333: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #6334: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6335: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 510122667 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6336: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6337: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #6338: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6339: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 510122668 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6340: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6341: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #6342: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6343: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 510122669 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6344: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6345: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #6346: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6347: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 510122670 --extCP --extIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #6348: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6349: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #6350: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6351: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 510122671 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6352: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6353: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #6354: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6355: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 510122672 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6356: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6357: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #6358: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6359: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 510122673 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6360: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6361: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #6362: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6363: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 510122674 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6364: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6365: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #6366: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6367: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 510122675 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6368: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6369: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #6370: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6371: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 510122676 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6372: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6373: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #6374: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6375: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 510122677 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6376: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6377: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #6378: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6379: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 510122678 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6380: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6381: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #6382: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6383: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 510122679 --extCP --extIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #6384: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6385: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #6386: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6387: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 510122680 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6388: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6389: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #6390: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6391: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 510122681 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6392: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6393: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #6394: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6395: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 510122682 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6396: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6397: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #6398: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6399: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 510122683 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6400: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6401: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #6402: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6403: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 510122684 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6404: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6405: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #6406: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6407: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 510122685 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6408: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6409: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #6410: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6411: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 510122686 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6412: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6413: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #6414: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6415: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 510122687 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6416: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6417: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #6418: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6419: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 510122688 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6420: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6421: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #6422: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6423: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 510122689 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6424: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6425: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #6426: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6427: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 510122690 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6428: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6429: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #6430: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6431: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 510122691 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6432: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6433: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #6434: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122662 (0x1e67daa6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:27:55 2017 Not After : Tue May 10 12:27:55 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:46:53:27:24:a1:af:8a:77:b5:d0:52:9b:9f:b0:20: d8:31:94:b8:7a:9b:0d:47:eb:c4:1b:b8:68:a0:68:01: 91:8d:24:3b:cc:4e:41:7b:74:d2:64:f0:97:a4:f1:7d: c7:3d:08:0d:49:18:d0:2f:03:d2:b4:87:18:df:f0:af: 51:1e:38:d0:71:75:3c:4c:30:ba:49:a1:d9:1e:ad:6b: e9:68:33:7c:da:49:14:b1:0e:c9:06:4b:d5:ab:c2:19: 9a:f3:f0:9d:ab:3d:2b:33:9c:fc:49:8b:2c:90:fd:49: 52:c3:48:78:0f:58:61:3e:b4:0b:f6:6f:01:33:f4:c3: b2:af:e5:a6:20:db:8a:15:af:7f:38:82:a9:48:85:b1: 05:b5:34:c2:93:9d:31:ad:c2:49:47:90:83:c1:5f:aa: c2:12:b3:b9:d5:21:fd:aa:43:e1:ac:f7:0d:68:7e:9e: ab:ec:f4:9d:ce:23:20:99:22:89:03:45:c5:81:3f:89: 9a:1e:6e:fa:7c:aa:d8:dc:ea:55:54:5e:e9:c3:ed:da: c5:b2:0f:e0:53:a2:fb:95:ce:0a:3d:4c:3b:ed:9b:f3: 0f:ba:64:e4:78:0c:50:4d:c8:1b:50:a5:5e:87:fd:5d: 37:37:70:ca:84:34:44:5c:bc:a2:03:87:53:6f:16:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:36:8e:ed:a3:37:f0:87:18:2a:b1:6e:e5:73:51:e8: 6a:d6:ee:e2:01:5f:f8:b1:3d:a3:4f:5c:58:7f:eb:44: 3e:b1:80:6c:f0:4e:9c:ad:ae:8c:da:fc:dc:95:75:af: 63:fb:15:d2:72:26:7b:fc:b6:04:d8:9a:23:c6:7e:ad: a5:f5:2c:fb:7c:4c:45:a1:ab:1c:c2:42:2f:41:dc:a2: 0f:26:a0:6d:f1:7f:c7:01:0a:34:5e:5d:ae:7a:be:bf: b3:02:9e:72:d6:8c:1d:c7:cb:e9:6e:5f:7b:2f:23:39: 71:e7:7a:8a:7a:92:2c:db:d4:a2:7f:48:ad:d5:ff:cd: fe:ab:6f:c5:8d:36:d9:97:d2:36:c8:72:28:89:80:46: dc:2a:68:70:2b:38:2c:71:2b:b3:2e:35:18:23:c9:f3: e6:9b:32:e5:ee:ab:a5:3b:5a:e4:fc:dc:13:2a:52:c9: 07:4d:f3:03:cf:90:89:3f:55:17:90:39:49:87:db:5c: 4f:c5:3f:55:2d:2b:df:7b:d1:2e:ce:4e:af:22:1e:9a: bd:f7:a7:87:1f:70:55:23:93:f4:c4:fb:be:f8:9b:2c: 4c:3b:92:a2:d4:f5:cf:3e:e1:03:de:a8:71:2c:a5:e0: 39:46:7f:18:65:42:c6:de:a9:92:ef:35:a1:d9:05:78 Fingerprint (SHA-256): EA:2C:4F:C7:A4:22:4A:73:A1:C0:F2:0A:E5:3E:8E:30:B9:35:49:D7:FC:BF:37:75:BB:CF:96:27:FF:82:25:63 Fingerprint (SHA1): 3F:97:68:39:F0:2A:CA:D5:21:34:D2:CE:58:E5:5C:10:73:2C:85:16 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6435: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6436: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122662 (0x1e67daa6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:27:55 2017 Not After : Tue May 10 12:27:55 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:46:53:27:24:a1:af:8a:77:b5:d0:52:9b:9f:b0:20: d8:31:94:b8:7a:9b:0d:47:eb:c4:1b:b8:68:a0:68:01: 91:8d:24:3b:cc:4e:41:7b:74:d2:64:f0:97:a4:f1:7d: c7:3d:08:0d:49:18:d0:2f:03:d2:b4:87:18:df:f0:af: 51:1e:38:d0:71:75:3c:4c:30:ba:49:a1:d9:1e:ad:6b: e9:68:33:7c:da:49:14:b1:0e:c9:06:4b:d5:ab:c2:19: 9a:f3:f0:9d:ab:3d:2b:33:9c:fc:49:8b:2c:90:fd:49: 52:c3:48:78:0f:58:61:3e:b4:0b:f6:6f:01:33:f4:c3: b2:af:e5:a6:20:db:8a:15:af:7f:38:82:a9:48:85:b1: 05:b5:34:c2:93:9d:31:ad:c2:49:47:90:83:c1:5f:aa: c2:12:b3:b9:d5:21:fd:aa:43:e1:ac:f7:0d:68:7e:9e: ab:ec:f4:9d:ce:23:20:99:22:89:03:45:c5:81:3f:89: 9a:1e:6e:fa:7c:aa:d8:dc:ea:55:54:5e:e9:c3:ed:da: c5:b2:0f:e0:53:a2:fb:95:ce:0a:3d:4c:3b:ed:9b:f3: 0f:ba:64:e4:78:0c:50:4d:c8:1b:50:a5:5e:87:fd:5d: 37:37:70:ca:84:34:44:5c:bc:a2:03:87:53:6f:16:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:36:8e:ed:a3:37:f0:87:18:2a:b1:6e:e5:73:51:e8: 6a:d6:ee:e2:01:5f:f8:b1:3d:a3:4f:5c:58:7f:eb:44: 3e:b1:80:6c:f0:4e:9c:ad:ae:8c:da:fc:dc:95:75:af: 63:fb:15:d2:72:26:7b:fc:b6:04:d8:9a:23:c6:7e:ad: a5:f5:2c:fb:7c:4c:45:a1:ab:1c:c2:42:2f:41:dc:a2: 0f:26:a0:6d:f1:7f:c7:01:0a:34:5e:5d:ae:7a:be:bf: b3:02:9e:72:d6:8c:1d:c7:cb:e9:6e:5f:7b:2f:23:39: 71:e7:7a:8a:7a:92:2c:db:d4:a2:7f:48:ad:d5:ff:cd: fe:ab:6f:c5:8d:36:d9:97:d2:36:c8:72:28:89:80:46: dc:2a:68:70:2b:38:2c:71:2b:b3:2e:35:18:23:c9:f3: e6:9b:32:e5:ee:ab:a5:3b:5a:e4:fc:dc:13:2a:52:c9: 07:4d:f3:03:cf:90:89:3f:55:17:90:39:49:87:db:5c: 4f:c5:3f:55:2d:2b:df:7b:d1:2e:ce:4e:af:22:1e:9a: bd:f7:a7:87:1f:70:55:23:93:f4:c4:fb:be:f8:9b:2c: 4c:3b:92:a2:d4:f5:cf:3e:e1:03:de:a8:71:2c:a5:e0: 39:46:7f:18:65:42:c6:de:a9:92:ef:35:a1:d9:05:78 Fingerprint (SHA-256): EA:2C:4F:C7:A4:22:4A:73:A1:C0:F2:0A:E5:3E:8E:30:B9:35:49:D7:FC:BF:37:75:BB:CF:96:27:FF:82:25:63 Fingerprint (SHA1): 3F:97:68:39:F0:2A:CA:D5:21:34:D2:CE:58:E5:5C:10:73:2C:85:16 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6437: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6438: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6439: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6440: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122662 (0x1e67daa6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:27:55 2017 Not After : Tue May 10 12:27:55 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:46:53:27:24:a1:af:8a:77:b5:d0:52:9b:9f:b0:20: d8:31:94:b8:7a:9b:0d:47:eb:c4:1b:b8:68:a0:68:01: 91:8d:24:3b:cc:4e:41:7b:74:d2:64:f0:97:a4:f1:7d: c7:3d:08:0d:49:18:d0:2f:03:d2:b4:87:18:df:f0:af: 51:1e:38:d0:71:75:3c:4c:30:ba:49:a1:d9:1e:ad:6b: e9:68:33:7c:da:49:14:b1:0e:c9:06:4b:d5:ab:c2:19: 9a:f3:f0:9d:ab:3d:2b:33:9c:fc:49:8b:2c:90:fd:49: 52:c3:48:78:0f:58:61:3e:b4:0b:f6:6f:01:33:f4:c3: b2:af:e5:a6:20:db:8a:15:af:7f:38:82:a9:48:85:b1: 05:b5:34:c2:93:9d:31:ad:c2:49:47:90:83:c1:5f:aa: c2:12:b3:b9:d5:21:fd:aa:43:e1:ac:f7:0d:68:7e:9e: ab:ec:f4:9d:ce:23:20:99:22:89:03:45:c5:81:3f:89: 9a:1e:6e:fa:7c:aa:d8:dc:ea:55:54:5e:e9:c3:ed:da: c5:b2:0f:e0:53:a2:fb:95:ce:0a:3d:4c:3b:ed:9b:f3: 0f:ba:64:e4:78:0c:50:4d:c8:1b:50:a5:5e:87:fd:5d: 37:37:70:ca:84:34:44:5c:bc:a2:03:87:53:6f:16:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:36:8e:ed:a3:37:f0:87:18:2a:b1:6e:e5:73:51:e8: 6a:d6:ee:e2:01:5f:f8:b1:3d:a3:4f:5c:58:7f:eb:44: 3e:b1:80:6c:f0:4e:9c:ad:ae:8c:da:fc:dc:95:75:af: 63:fb:15:d2:72:26:7b:fc:b6:04:d8:9a:23:c6:7e:ad: a5:f5:2c:fb:7c:4c:45:a1:ab:1c:c2:42:2f:41:dc:a2: 0f:26:a0:6d:f1:7f:c7:01:0a:34:5e:5d:ae:7a:be:bf: b3:02:9e:72:d6:8c:1d:c7:cb:e9:6e:5f:7b:2f:23:39: 71:e7:7a:8a:7a:92:2c:db:d4:a2:7f:48:ad:d5:ff:cd: fe:ab:6f:c5:8d:36:d9:97:d2:36:c8:72:28:89:80:46: dc:2a:68:70:2b:38:2c:71:2b:b3:2e:35:18:23:c9:f3: e6:9b:32:e5:ee:ab:a5:3b:5a:e4:fc:dc:13:2a:52:c9: 07:4d:f3:03:cf:90:89:3f:55:17:90:39:49:87:db:5c: 4f:c5:3f:55:2d:2b:df:7b:d1:2e:ce:4e:af:22:1e:9a: bd:f7:a7:87:1f:70:55:23:93:f4:c4:fb:be:f8:9b:2c: 4c:3b:92:a2:d4:f5:cf:3e:e1:03:de:a8:71:2c:a5:e0: 39:46:7f:18:65:42:c6:de:a9:92:ef:35:a1:d9:05:78 Fingerprint (SHA-256): EA:2C:4F:C7:A4:22:4A:73:A1:C0:F2:0A:E5:3E:8E:30:B9:35:49:D7:FC:BF:37:75:BB:CF:96:27:FF:82:25:63 Fingerprint (SHA1): 3F:97:68:39:F0:2A:CA:D5:21:34:D2:CE:58:E5:5C:10:73:2C:85:16 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6441: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6442: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6443: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6444: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122662 (0x1e67daa6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:27:55 2017 Not After : Tue May 10 12:27:55 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:46:53:27:24:a1:af:8a:77:b5:d0:52:9b:9f:b0:20: d8:31:94:b8:7a:9b:0d:47:eb:c4:1b:b8:68:a0:68:01: 91:8d:24:3b:cc:4e:41:7b:74:d2:64:f0:97:a4:f1:7d: c7:3d:08:0d:49:18:d0:2f:03:d2:b4:87:18:df:f0:af: 51:1e:38:d0:71:75:3c:4c:30:ba:49:a1:d9:1e:ad:6b: e9:68:33:7c:da:49:14:b1:0e:c9:06:4b:d5:ab:c2:19: 9a:f3:f0:9d:ab:3d:2b:33:9c:fc:49:8b:2c:90:fd:49: 52:c3:48:78:0f:58:61:3e:b4:0b:f6:6f:01:33:f4:c3: b2:af:e5:a6:20:db:8a:15:af:7f:38:82:a9:48:85:b1: 05:b5:34:c2:93:9d:31:ad:c2:49:47:90:83:c1:5f:aa: c2:12:b3:b9:d5:21:fd:aa:43:e1:ac:f7:0d:68:7e:9e: ab:ec:f4:9d:ce:23:20:99:22:89:03:45:c5:81:3f:89: 9a:1e:6e:fa:7c:aa:d8:dc:ea:55:54:5e:e9:c3:ed:da: c5:b2:0f:e0:53:a2:fb:95:ce:0a:3d:4c:3b:ed:9b:f3: 0f:ba:64:e4:78:0c:50:4d:c8:1b:50:a5:5e:87:fd:5d: 37:37:70:ca:84:34:44:5c:bc:a2:03:87:53:6f:16:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:36:8e:ed:a3:37:f0:87:18:2a:b1:6e:e5:73:51:e8: 6a:d6:ee:e2:01:5f:f8:b1:3d:a3:4f:5c:58:7f:eb:44: 3e:b1:80:6c:f0:4e:9c:ad:ae:8c:da:fc:dc:95:75:af: 63:fb:15:d2:72:26:7b:fc:b6:04:d8:9a:23:c6:7e:ad: a5:f5:2c:fb:7c:4c:45:a1:ab:1c:c2:42:2f:41:dc:a2: 0f:26:a0:6d:f1:7f:c7:01:0a:34:5e:5d:ae:7a:be:bf: b3:02:9e:72:d6:8c:1d:c7:cb:e9:6e:5f:7b:2f:23:39: 71:e7:7a:8a:7a:92:2c:db:d4:a2:7f:48:ad:d5:ff:cd: fe:ab:6f:c5:8d:36:d9:97:d2:36:c8:72:28:89:80:46: dc:2a:68:70:2b:38:2c:71:2b:b3:2e:35:18:23:c9:f3: e6:9b:32:e5:ee:ab:a5:3b:5a:e4:fc:dc:13:2a:52:c9: 07:4d:f3:03:cf:90:89:3f:55:17:90:39:49:87:db:5c: 4f:c5:3f:55:2d:2b:df:7b:d1:2e:ce:4e:af:22:1e:9a: bd:f7:a7:87:1f:70:55:23:93:f4:c4:fb:be:f8:9b:2c: 4c:3b:92:a2:d4:f5:cf:3e:e1:03:de:a8:71:2c:a5:e0: 39:46:7f:18:65:42:c6:de:a9:92:ef:35:a1:d9:05:78 Fingerprint (SHA-256): EA:2C:4F:C7:A4:22:4A:73:A1:C0:F2:0A:E5:3E:8E:30:B9:35:49:D7:FC:BF:37:75:BB:CF:96:27:FF:82:25:63 Fingerprint (SHA1): 3F:97:68:39:F0:2A:CA:D5:21:34:D2:CE:58:E5:5C:10:73:2C:85:16 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6445: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122662 (0x1e67daa6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:27:55 2017 Not After : Tue May 10 12:27:55 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:46:53:27:24:a1:af:8a:77:b5:d0:52:9b:9f:b0:20: d8:31:94:b8:7a:9b:0d:47:eb:c4:1b:b8:68:a0:68:01: 91:8d:24:3b:cc:4e:41:7b:74:d2:64:f0:97:a4:f1:7d: c7:3d:08:0d:49:18:d0:2f:03:d2:b4:87:18:df:f0:af: 51:1e:38:d0:71:75:3c:4c:30:ba:49:a1:d9:1e:ad:6b: e9:68:33:7c:da:49:14:b1:0e:c9:06:4b:d5:ab:c2:19: 9a:f3:f0:9d:ab:3d:2b:33:9c:fc:49:8b:2c:90:fd:49: 52:c3:48:78:0f:58:61:3e:b4:0b:f6:6f:01:33:f4:c3: b2:af:e5:a6:20:db:8a:15:af:7f:38:82:a9:48:85:b1: 05:b5:34:c2:93:9d:31:ad:c2:49:47:90:83:c1:5f:aa: c2:12:b3:b9:d5:21:fd:aa:43:e1:ac:f7:0d:68:7e:9e: ab:ec:f4:9d:ce:23:20:99:22:89:03:45:c5:81:3f:89: 9a:1e:6e:fa:7c:aa:d8:dc:ea:55:54:5e:e9:c3:ed:da: c5:b2:0f:e0:53:a2:fb:95:ce:0a:3d:4c:3b:ed:9b:f3: 0f:ba:64:e4:78:0c:50:4d:c8:1b:50:a5:5e:87:fd:5d: 37:37:70:ca:84:34:44:5c:bc:a2:03:87:53:6f:16:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:36:8e:ed:a3:37:f0:87:18:2a:b1:6e:e5:73:51:e8: 6a:d6:ee:e2:01:5f:f8:b1:3d:a3:4f:5c:58:7f:eb:44: 3e:b1:80:6c:f0:4e:9c:ad:ae:8c:da:fc:dc:95:75:af: 63:fb:15:d2:72:26:7b:fc:b6:04:d8:9a:23:c6:7e:ad: a5:f5:2c:fb:7c:4c:45:a1:ab:1c:c2:42:2f:41:dc:a2: 0f:26:a0:6d:f1:7f:c7:01:0a:34:5e:5d:ae:7a:be:bf: b3:02:9e:72:d6:8c:1d:c7:cb:e9:6e:5f:7b:2f:23:39: 71:e7:7a:8a:7a:92:2c:db:d4:a2:7f:48:ad:d5:ff:cd: fe:ab:6f:c5:8d:36:d9:97:d2:36:c8:72:28:89:80:46: dc:2a:68:70:2b:38:2c:71:2b:b3:2e:35:18:23:c9:f3: e6:9b:32:e5:ee:ab:a5:3b:5a:e4:fc:dc:13:2a:52:c9: 07:4d:f3:03:cf:90:89:3f:55:17:90:39:49:87:db:5c: 4f:c5:3f:55:2d:2b:df:7b:d1:2e:ce:4e:af:22:1e:9a: bd:f7:a7:87:1f:70:55:23:93:f4:c4:fb:be:f8:9b:2c: 4c:3b:92:a2:d4:f5:cf:3e:e1:03:de:a8:71:2c:a5:e0: 39:46:7f:18:65:42:c6:de:a9:92:ef:35:a1:d9:05:78 Fingerprint (SHA-256): EA:2C:4F:C7:A4:22:4A:73:A1:C0:F2:0A:E5:3E:8E:30:B9:35:49:D7:FC:BF:37:75:BB:CF:96:27:FF:82:25:63 Fingerprint (SHA1): 3F:97:68:39:F0:2A:CA:D5:21:34:D2:CE:58:E5:5C:10:73:2C:85:16 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6446: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6447: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122662 (0x1e67daa6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:27:55 2017 Not After : Tue May 10 12:27:55 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:46:53:27:24:a1:af:8a:77:b5:d0:52:9b:9f:b0:20: d8:31:94:b8:7a:9b:0d:47:eb:c4:1b:b8:68:a0:68:01: 91:8d:24:3b:cc:4e:41:7b:74:d2:64:f0:97:a4:f1:7d: c7:3d:08:0d:49:18:d0:2f:03:d2:b4:87:18:df:f0:af: 51:1e:38:d0:71:75:3c:4c:30:ba:49:a1:d9:1e:ad:6b: e9:68:33:7c:da:49:14:b1:0e:c9:06:4b:d5:ab:c2:19: 9a:f3:f0:9d:ab:3d:2b:33:9c:fc:49:8b:2c:90:fd:49: 52:c3:48:78:0f:58:61:3e:b4:0b:f6:6f:01:33:f4:c3: b2:af:e5:a6:20:db:8a:15:af:7f:38:82:a9:48:85:b1: 05:b5:34:c2:93:9d:31:ad:c2:49:47:90:83:c1:5f:aa: c2:12:b3:b9:d5:21:fd:aa:43:e1:ac:f7:0d:68:7e:9e: ab:ec:f4:9d:ce:23:20:99:22:89:03:45:c5:81:3f:89: 9a:1e:6e:fa:7c:aa:d8:dc:ea:55:54:5e:e9:c3:ed:da: c5:b2:0f:e0:53:a2:fb:95:ce:0a:3d:4c:3b:ed:9b:f3: 0f:ba:64:e4:78:0c:50:4d:c8:1b:50:a5:5e:87:fd:5d: 37:37:70:ca:84:34:44:5c:bc:a2:03:87:53:6f:16:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:36:8e:ed:a3:37:f0:87:18:2a:b1:6e:e5:73:51:e8: 6a:d6:ee:e2:01:5f:f8:b1:3d:a3:4f:5c:58:7f:eb:44: 3e:b1:80:6c:f0:4e:9c:ad:ae:8c:da:fc:dc:95:75:af: 63:fb:15:d2:72:26:7b:fc:b6:04:d8:9a:23:c6:7e:ad: a5:f5:2c:fb:7c:4c:45:a1:ab:1c:c2:42:2f:41:dc:a2: 0f:26:a0:6d:f1:7f:c7:01:0a:34:5e:5d:ae:7a:be:bf: b3:02:9e:72:d6:8c:1d:c7:cb:e9:6e:5f:7b:2f:23:39: 71:e7:7a:8a:7a:92:2c:db:d4:a2:7f:48:ad:d5:ff:cd: fe:ab:6f:c5:8d:36:d9:97:d2:36:c8:72:28:89:80:46: dc:2a:68:70:2b:38:2c:71:2b:b3:2e:35:18:23:c9:f3: e6:9b:32:e5:ee:ab:a5:3b:5a:e4:fc:dc:13:2a:52:c9: 07:4d:f3:03:cf:90:89:3f:55:17:90:39:49:87:db:5c: 4f:c5:3f:55:2d:2b:df:7b:d1:2e:ce:4e:af:22:1e:9a: bd:f7:a7:87:1f:70:55:23:93:f4:c4:fb:be:f8:9b:2c: 4c:3b:92:a2:d4:f5:cf:3e:e1:03:de:a8:71:2c:a5:e0: 39:46:7f:18:65:42:c6:de:a9:92:ef:35:a1:d9:05:78 Fingerprint (SHA-256): EA:2C:4F:C7:A4:22:4A:73:A1:C0:F2:0A:E5:3E:8E:30:B9:35:49:D7:FC:BF:37:75:BB:CF:96:27:FF:82:25:63 Fingerprint (SHA1): 3F:97:68:39:F0:2A:CA:D5:21:34:D2:CE:58:E5:5C:10:73:2C:85:16 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6448: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6449: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6450: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6451: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122662 (0x1e67daa6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:27:55 2017 Not After : Tue May 10 12:27:55 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:46:53:27:24:a1:af:8a:77:b5:d0:52:9b:9f:b0:20: d8:31:94:b8:7a:9b:0d:47:eb:c4:1b:b8:68:a0:68:01: 91:8d:24:3b:cc:4e:41:7b:74:d2:64:f0:97:a4:f1:7d: c7:3d:08:0d:49:18:d0:2f:03:d2:b4:87:18:df:f0:af: 51:1e:38:d0:71:75:3c:4c:30:ba:49:a1:d9:1e:ad:6b: e9:68:33:7c:da:49:14:b1:0e:c9:06:4b:d5:ab:c2:19: 9a:f3:f0:9d:ab:3d:2b:33:9c:fc:49:8b:2c:90:fd:49: 52:c3:48:78:0f:58:61:3e:b4:0b:f6:6f:01:33:f4:c3: b2:af:e5:a6:20:db:8a:15:af:7f:38:82:a9:48:85:b1: 05:b5:34:c2:93:9d:31:ad:c2:49:47:90:83:c1:5f:aa: c2:12:b3:b9:d5:21:fd:aa:43:e1:ac:f7:0d:68:7e:9e: ab:ec:f4:9d:ce:23:20:99:22:89:03:45:c5:81:3f:89: 9a:1e:6e:fa:7c:aa:d8:dc:ea:55:54:5e:e9:c3:ed:da: c5:b2:0f:e0:53:a2:fb:95:ce:0a:3d:4c:3b:ed:9b:f3: 0f:ba:64:e4:78:0c:50:4d:c8:1b:50:a5:5e:87:fd:5d: 37:37:70:ca:84:34:44:5c:bc:a2:03:87:53:6f:16:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:36:8e:ed:a3:37:f0:87:18:2a:b1:6e:e5:73:51:e8: 6a:d6:ee:e2:01:5f:f8:b1:3d:a3:4f:5c:58:7f:eb:44: 3e:b1:80:6c:f0:4e:9c:ad:ae:8c:da:fc:dc:95:75:af: 63:fb:15:d2:72:26:7b:fc:b6:04:d8:9a:23:c6:7e:ad: a5:f5:2c:fb:7c:4c:45:a1:ab:1c:c2:42:2f:41:dc:a2: 0f:26:a0:6d:f1:7f:c7:01:0a:34:5e:5d:ae:7a:be:bf: b3:02:9e:72:d6:8c:1d:c7:cb:e9:6e:5f:7b:2f:23:39: 71:e7:7a:8a:7a:92:2c:db:d4:a2:7f:48:ad:d5:ff:cd: fe:ab:6f:c5:8d:36:d9:97:d2:36:c8:72:28:89:80:46: dc:2a:68:70:2b:38:2c:71:2b:b3:2e:35:18:23:c9:f3: e6:9b:32:e5:ee:ab:a5:3b:5a:e4:fc:dc:13:2a:52:c9: 07:4d:f3:03:cf:90:89:3f:55:17:90:39:49:87:db:5c: 4f:c5:3f:55:2d:2b:df:7b:d1:2e:ce:4e:af:22:1e:9a: bd:f7:a7:87:1f:70:55:23:93:f4:c4:fb:be:f8:9b:2c: 4c:3b:92:a2:d4:f5:cf:3e:e1:03:de:a8:71:2c:a5:e0: 39:46:7f:18:65:42:c6:de:a9:92:ef:35:a1:d9:05:78 Fingerprint (SHA-256): EA:2C:4F:C7:A4:22:4A:73:A1:C0:F2:0A:E5:3E:8E:30:B9:35:49:D7:FC:BF:37:75:BB:CF:96:27:FF:82:25:63 Fingerprint (SHA1): 3F:97:68:39:F0:2A:CA:D5:21:34:D2:CE:58:E5:5C:10:73:2C:85:16 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6452: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122662 (0x1e67daa6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:27:55 2017 Not After : Tue May 10 12:27:55 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:46:53:27:24:a1:af:8a:77:b5:d0:52:9b:9f:b0:20: d8:31:94:b8:7a:9b:0d:47:eb:c4:1b:b8:68:a0:68:01: 91:8d:24:3b:cc:4e:41:7b:74:d2:64:f0:97:a4:f1:7d: c7:3d:08:0d:49:18:d0:2f:03:d2:b4:87:18:df:f0:af: 51:1e:38:d0:71:75:3c:4c:30:ba:49:a1:d9:1e:ad:6b: e9:68:33:7c:da:49:14:b1:0e:c9:06:4b:d5:ab:c2:19: 9a:f3:f0:9d:ab:3d:2b:33:9c:fc:49:8b:2c:90:fd:49: 52:c3:48:78:0f:58:61:3e:b4:0b:f6:6f:01:33:f4:c3: b2:af:e5:a6:20:db:8a:15:af:7f:38:82:a9:48:85:b1: 05:b5:34:c2:93:9d:31:ad:c2:49:47:90:83:c1:5f:aa: c2:12:b3:b9:d5:21:fd:aa:43:e1:ac:f7:0d:68:7e:9e: ab:ec:f4:9d:ce:23:20:99:22:89:03:45:c5:81:3f:89: 9a:1e:6e:fa:7c:aa:d8:dc:ea:55:54:5e:e9:c3:ed:da: c5:b2:0f:e0:53:a2:fb:95:ce:0a:3d:4c:3b:ed:9b:f3: 0f:ba:64:e4:78:0c:50:4d:c8:1b:50:a5:5e:87:fd:5d: 37:37:70:ca:84:34:44:5c:bc:a2:03:87:53:6f:16:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:36:8e:ed:a3:37:f0:87:18:2a:b1:6e:e5:73:51:e8: 6a:d6:ee:e2:01:5f:f8:b1:3d:a3:4f:5c:58:7f:eb:44: 3e:b1:80:6c:f0:4e:9c:ad:ae:8c:da:fc:dc:95:75:af: 63:fb:15:d2:72:26:7b:fc:b6:04:d8:9a:23:c6:7e:ad: a5:f5:2c:fb:7c:4c:45:a1:ab:1c:c2:42:2f:41:dc:a2: 0f:26:a0:6d:f1:7f:c7:01:0a:34:5e:5d:ae:7a:be:bf: b3:02:9e:72:d6:8c:1d:c7:cb:e9:6e:5f:7b:2f:23:39: 71:e7:7a:8a:7a:92:2c:db:d4:a2:7f:48:ad:d5:ff:cd: fe:ab:6f:c5:8d:36:d9:97:d2:36:c8:72:28:89:80:46: dc:2a:68:70:2b:38:2c:71:2b:b3:2e:35:18:23:c9:f3: e6:9b:32:e5:ee:ab:a5:3b:5a:e4:fc:dc:13:2a:52:c9: 07:4d:f3:03:cf:90:89:3f:55:17:90:39:49:87:db:5c: 4f:c5:3f:55:2d:2b:df:7b:d1:2e:ce:4e:af:22:1e:9a: bd:f7:a7:87:1f:70:55:23:93:f4:c4:fb:be:f8:9b:2c: 4c:3b:92:a2:d4:f5:cf:3e:e1:03:de:a8:71:2c:a5:e0: 39:46:7f:18:65:42:c6:de:a9:92:ef:35:a1:d9:05:78 Fingerprint (SHA-256): EA:2C:4F:C7:A4:22:4A:73:A1:C0:F2:0A:E5:3E:8E:30:B9:35:49:D7:FC:BF:37:75:BB:CF:96:27:FF:82:25:63 Fingerprint (SHA1): 3F:97:68:39:F0:2A:CA:D5:21:34:D2:CE:58:E5:5C:10:73:2C:85:16 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #6453: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122662 (0x1e67daa6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:27:55 2017 Not After : Tue May 10 12:27:55 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:46:53:27:24:a1:af:8a:77:b5:d0:52:9b:9f:b0:20: d8:31:94:b8:7a:9b:0d:47:eb:c4:1b:b8:68:a0:68:01: 91:8d:24:3b:cc:4e:41:7b:74:d2:64:f0:97:a4:f1:7d: c7:3d:08:0d:49:18:d0:2f:03:d2:b4:87:18:df:f0:af: 51:1e:38:d0:71:75:3c:4c:30:ba:49:a1:d9:1e:ad:6b: e9:68:33:7c:da:49:14:b1:0e:c9:06:4b:d5:ab:c2:19: 9a:f3:f0:9d:ab:3d:2b:33:9c:fc:49:8b:2c:90:fd:49: 52:c3:48:78:0f:58:61:3e:b4:0b:f6:6f:01:33:f4:c3: b2:af:e5:a6:20:db:8a:15:af:7f:38:82:a9:48:85:b1: 05:b5:34:c2:93:9d:31:ad:c2:49:47:90:83:c1:5f:aa: c2:12:b3:b9:d5:21:fd:aa:43:e1:ac:f7:0d:68:7e:9e: ab:ec:f4:9d:ce:23:20:99:22:89:03:45:c5:81:3f:89: 9a:1e:6e:fa:7c:aa:d8:dc:ea:55:54:5e:e9:c3:ed:da: c5:b2:0f:e0:53:a2:fb:95:ce:0a:3d:4c:3b:ed:9b:f3: 0f:ba:64:e4:78:0c:50:4d:c8:1b:50:a5:5e:87:fd:5d: 37:37:70:ca:84:34:44:5c:bc:a2:03:87:53:6f:16:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:36:8e:ed:a3:37:f0:87:18:2a:b1:6e:e5:73:51:e8: 6a:d6:ee:e2:01:5f:f8:b1:3d:a3:4f:5c:58:7f:eb:44: 3e:b1:80:6c:f0:4e:9c:ad:ae:8c:da:fc:dc:95:75:af: 63:fb:15:d2:72:26:7b:fc:b6:04:d8:9a:23:c6:7e:ad: a5:f5:2c:fb:7c:4c:45:a1:ab:1c:c2:42:2f:41:dc:a2: 0f:26:a0:6d:f1:7f:c7:01:0a:34:5e:5d:ae:7a:be:bf: b3:02:9e:72:d6:8c:1d:c7:cb:e9:6e:5f:7b:2f:23:39: 71:e7:7a:8a:7a:92:2c:db:d4:a2:7f:48:ad:d5:ff:cd: fe:ab:6f:c5:8d:36:d9:97:d2:36:c8:72:28:89:80:46: dc:2a:68:70:2b:38:2c:71:2b:b3:2e:35:18:23:c9:f3: e6:9b:32:e5:ee:ab:a5:3b:5a:e4:fc:dc:13:2a:52:c9: 07:4d:f3:03:cf:90:89:3f:55:17:90:39:49:87:db:5c: 4f:c5:3f:55:2d:2b:df:7b:d1:2e:ce:4e:af:22:1e:9a: bd:f7:a7:87:1f:70:55:23:93:f4:c4:fb:be:f8:9b:2c: 4c:3b:92:a2:d4:f5:cf:3e:e1:03:de:a8:71:2c:a5:e0: 39:46:7f:18:65:42:c6:de:a9:92:ef:35:a1:d9:05:78 Fingerprint (SHA-256): EA:2C:4F:C7:A4:22:4A:73:A1:C0:F2:0A:E5:3E:8E:30:B9:35:49:D7:FC:BF:37:75:BB:CF:96:27:FF:82:25:63 Fingerprint (SHA1): 3F:97:68:39:F0:2A:CA:D5:21:34:D2:CE:58:E5:5C:10:73:2C:85:16 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #6454: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122662 (0x1e67daa6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:27:55 2017 Not After : Tue May 10 12:27:55 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:46:53:27:24:a1:af:8a:77:b5:d0:52:9b:9f:b0:20: d8:31:94:b8:7a:9b:0d:47:eb:c4:1b:b8:68:a0:68:01: 91:8d:24:3b:cc:4e:41:7b:74:d2:64:f0:97:a4:f1:7d: c7:3d:08:0d:49:18:d0:2f:03:d2:b4:87:18:df:f0:af: 51:1e:38:d0:71:75:3c:4c:30:ba:49:a1:d9:1e:ad:6b: e9:68:33:7c:da:49:14:b1:0e:c9:06:4b:d5:ab:c2:19: 9a:f3:f0:9d:ab:3d:2b:33:9c:fc:49:8b:2c:90:fd:49: 52:c3:48:78:0f:58:61:3e:b4:0b:f6:6f:01:33:f4:c3: b2:af:e5:a6:20:db:8a:15:af:7f:38:82:a9:48:85:b1: 05:b5:34:c2:93:9d:31:ad:c2:49:47:90:83:c1:5f:aa: c2:12:b3:b9:d5:21:fd:aa:43:e1:ac:f7:0d:68:7e:9e: ab:ec:f4:9d:ce:23:20:99:22:89:03:45:c5:81:3f:89: 9a:1e:6e:fa:7c:aa:d8:dc:ea:55:54:5e:e9:c3:ed:da: c5:b2:0f:e0:53:a2:fb:95:ce:0a:3d:4c:3b:ed:9b:f3: 0f:ba:64:e4:78:0c:50:4d:c8:1b:50:a5:5e:87:fd:5d: 37:37:70:ca:84:34:44:5c:bc:a2:03:87:53:6f:16:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:36:8e:ed:a3:37:f0:87:18:2a:b1:6e:e5:73:51:e8: 6a:d6:ee:e2:01:5f:f8:b1:3d:a3:4f:5c:58:7f:eb:44: 3e:b1:80:6c:f0:4e:9c:ad:ae:8c:da:fc:dc:95:75:af: 63:fb:15:d2:72:26:7b:fc:b6:04:d8:9a:23:c6:7e:ad: a5:f5:2c:fb:7c:4c:45:a1:ab:1c:c2:42:2f:41:dc:a2: 0f:26:a0:6d:f1:7f:c7:01:0a:34:5e:5d:ae:7a:be:bf: b3:02:9e:72:d6:8c:1d:c7:cb:e9:6e:5f:7b:2f:23:39: 71:e7:7a:8a:7a:92:2c:db:d4:a2:7f:48:ad:d5:ff:cd: fe:ab:6f:c5:8d:36:d9:97:d2:36:c8:72:28:89:80:46: dc:2a:68:70:2b:38:2c:71:2b:b3:2e:35:18:23:c9:f3: e6:9b:32:e5:ee:ab:a5:3b:5a:e4:fc:dc:13:2a:52:c9: 07:4d:f3:03:cf:90:89:3f:55:17:90:39:49:87:db:5c: 4f:c5:3f:55:2d:2b:df:7b:d1:2e:ce:4e:af:22:1e:9a: bd:f7:a7:87:1f:70:55:23:93:f4:c4:fb:be:f8:9b:2c: 4c:3b:92:a2:d4:f5:cf:3e:e1:03:de:a8:71:2c:a5:e0: 39:46:7f:18:65:42:c6:de:a9:92:ef:35:a1:d9:05:78 Fingerprint (SHA-256): EA:2C:4F:C7:A4:22:4A:73:A1:C0:F2:0A:E5:3E:8E:30:B9:35:49:D7:FC:BF:37:75:BB:CF:96:27:FF:82:25:63 Fingerprint (SHA1): 3F:97:68:39:F0:2A:CA:D5:21:34:D2:CE:58:E5:5C:10:73:2C:85:16 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #6455: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122662 (0x1e67daa6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:27:55 2017 Not After : Tue May 10 12:27:55 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:46:53:27:24:a1:af:8a:77:b5:d0:52:9b:9f:b0:20: d8:31:94:b8:7a:9b:0d:47:eb:c4:1b:b8:68:a0:68:01: 91:8d:24:3b:cc:4e:41:7b:74:d2:64:f0:97:a4:f1:7d: c7:3d:08:0d:49:18:d0:2f:03:d2:b4:87:18:df:f0:af: 51:1e:38:d0:71:75:3c:4c:30:ba:49:a1:d9:1e:ad:6b: e9:68:33:7c:da:49:14:b1:0e:c9:06:4b:d5:ab:c2:19: 9a:f3:f0:9d:ab:3d:2b:33:9c:fc:49:8b:2c:90:fd:49: 52:c3:48:78:0f:58:61:3e:b4:0b:f6:6f:01:33:f4:c3: b2:af:e5:a6:20:db:8a:15:af:7f:38:82:a9:48:85:b1: 05:b5:34:c2:93:9d:31:ad:c2:49:47:90:83:c1:5f:aa: c2:12:b3:b9:d5:21:fd:aa:43:e1:ac:f7:0d:68:7e:9e: ab:ec:f4:9d:ce:23:20:99:22:89:03:45:c5:81:3f:89: 9a:1e:6e:fa:7c:aa:d8:dc:ea:55:54:5e:e9:c3:ed:da: c5:b2:0f:e0:53:a2:fb:95:ce:0a:3d:4c:3b:ed:9b:f3: 0f:ba:64:e4:78:0c:50:4d:c8:1b:50:a5:5e:87:fd:5d: 37:37:70:ca:84:34:44:5c:bc:a2:03:87:53:6f:16:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:36:8e:ed:a3:37:f0:87:18:2a:b1:6e:e5:73:51:e8: 6a:d6:ee:e2:01:5f:f8:b1:3d:a3:4f:5c:58:7f:eb:44: 3e:b1:80:6c:f0:4e:9c:ad:ae:8c:da:fc:dc:95:75:af: 63:fb:15:d2:72:26:7b:fc:b6:04:d8:9a:23:c6:7e:ad: a5:f5:2c:fb:7c:4c:45:a1:ab:1c:c2:42:2f:41:dc:a2: 0f:26:a0:6d:f1:7f:c7:01:0a:34:5e:5d:ae:7a:be:bf: b3:02:9e:72:d6:8c:1d:c7:cb:e9:6e:5f:7b:2f:23:39: 71:e7:7a:8a:7a:92:2c:db:d4:a2:7f:48:ad:d5:ff:cd: fe:ab:6f:c5:8d:36:d9:97:d2:36:c8:72:28:89:80:46: dc:2a:68:70:2b:38:2c:71:2b:b3:2e:35:18:23:c9:f3: e6:9b:32:e5:ee:ab:a5:3b:5a:e4:fc:dc:13:2a:52:c9: 07:4d:f3:03:cf:90:89:3f:55:17:90:39:49:87:db:5c: 4f:c5:3f:55:2d:2b:df:7b:d1:2e:ce:4e:af:22:1e:9a: bd:f7:a7:87:1f:70:55:23:93:f4:c4:fb:be:f8:9b:2c: 4c:3b:92:a2:d4:f5:cf:3e:e1:03:de:a8:71:2c:a5:e0: 39:46:7f:18:65:42:c6:de:a9:92:ef:35:a1:d9:05:78 Fingerprint (SHA-256): EA:2C:4F:C7:A4:22:4A:73:A1:C0:F2:0A:E5:3E:8E:30:B9:35:49:D7:FC:BF:37:75:BB:CF:96:27:FF:82:25:63 Fingerprint (SHA1): 3F:97:68:39:F0:2A:CA:D5:21:34:D2:CE:58:E5:5C:10:73:2C:85:16 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #6456: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122662 (0x1e67daa6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:27:55 2017 Not After : Tue May 10 12:27:55 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:46:53:27:24:a1:af:8a:77:b5:d0:52:9b:9f:b0:20: d8:31:94:b8:7a:9b:0d:47:eb:c4:1b:b8:68:a0:68:01: 91:8d:24:3b:cc:4e:41:7b:74:d2:64:f0:97:a4:f1:7d: c7:3d:08:0d:49:18:d0:2f:03:d2:b4:87:18:df:f0:af: 51:1e:38:d0:71:75:3c:4c:30:ba:49:a1:d9:1e:ad:6b: e9:68:33:7c:da:49:14:b1:0e:c9:06:4b:d5:ab:c2:19: 9a:f3:f0:9d:ab:3d:2b:33:9c:fc:49:8b:2c:90:fd:49: 52:c3:48:78:0f:58:61:3e:b4:0b:f6:6f:01:33:f4:c3: b2:af:e5:a6:20:db:8a:15:af:7f:38:82:a9:48:85:b1: 05:b5:34:c2:93:9d:31:ad:c2:49:47:90:83:c1:5f:aa: c2:12:b3:b9:d5:21:fd:aa:43:e1:ac:f7:0d:68:7e:9e: ab:ec:f4:9d:ce:23:20:99:22:89:03:45:c5:81:3f:89: 9a:1e:6e:fa:7c:aa:d8:dc:ea:55:54:5e:e9:c3:ed:da: c5:b2:0f:e0:53:a2:fb:95:ce:0a:3d:4c:3b:ed:9b:f3: 0f:ba:64:e4:78:0c:50:4d:c8:1b:50:a5:5e:87:fd:5d: 37:37:70:ca:84:34:44:5c:bc:a2:03:87:53:6f:16:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:36:8e:ed:a3:37:f0:87:18:2a:b1:6e:e5:73:51:e8: 6a:d6:ee:e2:01:5f:f8:b1:3d:a3:4f:5c:58:7f:eb:44: 3e:b1:80:6c:f0:4e:9c:ad:ae:8c:da:fc:dc:95:75:af: 63:fb:15:d2:72:26:7b:fc:b6:04:d8:9a:23:c6:7e:ad: a5:f5:2c:fb:7c:4c:45:a1:ab:1c:c2:42:2f:41:dc:a2: 0f:26:a0:6d:f1:7f:c7:01:0a:34:5e:5d:ae:7a:be:bf: b3:02:9e:72:d6:8c:1d:c7:cb:e9:6e:5f:7b:2f:23:39: 71:e7:7a:8a:7a:92:2c:db:d4:a2:7f:48:ad:d5:ff:cd: fe:ab:6f:c5:8d:36:d9:97:d2:36:c8:72:28:89:80:46: dc:2a:68:70:2b:38:2c:71:2b:b3:2e:35:18:23:c9:f3: e6:9b:32:e5:ee:ab:a5:3b:5a:e4:fc:dc:13:2a:52:c9: 07:4d:f3:03:cf:90:89:3f:55:17:90:39:49:87:db:5c: 4f:c5:3f:55:2d:2b:df:7b:d1:2e:ce:4e:af:22:1e:9a: bd:f7:a7:87:1f:70:55:23:93:f4:c4:fb:be:f8:9b:2c: 4c:3b:92:a2:d4:f5:cf:3e:e1:03:de:a8:71:2c:a5:e0: 39:46:7f:18:65:42:c6:de:a9:92:ef:35:a1:d9:05:78 Fingerprint (SHA-256): EA:2C:4F:C7:A4:22:4A:73:A1:C0:F2:0A:E5:3E:8E:30:B9:35:49:D7:FC:BF:37:75:BB:CF:96:27:FF:82:25:63 Fingerprint (SHA1): 3F:97:68:39:F0:2A:CA:D5:21:34:D2:CE:58:E5:5C:10:73:2C:85:16 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #6457: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6458: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #6459: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122692 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6460: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #6461: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #6462: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6463: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 510122693 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6464: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6465: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #6466: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6467: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 510122694 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6468: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6469: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #6470: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6471: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 510122695 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6472: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6473: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #6474: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6475: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 510122696 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6476: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6477: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #6478: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6479: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 510122697 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6480: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6481: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #6482: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6483: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 510122698 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6484: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6485: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #6486: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122692 (0x1e67dac4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:28:36 2017 Not After : Tue May 10 12:28:36 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:b4:77:e9:fa:2e:5b:fe:95:a7:d6:a3:41:36:dd:7d: de:eb:1d:fa:8a:72:7a:ee:96:ba:c3:ac:1f:71:47:47: 71:38:30:f4:f4:44:3d:c5:88:12:d2:a7:1c:8b:e7:e7: de:d5:a5:fa:5e:90:b0:58:b3:63:ff:8f:7a:9a:e3:30: 45:65:97:b3:e9:87:70:a4:9c:dc:40:64:18:b4:35:6f: 59:eb:c5:43:fc:fc:71:81:61:ac:a5:45:8c:07:21:dc: 02:01:e2:67:2b:63:d2:29:58:3c:99:d1:ab:95:5b:58: 9a:38:26:53:76:26:79:f6:ad:dd:af:6e:5d:87:97:6a: c7:77:10:ce:85:d5:e3:b6:74:c4:93:0a:06:8b:40:1e: 58:54:dd:aa:5c:49:74:64:2b:f8:86:39:26:f1:86:ba: ab:f1:4b:a6:db:48:f4:27:6d:f1:46:3f:d9:66:a7:94: d8:89:1f:54:50:e6:51:1b:64:63:f2:a1:4c:05:01:22: b7:65:77:34:59:44:27:e8:11:c1:85:65:71:03:1f:d1: 5a:be:be:b9:cf:65:21:88:a1:81:2f:8f:a4:5b:24:73: 7c:97:85:fa:24:b2:28:1e:a7:32:81:9a:a6:93:96:c9: 7a:5c:a5:c8:42:33:c3:fe:aa:17:a0:6f:c5:e7:d7:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:c0:83:51:b3:73:64:e5:a9:03:0b:b7:64:b0:ed:5c: 5c:ce:b3:1f:5e:4a:24:80:9d:05:d9:87:04:5d:7b:22: c6:ab:98:d5:14:69:cd:3f:0f:81:fa:90:3f:e3:ee:7a: 19:4e:7d:a9:37:7f:4f:d1:5b:c1:1a:04:eb:32:3d:54: bc:80:39:0d:52:0b:b2:3a:4e:fc:ef:39:5f:b3:84:cf: d3:53:ec:e4:88:8b:a7:5b:50:55:02:51:e5:b5:15:82: 2c:c1:1c:5e:8b:e7:ad:c3:1a:3b:69:89:99:83:68:8b: 65:85:65:b4:18:6e:56:ae:a8:3a:2c:fa:d5:68:ae:20: bf:80:84:60:0e:2c:96:69:91:f5:54:88:3b:f6:d7:57: 75:0f:ba:56:d4:1a:6d:0a:10:21:2c:86:88:42:4e:90: d6:bd:1d:39:2a:6d:c1:a8:9b:32:e9:ee:ab:f2:72:31: 50:af:47:ec:1e:81:eb:0c:17:3e:a8:1e:08:8a:11:0d: d4:e2:65:1f:4d:e5:8e:bc:8a:72:9e:ea:e6:8d:27:01: 93:db:cc:7f:6d:9b:4e:ef:1c:2e:0f:91:67:4b:22:da: 94:02:4d:83:f8:d6:25:98:cb:09:ed:96:c0:b9:a4:2f: 8b:bc:ec:2d:6d:4c:a8:04:79:72:48:a9:99:83:81:70 Fingerprint (SHA-256): 51:21:6C:EF:B8:5C:C4:7A:1E:30:52:4A:A5:3C:26:17:FC:9D:D0:05:A7:0F:17:C9:F2:BE:34:35:F2:0A:3F:BB Fingerprint (SHA1): 43:42:1F:A2:DE:15:ED:B5:EC:F6:FF:BE:DE:1E:38:A5:0E:82:C5:B1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #6487: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6488: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6489: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #6490: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122692 (0x1e67dac4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:28:36 2017 Not After : Tue May 10 12:28:36 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:b4:77:e9:fa:2e:5b:fe:95:a7:d6:a3:41:36:dd:7d: de:eb:1d:fa:8a:72:7a:ee:96:ba:c3:ac:1f:71:47:47: 71:38:30:f4:f4:44:3d:c5:88:12:d2:a7:1c:8b:e7:e7: de:d5:a5:fa:5e:90:b0:58:b3:63:ff:8f:7a:9a:e3:30: 45:65:97:b3:e9:87:70:a4:9c:dc:40:64:18:b4:35:6f: 59:eb:c5:43:fc:fc:71:81:61:ac:a5:45:8c:07:21:dc: 02:01:e2:67:2b:63:d2:29:58:3c:99:d1:ab:95:5b:58: 9a:38:26:53:76:26:79:f6:ad:dd:af:6e:5d:87:97:6a: c7:77:10:ce:85:d5:e3:b6:74:c4:93:0a:06:8b:40:1e: 58:54:dd:aa:5c:49:74:64:2b:f8:86:39:26:f1:86:ba: ab:f1:4b:a6:db:48:f4:27:6d:f1:46:3f:d9:66:a7:94: d8:89:1f:54:50:e6:51:1b:64:63:f2:a1:4c:05:01:22: b7:65:77:34:59:44:27:e8:11:c1:85:65:71:03:1f:d1: 5a:be:be:b9:cf:65:21:88:a1:81:2f:8f:a4:5b:24:73: 7c:97:85:fa:24:b2:28:1e:a7:32:81:9a:a6:93:96:c9: 7a:5c:a5:c8:42:33:c3:fe:aa:17:a0:6f:c5:e7:d7:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:c0:83:51:b3:73:64:e5:a9:03:0b:b7:64:b0:ed:5c: 5c:ce:b3:1f:5e:4a:24:80:9d:05:d9:87:04:5d:7b:22: c6:ab:98:d5:14:69:cd:3f:0f:81:fa:90:3f:e3:ee:7a: 19:4e:7d:a9:37:7f:4f:d1:5b:c1:1a:04:eb:32:3d:54: bc:80:39:0d:52:0b:b2:3a:4e:fc:ef:39:5f:b3:84:cf: d3:53:ec:e4:88:8b:a7:5b:50:55:02:51:e5:b5:15:82: 2c:c1:1c:5e:8b:e7:ad:c3:1a:3b:69:89:99:83:68:8b: 65:85:65:b4:18:6e:56:ae:a8:3a:2c:fa:d5:68:ae:20: bf:80:84:60:0e:2c:96:69:91:f5:54:88:3b:f6:d7:57: 75:0f:ba:56:d4:1a:6d:0a:10:21:2c:86:88:42:4e:90: d6:bd:1d:39:2a:6d:c1:a8:9b:32:e9:ee:ab:f2:72:31: 50:af:47:ec:1e:81:eb:0c:17:3e:a8:1e:08:8a:11:0d: d4:e2:65:1f:4d:e5:8e:bc:8a:72:9e:ea:e6:8d:27:01: 93:db:cc:7f:6d:9b:4e:ef:1c:2e:0f:91:67:4b:22:da: 94:02:4d:83:f8:d6:25:98:cb:09:ed:96:c0:b9:a4:2f: 8b:bc:ec:2d:6d:4c:a8:04:79:72:48:a9:99:83:81:70 Fingerprint (SHA-256): 51:21:6C:EF:B8:5C:C4:7A:1E:30:52:4A:A5:3C:26:17:FC:9D:D0:05:A7:0F:17:C9:F2:BE:34:35:F2:0A:3F:BB Fingerprint (SHA1): 43:42:1F:A2:DE:15:ED:B5:EC:F6:FF:BE:DE:1E:38:A5:0E:82:C5:B1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #6491: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6492: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6493: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #6494: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122699 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6495: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #6496: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #6497: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6498: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510122700 --extCP --extPM < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #6499: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6500: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #6501: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6502: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510122701 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6503: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6504: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #6505: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6506: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 510122702 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6507: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6508: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #6509: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #6510: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #6511: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #6512: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122699 (0x1e67dacb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:28:47 2017 Not After : Tue May 10 12:28:47 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:2b:ce:c4:fd:22:52:7a:d8:fe:d4:56:05:31:3d:b3: 84:31:38:28:1c:ef:1e:0b:f5:dc:75:42:0c:a6:59:5c: 0e:d4:e3:ea:a4:7c:fa:47:61:86:e8:b1:94:c3:c4:2f: 31:fe:bb:a1:3d:b9:3f:1b:9e:4f:ae:f9:af:bd:60:e6: 7e:90:9e:5e:c3:4e:08:80:b7:63:88:ab:f4:cb:bd:7b: 1f:76:32:66:90:fe:e2:a6:55:48:52:fa:ee:6c:fe:3c: 84:bd:a5:38:c3:c5:61:3f:c6:6f:79:76:bd:be:65:59: 68:2c:18:e0:83:2b:a9:85:43:a4:48:ff:f9:44:09:84: 88:d5:9b:68:d7:0f:4b:f7:e8:92:0d:27:3b:db:82:0d: 2a:52:a5:a1:51:ac:a2:b3:ca:a5:ce:ab:26:fd:b9:3f: 7c:0b:fc:63:86:c2:8a:50:a2:c3:4b:4b:27:a0:fa:d9: 2e:66:fe:61:f9:73:17:55:45:9d:ff:df:3a:6f:78:0b: 71:f0:ca:6a:5f:61:b5:ac:93:48:d1:8e:01:f6:ff:ee: c6:37:43:76:ad:39:c3:3f:4b:be:d9:25:3c:07:28:6e: 6d:44:0e:59:98:18:ad:a7:44:7c:f4:02:5c:a8:a9:19: bf:d7:57:47:7b:d8:80:05:17:a1:c6:76:62:2a:18:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:cc:55:6e:52:44:c8:2c:7d:e1:ef:ff:c4:66:12:1e: 30:ff:e2:9f:e9:3b:51:38:4a:96:ed:11:50:38:b4:b3: 37:40:3d:9a:85:bc:97:9c:65:ff:f3:a5:e8:bf:d3:18: e9:8c:e2:ce:5e:01:cf:c5:47:5c:13:ea:1e:63:7b:35: 4c:e0:e2:f0:22:f8:fb:0c:b5:e1:89:53:11:ef:a2:1b: c7:c2:5c:36:80:e7:b5:da:8b:e0:33:7e:7c:50:92:61: b2:83:4c:b5:b1:f0:be:f9:af:9a:2b:9c:76:8d:f5:77: 8d:f7:e2:ce:6b:de:a3:eb:a7:c1:d2:73:5e:9e:ad:72: 62:9a:79:b1:18:f3:8a:53:c9:f9:b0:1a:df:dd:f0:f2: f6:b4:ad:ff:33:a6:16:f3:ee:c1:23:b5:e8:3c:2c:d0: ff:33:5d:8e:5a:e9:6b:ed:bf:1e:b5:85:17:5c:df:1e: 03:94:b4:9e:87:07:8a:50:da:b0:9f:67:b6:54:f4:4e: f8:3d:29:68:cb:b3:dd:b9:6f:4f:69:c1:e1:9f:a2:d1: ac:b4:1f:2e:9d:cb:2c:24:99:f7:69:d2:b6:bc:34:2f: df:f3:15:ee:87:77:d6:fd:12:36:0e:a6:23:2c:8d:bd: b1:2d:a2:89:cc:37:5a:cb:db:55:70:0e:48:38:a6:51 Fingerprint (SHA-256): F1:52:04:19:86:4D:AC:63:22:F0:1C:DA:C0:5E:89:30:7B:50:2A:F0:62:8F:A5:4A:CC:B3:6C:77:21:C3:03:1C Fingerprint (SHA1): E1:A0:92:EE:DB:8A:CF:6B:DE:59:70:D5:D1:0F:1E:5B:B9:52:75:FE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6513: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6514: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6515: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122700 (0x1e67dacc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:28:49 2017 Not After : Tue May 10 12:28:49 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:15:61:52:87:b2:64:04:14:95:ef:eb:29:d2:b9:77: 72:9f:c9:3f:a0:d8:41:8e:ac:9b:37:6a:1e:39:79:17: f5:34:16:af:c7:0b:86:30:ed:7e:16:8c:15:9c:03:02: d6:dd:aa:da:a2:4e:3b:85:70:07:05:31:50:fa:33:cf: 44:16:88:04:95:90:e6:c6:c0:fe:c1:47:aa:7c:fb:0b: 2d:c2:c7:2f:ab:34:52:54:7c:41:af:6c:8e:3d:28:ec: e1:9f:66:d4:53:8d:69:ae:d0:59:92:39:9d:80:29:6e: b7:25:53:eb:88:23:73:4e:ab:ff:c6:fe:f5:ed:3a:bb: b1:74:ae:65:b4:af:fe:e5:e3:a3:c3:92:07:25:ec:c0: 99:de:ca:a9:72:e4:b1:1e:e0:99:f8:1e:80:c4:5f:ee: 59:4f:ee:0d:03:ac:24:ed:c2:ae:b3:90:96:06:16:cc: 0c:9c:bd:c9:96:7a:7e:ad:ab:1b:2a:c5:86:b0:7d:81: 14:d6:9f:0b:9f:36:28:5c:0f:12:c1:0f:37:ed:4d:4e: 73:af:42:5b:b6:24:0e:a1:1b:0f:d3:16:9b:51:5c:88: 54:3d:4e:f7:8c:b8:34:1a:da:e2:b1:18:8a:bc:76:5f: 75:1f:76:aa:b4:b9:05:e1:99:2a:11:2b:3b:6a:3b:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:78:17:c1:bb:f1:df:d9:61:fe:b2:72:bc:0f:df:ca: 81:a8:ff:9d:cf:2b:8d:6c:e5:e9:ce:dc:85:88:5f:08: e4:5d:b7:cf:c0:56:db:81:8b:b4:1a:8e:12:29:01:78: 6b:f3:eb:ed:90:34:d4:ec:d5:d4:86:41:63:81:12:f3: 6b:b2:ea:b6:e6:c3:08:81:a6:4d:85:31:03:9e:0d:76: 57:49:35:27:ac:5e:68:1a:cf:0c:58:b6:d1:f7:ce:b7: bc:19:3d:94:61:86:5e:31:ef:a7:46:f1:64:fd:e4:58: 1a:f6:8c:10:61:4b:17:2f:86:3f:d1:88:18:33:fb:e1: 01:e1:f4:66:63:be:fc:7e:9c:13:21:78:a3:94:d1:10: 20:f9:ce:45:5d:4a:48:cf:c7:79:a6:a1:bd:1d:32:8e: ae:a1:3d:7a:ae:a6:cf:2d:3b:1a:85:1b:5e:13:fb:7a: de:98:da:c0:9b:b3:b6:cf:5c:1d:c0:62:f1:a5:45:03: 38:ba:9f:e0:f5:1f:84:2f:c7:e0:35:a0:20:32:58:7a: bb:07:a2:af:bf:6e:5e:36:20:2b:95:67:41:84:40:ad: 35:50:77:f0:63:4c:d2:f5:9f:b0:ff:f7:16:78:a3:fb: c5:3e:b8:59:63:cd:b8:36:0e:30:fa:23:ad:5c:46:8b Fingerprint (SHA-256): D6:12:BD:3E:6F:21:EB:4D:7D:12:B2:9B:69:A2:F9:24:E6:80:19:9D:6A:93:7A:D5:46:AC:21:71:F5:5E:D4:AB Fingerprint (SHA1): 31:06:CB:A8:BB:72:0D:9E:47:91:7D:15:E5:33:8A:4D:BC:7F:54:5F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #6516: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6517: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122701 (0x1e67dacd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:28:50 2017 Not After : Tue May 10 12:28:50 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b0:73:ac:82:c1:0e:5b:0d:a0:b7:4a:3d:96:77:8b: 26:b3:5b:71:91:88:dd:ce:0d:b1:ea:0f:13:3a:e2:2a: e8:d2:28:05:46:a6:ab:0e:de:cf:10:6e:ae:3c:d0:33: c8:d0:40:7b:fe:4f:e8:8b:49:00:6d:a4:56:f9:67:67: fc:77:3c:42:4e:17:8a:d5:39:c8:8c:6e:d1:4a:c1:b1: ed:3d:c1:95:6f:28:ab:66:df:e9:50:6c:8b:65:0d:e9: 26:d6:cb:af:e7:06:b6:3a:b3:1b:ac:52:00:05:3a:31: 50:1a:9c:bd:41:1b:5e:0b:76:82:7a:45:f4:0b:fb:98: d2:18:41:c3:5a:3d:5f:e0:20:0f:b8:c2:3c:db:f6:0e: 20:54:cd:ff:cb:cf:cb:f0:f5:3e:c9:4f:7f:dc:34:43: 46:95:78:69:d0:d8:e7:25:94:8e:cf:5c:55:a4:15:6a: 42:66:91:63:34:f5:bb:1f:51:40:49:ef:2f:2e:69:0f: d3:a5:d6:39:8a:29:12:cd:7b:b4:b5:2a:8b:23:05:a7: 55:cb:84:f4:f9:f1:fe:68:15:2f:9f:a1:03:6b:9d:59: 29:b8:22:c4:4f:e0:20:16:83:9c:b6:da:88:fc:82:9b: 5e:1a:65:49:86:a7:77:66:c0:56:0f:ff:0a:df:88:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:e9:c5:67:4a:e0:63:4d:31:9f:8c:34:01:e2:db:31: fc:13:b6:c6:24:8e:97:78:d2:44:56:63:20:15:2d:8c: 6d:6f:d3:5d:c5:ae:ca:5d:a5:37:d6:65:26:31:a5:99: 33:b6:89:19:2f:be:28:3b:16:42:47:6d:50:0d:4d:83: d5:4e:f1:2f:d5:e4:31:ba:48:1d:0a:b9:12:54:bc:fb: 72:5d:09:92:0e:ad:78:86:de:af:a4:68:22:a2:71:f9: 9c:37:2a:4b:ca:c6:00:07:30:10:4e:00:d6:b6:5d:5d: 67:4c:b2:93:6f:98:43:cb:c7:88:50:d6:d0:40:3f:46: f8:db:ea:a8:4a:55:d6:f3:ff:6b:0d:5d:30:9f:cb:81: b4:e0:45:83:2f:3a:9f:01:f3:93:fd:c6:8f:2b:a5:48: b9:ef:74:f9:2f:c3:7b:59:d6:0b:ce:34:38:ba:a2:3f: 50:c3:65:8b:05:22:d9:ab:63:c2:00:eb:28:8b:83:67: 41:d1:6c:67:b1:9e:11:90:42:a5:cf:e4:66:b3:c7:73: ca:23:b6:83:09:0f:e8:a7:11:f5:a4:7f:f7:47:e2:97: 96:94:75:fe:17:8b:ba:02:1e:fa:53:d5:0c:39:e7:e5: b5:b5:a8:2b:3a:d3:b7:01:ed:c3:0a:fb:41:c0:0f:c2 Fingerprint (SHA-256): 6B:4B:31:31:40:B1:2D:53:AF:71:6D:99:3A:CE:41:7A:E6:A7:C1:BD:6C:F9:3F:4D:0F:05:70:84:A3:3C:88:51 Fingerprint (SHA1): 61:F4:1A:05:B7:4F:65:EC:EA:DA:98:CD:49:91:FA:2C:9E:14:B6:69 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #6518: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #6519: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122703 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6520: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #6521: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #6522: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6523: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510122704 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6524: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6525: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #6526: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6527: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510122705 --extCP --extPM < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #6528: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6529: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #6530: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6531: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 510122706 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6532: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6533: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #6534: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6535: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 510122707 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6536: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6537: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #6538: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #6539: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #6540: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #6541: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #6542: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122703 (0x1e67dacf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:28:54 2017 Not After : Tue May 10 12:28:54 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:d1:46:2a:f7:0e:e5:4b:80:22:4a:2b:61:2f:c8:db: fd:89:8d:5a:12:34:b7:10:dd:25:be:fa:f6:52:8b:d8: 55:22:a6:f1:c3:64:52:e5:e2:5c:95:c4:47:94:68:9e: 18:99:89:00:96:f0:6a:22:9c:31:4e:7a:08:25:61:95: 6d:bb:58:72:47:4b:98:4a:49:58:d4:8d:62:9a:bf:91: db:c6:9e:0c:30:f9:05:54:0c:e6:84:31:69:3a:36:38: 9f:1f:ad:bf:a9:d4:1f:46:45:84:e2:52:c1:b9:50:a2: 98:0b:14:35:35:30:40:32:ee:e9:ce:c9:53:60:bd:f1: b2:70:85:0e:68:5e:41:0a:51:d0:86:2a:5a:c5:6d:10: 60:9c:be:15:ae:7a:34:d0:e5:4b:52:00:44:e0:06:13: f9:45:10:81:b5:6c:39:78:4b:11:2f:89:5e:a6:99:6e: c4:72:c0:58:c1:23:01:68:94:59:0d:ce:f2:c6:5e:f5: 30:eb:3e:d4:29:30:b4:eb:4f:fe:31:5f:5b:7f:e3:dc: 97:c2:a5:90:9f:dd:df:44:76:bb:73:f1:40:38:8b:7b: 7d:40:ea:d2:2e:c2:e3:69:81:be:3b:65:7a:07:b3:7c: ac:7a:0c:be:79:e3:26:52:3d:1f:93:f6:0a:81:0c:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ad:1d:4d:42:0f:ef:77:15:2c:45:31:48:f3:67:c7:74: fa:db:5c:7e:3d:ab:82:ab:a3:6f:72:11:63:81:b0:ea: fd:b7:cf:b7:bc:66:97:bd:29:7c:3b:df:35:af:30:96: 50:37:7c:59:01:1c:15:cf:cd:3b:be:11:cd:4f:0e:f0: 03:b7:5a:80:b6:4b:9b:4a:2b:94:68:f5:ce:9c:6e:1a: c5:30:09:0b:67:b2:a2:60:88:45:cd:96:a0:a6:f1:dd: 54:72:4e:ab:a1:02:e2:ea:09:93:66:25:3c:6c:f0:48: 5e:ff:f5:75:c7:be:95:09:7f:95:98:7a:84:39:04:71: 2a:c1:7b:ee:7e:76:17:98:ea:2e:8a:6a:80:6e:cd:27: 33:89:03:8f:a7:61:fb:8e:ea:29:86:0b:b5:4d:99:f8: ab:ad:ab:b3:9f:19:e9:d9:11:72:39:42:84:02:50:c5: c6:ca:46:e1:96:40:55:36:6c:37:20:80:56:db:e2:67: 3d:0e:36:c7:0c:e6:cd:04:e5:45:82:d5:2d:00:e3:32: 16:f5:99:aa:37:5a:44:3c:12:75:40:31:d8:55:9f:9f: 31:a6:ed:c8:2b:75:c5:de:ea:c5:bb:a0:b9:6c:f9:9c: 4d:8c:ea:08:10:bf:f1:a1:ba:c7:11:5f:0f:9c:2c:1c Fingerprint (SHA-256): E8:66:B9:9F:4A:B6:E3:B7:31:F0:8C:E7:37:43:BC:F4:71:21:C2:C5:54:9B:0B:CA:12:9A:15:CE:67:48:34:0D Fingerprint (SHA1): AA:44:98:69:9B:77:A0:4B:50:6B:AA:65:24:A8:EE:6C:BB:33:8E:4A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6543: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6544: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122704 (0x1e67dad0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:28:55 2017 Not After : Tue May 10 12:28:55 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:28:e5:3e:c2:c2:8c:ec:92:60:a4:91:cd:44:f6:01: b4:3b:40:7e:ed:8a:73:fc:c6:a5:7a:45:b7:fa:dc:98: 5a:1a:e3:b1:1b:91:ba:25:00:fb:1d:95:6d:14:9a:9d: 36:15:6c:1d:81:f9:66:4e:05:ce:ae:28:6a:5a:c3:13: 49:79:a9:55:23:8c:df:b0:84:5a:a3:c7:b0:b8:49:ac: fa:eb:b7:7c:37:be:19:1f:11:e1:a1:4b:33:ea:b0:c2: d9:b6:a9:1b:06:77:24:44:75:e1:b4:81:64:d7:c4:02: 6e:b0:ab:0c:d9:34:92:b1:6c:98:11:75:04:a1:04:b7: 81:f5:15:1a:18:9b:75:42:0f:e6:44:31:9b:4f:e4:a2: 2f:73:57:bc:27:7f:af:40:7f:7e:e4:0c:da:8e:9a:bc: 67:93:a7:98:35:77:69:8b:23:6d:77:fb:57:df:d1:b5: 13:a6:3b:a6:1d:ea:8b:5a:21:15:1c:7a:1c:53:01:83: a6:1b:c3:fb:bb:1b:d1:7d:87:af:cd:f3:88:e7:15:e3: 64:6d:5a:6f:3d:de:f9:db:2e:4c:02:e7:4b:bb:e8:1e: 95:1c:47:91:15:73:6b:02:b6:51:95:1c:0a:5e:21:22: a9:ee:65:af:c9:e3:e1:f5:d5:b4:7d:1d:37:b1:f6:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 71:b0:1e:03:71:02:98:ba:84:e4:e2:e8:59:0d:c6:70: 7f:b7:10:18:e1:74:17:bc:96:37:e9:6e:2a:bb:df:d0: d5:ad:9b:a4:e5:40:55:f4:ee:76:7e:2f:9a:ef:78:8d: 68:cd:b8:82:a4:f3:84:41:b0:de:08:e4:10:a4:de:6c: 31:c0:e3:86:f5:9e:5d:30:c5:51:97:d8:bb:9f:a5:95: 93:b6:13:44:7d:3d:93:c6:6f:75:3b:d4:ea:15:c7:e5: 75:de:20:d3:c0:11:95:c8:98:cc:18:91:84:f5:78:d6: c2:df:c7:78:e9:3b:20:ef:d6:f5:55:a9:86:1d:e5:d3: 99:da:aa:11:33:19:72:8f:c3:00:bf:d1:c0:d0:bc:8b: 97:38:13:c2:2b:b2:d3:fa:c0:3a:c4:be:09:85:5e:24: f8:b7:6f:ea:35:1e:eb:7b:70:d5:87:24:d8:f3:d0:77: b7:56:92:39:43:b1:ac:97:20:ab:cd:4d:7d:8f:92:82: b3:ae:15:72:6c:0e:d3:d2:8c:44:6d:e9:ea:91:59:da: e5:5f:17:de:ac:ac:9f:f4:76:f4:d9:99:54:02:d6:0d: 1b:7b:2c:4a:a3:2c:8a:d0:05:3e:3c:83:4a:d6:ba:07: 2e:d2:87:d7:91:30:0b:77:fc:19:32:1d:e5:2f:1c:a9 Fingerprint (SHA-256): 8C:3C:01:97:1D:BD:C6:60:6C:8F:C1:F9:B7:12:FA:C6:59:9D:46:DF:D1:CF:78:E9:3A:7E:D7:D8:82:B2:52:86 Fingerprint (SHA1): BC:7B:90:7D:12:5A:C1:37:C3:FD:5F:12:4F:01:C7:7C:86:9D:78:37 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #6545: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6546: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6547: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122705 (0x1e67dad1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:28:58 2017 Not After : Tue May 10 12:28:58 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:40:1d:89:dd:20:02:c9:21:ad:1d:5a:fe:fc:c7:4f: 65:fc:a2:70:e0:6b:d2:3a:f1:00:5a:f4:5e:7b:02:d3: 7b:df:f7:b6:db:8b:09:ed:e2:5a:a8:7e:02:14:7c:26: be:02:b2:4e:12:f3:78:19:fd:ec:4d:58:64:85:b3:22: 9d:6f:94:53:de:c7:ef:28:2b:97:91:65:62:2d:79:9b: fa:f7:35:4c:34:69:d8:47:89:35:b6:4a:3d:2b:da:b3: 88:48:d6:a2:2d:dd:96:1b:1e:d6:1b:2f:c2:ef:27:0e: 37:8d:88:df:38:d1:15:85:37:1f:b3:2b:b4:39:c6:bd: 56:cb:5d:a5:39:40:67:48:05:21:0a:94:79:af:50:0d: 06:31:65:02:48:d3:c5:d4:ca:71:a3:37:d7:2c:48:a7: bb:54:81:4b:4c:4f:56:2d:e6:87:b9:40:e0:36:bf:98: 24:b1:df:68:17:af:ea:b9:99:07:b5:03:b7:59:0b:15: 66:fe:6a:83:e6:ea:5f:2d:e7:ed:ad:21:38:2c:4d:e1: 4b:f2:29:23:e5:2b:e8:38:bb:d4:91:a8:d6:a4:2d:fb: d7:07:b2:30:4c:12:b5:ad:b7:fe:ff:82:11:d8:ae:17: aa:49:63:7c:c9:3f:c6:b3:c7:a2:d3:4e:69:5e:3c:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 70:d5:04:93:e3:d5:ee:4f:d6:3e:64:2e:76:cc:fb:0f: 24:d0:a4:c6:23:80:6c:31:41:0d:6a:e1:47:d0:95:bf: cd:70:a5:62:91:67:ca:b7:23:58:8c:36:d4:38:d1:39: a1:5c:ec:26:da:7d:7e:f5:0e:99:ac:d8:42:fa:89:20: 90:8d:7d:8a:8d:34:7f:3d:e3:f4:b9:d8:3f:0e:7d:6c: 76:9d:eb:13:2f:17:12:7f:8a:44:57:76:fc:e4:dd:d6: 2c:e3:e0:3a:8d:50:9f:35:1a:1f:dd:9e:fb:1d:6b:67: f7:ab:ca:4e:6f:13:c8:d7:a1:d6:b0:41:31:d3:ff:f3: 35:0c:c5:2b:a8:d5:19:3a:f3:71:c7:85:9f:cc:a3:be: 88:83:55:8e:c5:88:13:84:b0:c5:8a:d6:5f:46:7c:a0: e3:b8:fd:8e:12:f4:6d:f7:5c:68:2a:4d:66:e0:e4:fe: 94:f4:44:1e:ec:5c:71:f5:35:57:74:57:e7:19:b1:1b: 89:b0:ad:83:45:6c:da:0a:c8:85:40:fb:a5:df:8c:d8: 5d:55:8c:74:09:91:8b:ca:ac:f7:bb:83:5c:ff:e5:f2: 55:ca:9f:24:b2:f0:80:cb:87:30:4c:20:14:fb:f7:a6: b1:b8:d0:7e:f7:1f:b2:0d:02:ee:dd:77:f7:ab:f5:c5 Fingerprint (SHA-256): 13:98:C4:38:3F:1B:C7:4E:ED:28:7D:9D:DE:F0:1B:BB:59:F8:71:01:3C:C6:8C:ED:35:61:F3:CE:75:0D:7C:5C Fingerprint (SHA1): 74:0D:5A:DA:99:36:73:4B:00:C0:2B:73:63:8D:58:1A:CD:2D:60:4A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #6548: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #6549: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122708 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6550: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #6551: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #6552: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6553: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510122709 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6554: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6555: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #6556: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6557: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510122710 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA1Root-510122617.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #6558: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6559: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #6560: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6561: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 510122711 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6562: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6563: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #6564: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122708 (0x1e67dad4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:29:01 2017 Not After : Tue May 10 12:29:01 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:62:68:4c:50:6d:84:4c:76:b6:d9:b5:63:46:59:4a: ea:f8:9a:94:13:fb:a0:e0:70:a9:b9:6b:bc:0b:e7:3f: 23:0b:d9:c8:09:bb:86:23:fc:d0:68:8a:f9:65:5b:3b: 7b:36:d4:b2:a4:f7:f5:eb:6f:8d:f1:c7:50:08:ae:9f: 85:cb:65:ef:57:47:22:25:1b:77:5a:c3:58:ee:d6:92: 64:0d:c0:de:8b:00:ab:12:7e:12:55:9e:f0:20:59:8f: 23:0a:08:64:d4:47:8c:bf:0b:4f:ee:30:7d:a4:b3:41: 56:2c:92:c7:d5:46:1b:46:c1:22:32:e4:7e:7e:e8:94: 8e:7f:d7:bc:5c:71:2a:c2:9a:21:65:2e:cd:d9:6f:17: 79:af:49:b3:05:ba:56:58:e9:55:d4:d6:d6:09:9e:8f: 3b:ef:48:10:a8:44:9f:f1:8c:ae:69:61:b1:5b:a2:6e: d3:7f:ed:91:3d:fe:0f:41:fd:d9:5a:0c:6f:23:c3:e9: 26:a6:19:a6:5d:09:9a:cc:2f:94:67:b1:37:42:b7:16: 5d:e7:2d:d9:bd:4f:5b:06:8a:30:de:ce:86:0e:aa:a0: c0:ec:dd:b6:2c:a4:4e:22:6a:39:3e:db:60:43:98:8d: dc:c5:48:8e:e5:02:2f:35:a7:5b:f5:0e:41:db:96:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ab:d5:01:72:ba:ec:b9:93:58:67:9b:13:24:91:b3:57: 8e:a6:98:0a:04:2e:77:10:4d:f1:08:88:96:d0:8d:c0: d5:62:da:88:57:82:f9:70:bf:6c:3c:4a:1b:4f:b4:e7: e0:c6:fe:de:91:e7:86:66:31:f2:e5:4f:d9:4e:61:e1: 77:55:24:8c:c2:48:2d:dd:85:00:1e:ad:d5:68:9b:72: e1:a2:2c:63:21:70:88:f0:42:9a:93:b6:84:dc:07:8e: c7:df:b3:09:a2:9f:07:6f:fd:fc:06:ef:ca:27:db:9e: ee:4b:52:9d:3d:2c:cf:4b:bb:1b:57:69:59:e1:c1:6b: 27:7f:c0:81:55:8c:9a:26:f8:ee:ff:a6:c7:a7:c3:35: 8f:01:bb:70:66:72:7e:2b:29:34:1c:0c:4e:1c:96:f8: 81:81:85:42:78:c6:ef:f0:c3:09:7b:6a:a8:8b:ea:34: 91:5d:fc:9c:3f:63:16:53:17:7a:11:c2:4b:55:07:63: 1f:c7:ae:40:40:08:4d:15:13:94:ef:7c:b6:72:d9:f6: 96:b0:1a:59:fc:f6:73:e3:aa:e1:07:0d:06:ad:36:29: c1:63:1e:61:2c:e2:43:5d:86:c8:31:1c:85:db:ea:4d: 15:bc:d4:77:47:f5:50:ba:7e:7b:7f:41:89:1d:e9:09 Fingerprint (SHA-256): DF:33:1E:FE:70:C5:5B:68:19:41:FE:7E:62:31:FA:2F:2C:A1:5F:52:FE:E3:E5:FC:48:1B:43:70:13:47:89:80 Fingerprint (SHA1): 49:21:79:BF:6E:F0:99:73:A0:81:1B:AF:7E:71:25:B3:33:46:0C:EB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6565: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #6566: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122712 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6567: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #6568: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #6569: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122713 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6570: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #6571: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #6572: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6573: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 510122714 -7 Bridge@Army < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6574: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6575: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 510122715 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6576: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6577: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #6578: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #6579: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6580: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 510122716 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-Bridge-510122618.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #6581: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6582: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #6583: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6584: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510122717 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6585: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6586: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #6587: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #6588: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122713 (0x1e67dad9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:29:06 2017 Not After : Tue May 10 12:29:06 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:57:d9:97:8f:49:68:d3:93:01:88:b1:a8:0f:20:82: 8c:2d:ab:39:b9:45:09:69:c8:12:77:ab:dd:cf:70:4b: 15:c1:6b:4b:e8:2c:79:cc:b5:66:b6:60:5e:f7:5e:6c: a0:fd:ce:c0:b9:4c:3b:5e:15:0f:b5:9e:87:c7:bf:87: 30:5a:36:ac:e8:ad:17:56:2c:25:87:59:d8:eb:cf:ed: 43:a1:d7:09:1a:58:42:7f:3e:c4:0d:04:0c:0b:f6:76: 08:9d:35:be:f8:f1:31:92:10:8d:c1:55:c4:a4:5e:87: 05:42:4c:0d:2c:08:3c:74:43:e6:e4:1e:95:a9:76:e0: dc:89:45:44:91:0c:7a:d8:41:73:6f:f7:ef:42:f9:d2: 4c:55:ef:9c:86:95:a8:e9:b2:15:c8:fd:40:a8:2b:bc: c7:02:8c:2b:eb:51:e5:45:69:45:da:4e:e7:b6:57:81: 4a:e7:13:29:41:59:de:70:16:72:8d:8c:aa:04:a7:30: bf:55:b6:3a:01:bb:f7:36:12:03:ac:ec:e0:ad:96:a0: 0b:1a:8b:91:da:f8:b4:2c:90:e4:5f:61:49:a4:68:b1: 8d:d5:17:89:dc:bc:1b:19:66:d9:0a:da:ad:f8:60:43: 4b:b8:83:d4:e6:c2:ef:91:10:81:56:36:68:78:53:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:03:2d:59:a0:2e:8b:37:59:e7:63:cf:a3:9a:a7:96: 6f:ae:98:50:bf:bc:72:7e:bb:13:fb:f0:87:91:d6:bb: 41:90:46:1e:d7:1f:ae:ce:dd:65:23:d9:60:f1:9d:65: 11:66:1e:b5:39:87:3d:58:b0:0b:c5:c0:9b:d2:59:83: 21:fc:76:23:1a:52:35:74:fd:b1:48:a9:cb:d8:8a:3c: 8c:e6:6e:6a:f7:9a:9f:6c:3a:2f:37:34:d8:8b:c2:80: 48:e3:1a:4d:05:09:53:28:97:d6:57:cc:0f:ca:04:9c: 76:d4:34:13:84:a6:55:8c:b3:0a:06:e1:e5:89:c8:31: bd:61:72:bb:9c:fe:bd:22:89:12:7d:69:85:39:83:0c: b4:4a:72:0f:6b:48:c0:45:34:7e:b4:7f:8b:ff:3f:35: 60:bb:98:36:1f:cd:56:32:67:de:86:fe:39:e1:c2:6c: 71:12:b7:ed:9d:8e:a6:5f:ac:bd:2d:40:66:be:e6:05: 1c:d6:67:41:06:88:98:a5:b5:78:95:eb:81:91:4d:3b: 61:cf:18:d5:1f:8d:26:3f:c8:64:a8:51:dc:8e:8d:45: 2b:82:42:4e:0e:18:a0:e6:ef:47:03:57:eb:0d:91:ce: b9:cd:fa:f3:d8:9c:52:4c:55:6f:f4:d5:1d:cb:08:81 Fingerprint (SHA-256): 3A:D8:02:A2:96:40:91:4D:03:43:1A:D5:DF:FA:FE:53:FD:E9:CE:7E:9F:75:CC:8A:47:CF:96:87:1B:7C:0B:32 Fingerprint (SHA1): 29:55:9F:6A:4D:D5:19:63:CE:90:15:0C:69:0A:1E:BD:2D:7C:13:A5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #6589: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122713 (0x1e67dad9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:29:06 2017 Not After : Tue May 10 12:29:06 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:57:d9:97:8f:49:68:d3:93:01:88:b1:a8:0f:20:82: 8c:2d:ab:39:b9:45:09:69:c8:12:77:ab:dd:cf:70:4b: 15:c1:6b:4b:e8:2c:79:cc:b5:66:b6:60:5e:f7:5e:6c: a0:fd:ce:c0:b9:4c:3b:5e:15:0f:b5:9e:87:c7:bf:87: 30:5a:36:ac:e8:ad:17:56:2c:25:87:59:d8:eb:cf:ed: 43:a1:d7:09:1a:58:42:7f:3e:c4:0d:04:0c:0b:f6:76: 08:9d:35:be:f8:f1:31:92:10:8d:c1:55:c4:a4:5e:87: 05:42:4c:0d:2c:08:3c:74:43:e6:e4:1e:95:a9:76:e0: dc:89:45:44:91:0c:7a:d8:41:73:6f:f7:ef:42:f9:d2: 4c:55:ef:9c:86:95:a8:e9:b2:15:c8:fd:40:a8:2b:bc: c7:02:8c:2b:eb:51:e5:45:69:45:da:4e:e7:b6:57:81: 4a:e7:13:29:41:59:de:70:16:72:8d:8c:aa:04:a7:30: bf:55:b6:3a:01:bb:f7:36:12:03:ac:ec:e0:ad:96:a0: 0b:1a:8b:91:da:f8:b4:2c:90:e4:5f:61:49:a4:68:b1: 8d:d5:17:89:dc:bc:1b:19:66:d9:0a:da:ad:f8:60:43: 4b:b8:83:d4:e6:c2:ef:91:10:81:56:36:68:78:53:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:03:2d:59:a0:2e:8b:37:59:e7:63:cf:a3:9a:a7:96: 6f:ae:98:50:bf:bc:72:7e:bb:13:fb:f0:87:91:d6:bb: 41:90:46:1e:d7:1f:ae:ce:dd:65:23:d9:60:f1:9d:65: 11:66:1e:b5:39:87:3d:58:b0:0b:c5:c0:9b:d2:59:83: 21:fc:76:23:1a:52:35:74:fd:b1:48:a9:cb:d8:8a:3c: 8c:e6:6e:6a:f7:9a:9f:6c:3a:2f:37:34:d8:8b:c2:80: 48:e3:1a:4d:05:09:53:28:97:d6:57:cc:0f:ca:04:9c: 76:d4:34:13:84:a6:55:8c:b3:0a:06:e1:e5:89:c8:31: bd:61:72:bb:9c:fe:bd:22:89:12:7d:69:85:39:83:0c: b4:4a:72:0f:6b:48:c0:45:34:7e:b4:7f:8b:ff:3f:35: 60:bb:98:36:1f:cd:56:32:67:de:86:fe:39:e1:c2:6c: 71:12:b7:ed:9d:8e:a6:5f:ac:bd:2d:40:66:be:e6:05: 1c:d6:67:41:06:88:98:a5:b5:78:95:eb:81:91:4d:3b: 61:cf:18:d5:1f:8d:26:3f:c8:64:a8:51:dc:8e:8d:45: 2b:82:42:4e:0e:18:a0:e6:ef:47:03:57:eb:0d:91:ce: b9:cd:fa:f3:d8:9c:52:4c:55:6f:f4:d5:1d:cb:08:81 Fingerprint (SHA-256): 3A:D8:02:A2:96:40:91:4D:03:43:1A:D5:DF:FA:FE:53:FD:E9:CE:7E:9F:75:CC:8A:47:CF:96:87:1B:7C:0B:32 Fingerprint (SHA1): 29:55:9F:6A:4D:D5:19:63:CE:90:15:0C:69:0A:1E:BD:2D:7C:13:A5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #6590: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #6591: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122718 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6592: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #6593: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #6594: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122719 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6595: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #6596: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #6597: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6598: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 510122720 -7 Bridge@Army < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6599: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6600: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 510122721 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6601: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6602: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #6603: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #6604: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6605: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 510122722 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-Bridge-510122619.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #6606: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6607: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #6608: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6609: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510122723 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6610: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6611: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #6612: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6613: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 510122724 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-BridgeNavy-510122620.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #6614: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6615: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #6616: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6617: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 510122725 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6618: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6619: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #6620: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #6621: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122719 (0x1e67dadf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:29:16 2017 Not After : Tue May 10 12:29:16 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 92:ca:13:59:1e:8b:a0:fd:a3:49:e8:77:ec:e1:fd:e1: e3:83:ab:d7:0e:a1:32:ec:c1:06:ae:0c:89:87:72:85: a7:68:8b:8b:84:cd:73:fe:46:fd:1a:87:ef:f1:52:71: 16:ad:79:d4:6f:b0:ef:92:d9:96:fa:8d:42:1e:e3:8e: 02:84:cb:ae:8e:1e:73:90:3a:29:31:a6:75:5f:a8:b0: c6:89:81:d7:96:ed:ad:60:37:b0:eb:00:bd:3e:c2:27: 54:c6:cb:06:3d:89:45:88:55:1a:a4:75:3f:43:f9:56: f3:8a:e3:69:86:47:6b:57:a2:7c:5d:65:07:b1:9e:e4: ed:76:05:ed:8e:31:0b:b4:f0:b4:ac:1f:80:7d:10:06: 11:da:b3:3e:aa:f9:c3:5c:cf:85:80:3e:bb:1d:6d:24: 63:ae:b8:f3:b4:dd:b6:b7:66:cd:96:e6:32:ab:19:a3: d3:7d:e8:4c:43:a6:77:c6:84:1a:99:a0:ac:8e:c7:96: f2:fa:7f:c1:81:f2:e8:5c:0e:8a:a8:aa:97:a6:01:25: 19:33:39:1e:6e:70:a8:b6:f1:65:a0:2d:a8:83:81:3a: d1:84:3f:74:fd:b5:51:ad:0f:8e:6f:ff:f9:17:44:ab: 16:54:bc:bc:48:be:33:bf:3c:51:82:af:f9:07:cf:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:07:9f:cc:e8:36:7f:1e:81:6a:98:24:f5:f3:e5:a6: ef:c8:22:51:24:26:12:b3:d4:89:e4:91:21:1c:bd:26: fb:f6:8e:88:29:ab:ee:4a:4b:49:43:e4:25:46:2d:db: 05:23:00:c0:df:59:1b:6e:68:45:56:1e:e7:27:a2:50: 5b:f5:aa:7a:ff:a0:f0:18:f4:05:7d:55:c6:36:46:21: 02:f9:de:36:81:d6:07:9a:20:bf:0f:16:38:62:f5:dd: 22:b4:2a:3c:3a:d4:59:d6:8b:2d:75:66:f9:02:61:00: e1:0e:da:8b:ec:b7:d2:7a:68:49:48:39:1f:6e:01:77: 38:8a:fd:dd:51:12:af:08:e6:f2:55:3c:df:a7:16:8b: ab:1e:88:58:a8:97:c4:25:46:9a:4a:98:3b:5c:df:a8: 20:7c:3b:48:25:73:04:25:c6:5c:97:4a:b9:09:66:de: 4d:3b:7d:f0:e2:1a:41:93:22:0c:b7:28:b9:54:81:52: 76:3f:3c:dc:44:e1:81:bb:39:b7:38:a3:42:ae:49:ec: 52:c8:c0:59:fd:49:4c:34:f1:af:51:0a:95:6f:dc:47: 6e:33:71:9d:62:77:eb:16:6b:f7:49:f2:12:35:f2:2c: 9c:58:20:b8:93:a1:c3:3c:3b:ea:f2:83:57:83:7c:ec Fingerprint (SHA-256): A9:0B:08:EC:B8:BA:50:19:70:C4:6A:1C:6B:2E:C4:BE:08:E8:40:95:CC:C0:CD:98:FC:9E:FB:04:B8:52:08:6E Fingerprint (SHA1): 55:4E:02:35:17:3E:86:DF:E2:0A:2D:D4:12:FE:CA:BD:4D:7C:2C:C6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #6622: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122719 (0x1e67dadf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:29:16 2017 Not After : Tue May 10 12:29:16 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 92:ca:13:59:1e:8b:a0:fd:a3:49:e8:77:ec:e1:fd:e1: e3:83:ab:d7:0e:a1:32:ec:c1:06:ae:0c:89:87:72:85: a7:68:8b:8b:84:cd:73:fe:46:fd:1a:87:ef:f1:52:71: 16:ad:79:d4:6f:b0:ef:92:d9:96:fa:8d:42:1e:e3:8e: 02:84:cb:ae:8e:1e:73:90:3a:29:31:a6:75:5f:a8:b0: c6:89:81:d7:96:ed:ad:60:37:b0:eb:00:bd:3e:c2:27: 54:c6:cb:06:3d:89:45:88:55:1a:a4:75:3f:43:f9:56: f3:8a:e3:69:86:47:6b:57:a2:7c:5d:65:07:b1:9e:e4: ed:76:05:ed:8e:31:0b:b4:f0:b4:ac:1f:80:7d:10:06: 11:da:b3:3e:aa:f9:c3:5c:cf:85:80:3e:bb:1d:6d:24: 63:ae:b8:f3:b4:dd:b6:b7:66:cd:96:e6:32:ab:19:a3: d3:7d:e8:4c:43:a6:77:c6:84:1a:99:a0:ac:8e:c7:96: f2:fa:7f:c1:81:f2:e8:5c:0e:8a:a8:aa:97:a6:01:25: 19:33:39:1e:6e:70:a8:b6:f1:65:a0:2d:a8:83:81:3a: d1:84:3f:74:fd:b5:51:ad:0f:8e:6f:ff:f9:17:44:ab: 16:54:bc:bc:48:be:33:bf:3c:51:82:af:f9:07:cf:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:07:9f:cc:e8:36:7f:1e:81:6a:98:24:f5:f3:e5:a6: ef:c8:22:51:24:26:12:b3:d4:89:e4:91:21:1c:bd:26: fb:f6:8e:88:29:ab:ee:4a:4b:49:43:e4:25:46:2d:db: 05:23:00:c0:df:59:1b:6e:68:45:56:1e:e7:27:a2:50: 5b:f5:aa:7a:ff:a0:f0:18:f4:05:7d:55:c6:36:46:21: 02:f9:de:36:81:d6:07:9a:20:bf:0f:16:38:62:f5:dd: 22:b4:2a:3c:3a:d4:59:d6:8b:2d:75:66:f9:02:61:00: e1:0e:da:8b:ec:b7:d2:7a:68:49:48:39:1f:6e:01:77: 38:8a:fd:dd:51:12:af:08:e6:f2:55:3c:df:a7:16:8b: ab:1e:88:58:a8:97:c4:25:46:9a:4a:98:3b:5c:df:a8: 20:7c:3b:48:25:73:04:25:c6:5c:97:4a:b9:09:66:de: 4d:3b:7d:f0:e2:1a:41:93:22:0c:b7:28:b9:54:81:52: 76:3f:3c:dc:44:e1:81:bb:39:b7:38:a3:42:ae:49:ec: 52:c8:c0:59:fd:49:4c:34:f1:af:51:0a:95:6f:dc:47: 6e:33:71:9d:62:77:eb:16:6b:f7:49:f2:12:35:f2:2c: 9c:58:20:b8:93:a1:c3:3c:3b:ea:f2:83:57:83:7c:ec Fingerprint (SHA-256): A9:0B:08:EC:B8:BA:50:19:70:C4:6A:1C:6B:2E:C4:BE:08:E8:40:95:CC:C0:CD:98:FC:9E:FB:04:B8:52:08:6E Fingerprint (SHA1): 55:4E:02:35:17:3E:86:DF:E2:0A:2D:D4:12:FE:CA:BD:4D:7C:2C:C6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #6623: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #6624: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122718 (0x1e67dade) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 12:29:15 2017 Not After : Tue May 10 12:29:15 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:50:1d:c5:ef:60:d5:c3:33:7c:89:8e:d5:55:ff:43: 2b:61:ce:be:e0:63:bf:17:74:5a:e0:a8:6f:12:d6:ab: dd:15:0f:a0:ba:0b:95:58:69:9a:7d:9a:67:61:cc:39: 23:6b:a2:eb:51:c7:57:db:3e:4d:00:5a:88:73:42:2d: 96:34:c8:08:b8:1e:2b:7b:50:36:b3:d7:25:cc:c8:aa: e4:a8:f5:f6:44:91:84:f1:f5:1c:72:97:eb:28:e4:71: ef:34:fe:5a:4b:20:62:66:55:0b:3d:a6:b0:63:47:56: df:70:6c:bd:ce:f1:74:d1:c0:58:cd:ec:79:8d:3c:51: da:df:1c:54:a4:fa:f9:dc:79:5c:c2:b0:bc:92:ce:5e: 46:ff:91:e3:cb:54:86:dd:e6:80:65:bb:69:49:46:10: 13:88:2e:d3:71:ec:2d:6c:97:b0:08:d6:aa:8a:ac:c7: 50:86:2d:4c:81:22:41:9f:9e:c3:a0:6c:8c:76:20:a1: 46:7a:4a:22:ad:a6:14:d4:a8:ce:b4:0f:8c:85:a0:b0: c2:45:fd:32:5f:c6:9f:5e:19:8d:38:91:bf:c2:43:c7: 60:48:c6:9e:ad:95:70:4c:5e:ec:c9:29:f1:f4:03:6b: be:df:91:bc:08:08:a2:6e:55:f9:ed:f1:f0:45:c2:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 26:86:64:44:71:80:da:19:d5:d8:23:55:29:39:c1:98: 00:51:9a:49:99:3d:56:8b:ce:b4:a4:f6:20:76:5a:01: 2e:2a:ab:62:14:d6:8e:1b:f2:24:77:17:b9:3b:3a:1f: 45:01:59:fc:41:a4:74:25:0c:48:b6:e4:db:46:17:34: d3:20:2c:e1:98:d6:c9:93:38:47:94:96:44:95:3a:a4: 40:fc:59:c5:8b:72:06:6b:85:2b:3d:10:e3:06:ed:3d: 4f:0e:b8:fa:94:ee:92:fc:73:37:10:20:ed:89:1f:53: b8:5e:e8:4a:d9:a8:fc:78:1e:5e:52:da:66:07:a7:1a: a1:6e:5d:b8:42:9a:b9:c8:ab:b2:c4:11:9b:52:be:6d: 1a:07:15:4f:f7:26:07:f2:99:78:ae:ef:13:10:2a:4f: e6:8c:76:dc:0f:2c:12:c9:75:e7:6d:08:f9:ae:2b:72: cb:52:28:15:81:e5:62:71:31:83:66:64:13:27:20:49: b3:46:fc:59:3a:8b:39:f6:ef:26:e6:72:88:4a:52:6a: 9a:2c:6f:04:91:15:7f:27:0a:4a:09:fd:d0:58:10:59: 6f:c9:3c:ae:60:25:9b:40:f2:30:3c:fe:3c:b4:8e:62: ae:4f:a8:e1:44:76:aa:22:e8:e7:2a:25:c0:81:c3:67 Fingerprint (SHA-256): 9F:EE:19:DB:0B:39:45:8F:86:A0:BF:D5:73:7B:0F:73:B1:0D:17:B3:17:C1:E8:C8:CA:EF:98:3A:23:87:EA:05 Fingerprint (SHA1): 2A:F1:DE:6D:52:93:09:DA:8A:A5:7C:80:56:C6:78:23:3C:08:74:78 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #6625: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122719 (0x1e67dadf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:29:16 2017 Not After : Tue May 10 12:29:16 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 92:ca:13:59:1e:8b:a0:fd:a3:49:e8:77:ec:e1:fd:e1: e3:83:ab:d7:0e:a1:32:ec:c1:06:ae:0c:89:87:72:85: a7:68:8b:8b:84:cd:73:fe:46:fd:1a:87:ef:f1:52:71: 16:ad:79:d4:6f:b0:ef:92:d9:96:fa:8d:42:1e:e3:8e: 02:84:cb:ae:8e:1e:73:90:3a:29:31:a6:75:5f:a8:b0: c6:89:81:d7:96:ed:ad:60:37:b0:eb:00:bd:3e:c2:27: 54:c6:cb:06:3d:89:45:88:55:1a:a4:75:3f:43:f9:56: f3:8a:e3:69:86:47:6b:57:a2:7c:5d:65:07:b1:9e:e4: ed:76:05:ed:8e:31:0b:b4:f0:b4:ac:1f:80:7d:10:06: 11:da:b3:3e:aa:f9:c3:5c:cf:85:80:3e:bb:1d:6d:24: 63:ae:b8:f3:b4:dd:b6:b7:66:cd:96:e6:32:ab:19:a3: d3:7d:e8:4c:43:a6:77:c6:84:1a:99:a0:ac:8e:c7:96: f2:fa:7f:c1:81:f2:e8:5c:0e:8a:a8:aa:97:a6:01:25: 19:33:39:1e:6e:70:a8:b6:f1:65:a0:2d:a8:83:81:3a: d1:84:3f:74:fd:b5:51:ad:0f:8e:6f:ff:f9:17:44:ab: 16:54:bc:bc:48:be:33:bf:3c:51:82:af:f9:07:cf:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:07:9f:cc:e8:36:7f:1e:81:6a:98:24:f5:f3:e5:a6: ef:c8:22:51:24:26:12:b3:d4:89:e4:91:21:1c:bd:26: fb:f6:8e:88:29:ab:ee:4a:4b:49:43:e4:25:46:2d:db: 05:23:00:c0:df:59:1b:6e:68:45:56:1e:e7:27:a2:50: 5b:f5:aa:7a:ff:a0:f0:18:f4:05:7d:55:c6:36:46:21: 02:f9:de:36:81:d6:07:9a:20:bf:0f:16:38:62:f5:dd: 22:b4:2a:3c:3a:d4:59:d6:8b:2d:75:66:f9:02:61:00: e1:0e:da:8b:ec:b7:d2:7a:68:49:48:39:1f:6e:01:77: 38:8a:fd:dd:51:12:af:08:e6:f2:55:3c:df:a7:16:8b: ab:1e:88:58:a8:97:c4:25:46:9a:4a:98:3b:5c:df:a8: 20:7c:3b:48:25:73:04:25:c6:5c:97:4a:b9:09:66:de: 4d:3b:7d:f0:e2:1a:41:93:22:0c:b7:28:b9:54:81:52: 76:3f:3c:dc:44:e1:81:bb:39:b7:38:a3:42:ae:49:ec: 52:c8:c0:59:fd:49:4c:34:f1:af:51:0a:95:6f:dc:47: 6e:33:71:9d:62:77:eb:16:6b:f7:49:f2:12:35:f2:2c: 9c:58:20:b8:93:a1:c3:3c:3b:ea:f2:83:57:83:7c:ec Fingerprint (SHA-256): A9:0B:08:EC:B8:BA:50:19:70:C4:6A:1C:6B:2E:C4:BE:08:E8:40:95:CC:C0:CD:98:FC:9E:FB:04:B8:52:08:6E Fingerprint (SHA1): 55:4E:02:35:17:3E:86:DF:E2:0A:2D:D4:12:FE:CA:BD:4D:7C:2C:C6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #6626: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122719 (0x1e67dadf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:29:16 2017 Not After : Tue May 10 12:29:16 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 92:ca:13:59:1e:8b:a0:fd:a3:49:e8:77:ec:e1:fd:e1: e3:83:ab:d7:0e:a1:32:ec:c1:06:ae:0c:89:87:72:85: a7:68:8b:8b:84:cd:73:fe:46:fd:1a:87:ef:f1:52:71: 16:ad:79:d4:6f:b0:ef:92:d9:96:fa:8d:42:1e:e3:8e: 02:84:cb:ae:8e:1e:73:90:3a:29:31:a6:75:5f:a8:b0: c6:89:81:d7:96:ed:ad:60:37:b0:eb:00:bd:3e:c2:27: 54:c6:cb:06:3d:89:45:88:55:1a:a4:75:3f:43:f9:56: f3:8a:e3:69:86:47:6b:57:a2:7c:5d:65:07:b1:9e:e4: ed:76:05:ed:8e:31:0b:b4:f0:b4:ac:1f:80:7d:10:06: 11:da:b3:3e:aa:f9:c3:5c:cf:85:80:3e:bb:1d:6d:24: 63:ae:b8:f3:b4:dd:b6:b7:66:cd:96:e6:32:ab:19:a3: d3:7d:e8:4c:43:a6:77:c6:84:1a:99:a0:ac:8e:c7:96: f2:fa:7f:c1:81:f2:e8:5c:0e:8a:a8:aa:97:a6:01:25: 19:33:39:1e:6e:70:a8:b6:f1:65:a0:2d:a8:83:81:3a: d1:84:3f:74:fd:b5:51:ad:0f:8e:6f:ff:f9:17:44:ab: 16:54:bc:bc:48:be:33:bf:3c:51:82:af:f9:07:cf:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:07:9f:cc:e8:36:7f:1e:81:6a:98:24:f5:f3:e5:a6: ef:c8:22:51:24:26:12:b3:d4:89:e4:91:21:1c:bd:26: fb:f6:8e:88:29:ab:ee:4a:4b:49:43:e4:25:46:2d:db: 05:23:00:c0:df:59:1b:6e:68:45:56:1e:e7:27:a2:50: 5b:f5:aa:7a:ff:a0:f0:18:f4:05:7d:55:c6:36:46:21: 02:f9:de:36:81:d6:07:9a:20:bf:0f:16:38:62:f5:dd: 22:b4:2a:3c:3a:d4:59:d6:8b:2d:75:66:f9:02:61:00: e1:0e:da:8b:ec:b7:d2:7a:68:49:48:39:1f:6e:01:77: 38:8a:fd:dd:51:12:af:08:e6:f2:55:3c:df:a7:16:8b: ab:1e:88:58:a8:97:c4:25:46:9a:4a:98:3b:5c:df:a8: 20:7c:3b:48:25:73:04:25:c6:5c:97:4a:b9:09:66:de: 4d:3b:7d:f0:e2:1a:41:93:22:0c:b7:28:b9:54:81:52: 76:3f:3c:dc:44:e1:81:bb:39:b7:38:a3:42:ae:49:ec: 52:c8:c0:59:fd:49:4c:34:f1:af:51:0a:95:6f:dc:47: 6e:33:71:9d:62:77:eb:16:6b:f7:49:f2:12:35:f2:2c: 9c:58:20:b8:93:a1:c3:3c:3b:ea:f2:83:57:83:7c:ec Fingerprint (SHA-256): A9:0B:08:EC:B8:BA:50:19:70:C4:6A:1C:6B:2E:C4:BE:08:E8:40:95:CC:C0:CD:98:FC:9E:FB:04:B8:52:08:6E Fingerprint (SHA1): 55:4E:02:35:17:3E:86:DF:E2:0A:2D:D4:12:FE:CA:BD:4D:7C:2C:C6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #6627: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #6628: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122726 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6629: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #6630: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #6631: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122727 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6632: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #6633: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #6634: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6635: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 510122728 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6636: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6637: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #6638: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6639: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 510122729 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6640: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6641: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #6642: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6643: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 510122730 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #6644: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6645: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 510122731 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #6646: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6647: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #6648: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #6649: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6650: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 510122732 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6651: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6652: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #6653: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6654: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 510122733 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6655: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6656: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #6657: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6658: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510122734 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6659: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6660: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #6661: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6662: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 510122735 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #6663: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6664: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6665: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122726 (0x1e67dae6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 12:29:27 2017 Not After : Tue May 10 12:29:27 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 93:1e:ef:a9:d9:32:02:93:a3:cd:c5:ad:b2:aa:59:1a: 34:99:fb:50:6a:16:70:e7:59:45:31:1a:58:88:26:e7: 08:f6:13:5b:12:ed:51:f5:84:c9:a1:6e:a7:ae:7b:8f: d5:a5:c7:f1:da:a2:9e:f9:bc:9a:0b:bc:aa:9c:b9:b7: 42:7e:60:30:b9:d9:eb:0e:d8:d5:dd:b3:c7:43:df:b3: 70:1b:3a:d8:44:f7:96:4d:dc:c7:56:dd:45:ef:46:5b: 72:8c:cc:0b:2b:b8:5f:59:05:72:21:2e:dc:e6:9e:d9: e0:a3:8a:61:d2:10:7a:61:2d:fc:31:0a:d2:73:45:33: 1c:2a:7b:b9:13:fc:c5:18:a6:ad:89:d5:e8:a3:54:7a: bb:31:0d:7c:a9:16:f1:a0:91:df:8c:67:3a:ee:c2:ef: ab:b8:8a:ba:6e:76:11:06:76:16:d1:3d:fd:04:9d:aa: 76:ab:6a:90:ea:7f:a6:6d:41:fa:8a:3c:1f:75:eb:54: 5c:7e:7a:33:5f:db:2a:1b:2e:16:bc:ed:15:1b:9c:f4: 9b:67:9e:25:20:c3:7b:4e:a7:9a:9b:03:60:5f:de:48: 98:f8:09:6f:ff:52:9d:36:dd:59:b7:4e:00:71:33:7c: 9f:92:a0:3b:85:3c:26:c9:81:41:6c:be:e8:14:f5:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:ec:95:4a:9b:81:51:bb:c2:3f:37:0e:6b:e2:e2:79: 69:49:36:bf:15:0f:99:c4:15:96:8d:8d:36:fb:9a:75: d5:73:f1:f9:6e:64:16:de:96:c6:ba:9c:30:3d:fd:53: 28:64:11:13:f5:9f:07:63:8e:87:bf:68:4b:7e:aa:69: f1:51:92:fc:d0:3b:cb:99:48:b5:cb:7e:90:54:04:9a: c4:1f:73:79:45:74:1d:5a:36:9c:50:ef:82:32:6a:ea: 11:53:4f:09:34:27:0c:5c:da:82:e7:60:a2:f5:23:27: 02:29:21:7c:04:86:98:0e:17:5c:fc:ad:81:e6:09:03: 1b:40:61:f9:69:8c:14:e7:87:d1:69:62:e5:fe:d7:d2: 9a:6c:97:4c:3b:8b:2c:95:18:8b:d7:ea:c9:06:34:a9: 25:7f:bf:4e:ba:cd:1a:1f:9a:1d:ba:d2:8e:b7:94:0f: 03:8d:79:fb:0b:3f:eb:05:78:b9:7d:0b:24:1f:97:4f: 12:c5:1a:01:ea:03:a6:f7:37:21:53:13:49:46:4f:08: 91:b1:5c:07:f6:ab:77:34:13:ae:d4:dc:84:84:ab:ec: 02:d9:00:5f:3b:e9:b4:4a:59:eb:07:a4:11:f3:3d:39: 9b:f4:13:58:44:b8:7f:58:07:13:a8:4a:c2:63:dc:c7 Fingerprint (SHA-256): A8:14:47:31:F6:A5:57:70:83:B2:7E:99:FD:0A:F8:61:32:80:E3:35:C7:F9:79:BC:F5:78:16:14:87:90:E3:31 Fingerprint (SHA1): 51:C8:D4:A3:E8:13:95:D2:6C:52:5B:32:98:D7:DF:EA:1A:0A:AC:17 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #6666: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6667: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6668: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6669: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6670: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6671: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6672: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6673: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6674: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122727 (0x1e67dae7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:29:28 2017 Not After : Tue May 10 12:29:28 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:b3:8e:6a:4f:4e:66:19:3a:1e:b6:42:b5:77:8e:47: ac:ea:85:f2:52:cc:d6:6b:bd:f1:e6:54:44:ce:b2:ae: 19:36:21:cd:42:ad:e9:20:08:b8:ed:bd:0a:35:e3:ef: 75:af:2a:63:94:74:a6:0e:81:88:1e:f6:72:49:a6:0e: ad:ea:13:65:63:97:47:a9:4a:37:03:ac:c3:68:46:9c: f7:6d:9f:8c:09:5e:b9:0d:85:f5:7e:2b:16:c8:ba:da: e1:1d:79:55:dc:4c:e5:04:c1:31:8b:fb:0d:56:11:5e: e1:33:f5:ce:36:39:36:23:15:9d:1f:c7:f2:30:a6:98: 23:0b:22:c4:77:4a:23:d9:f9:29:19:41:5c:ce:a7:f3: ef:db:38:b1:31:5f:ec:a1:41:02:85:22:f7:2e:2f:2b: f4:82:18:37:94:21:39:0c:27:9b:7e:9c:1c:0b:1b:cc: 67:8c:82:d2:57:c0:87:2d:f3:94:69:e9:2f:c0:33:22: 16:73:c4:6c:6d:c2:7e:cd:cb:db:7f:4b:fe:d2:81:78: 90:1c:73:1b:7b:c0:bb:c7:a4:43:86:18:58:75:c5:52: 3e:77:14:82:6a:1f:ba:65:c7:28:4a:e2:61:2d:b3:18: 3e:6c:6f:65:c3:df:73:e5:35:ff:d4:69:33:3d:ac:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 42:21:2e:17:65:9c:84:91:2a:11:6b:bc:6b:f8:7d:18: 05:be:ea:13:26:17:b6:b7:f1:33:a7:1b:25:5c:b9:76: 7d:28:32:a0:73:e3:14:40:43:d3:b6:5e:26:f3:69:09: 79:7d:e8:80:6e:f1:c6:b5:7b:fe:f8:a8:27:18:17:ef: 51:cf:7f:4e:52:e4:2c:53:a3:17:d7:8b:85:67:d8:30: 8c:f2:f7:77:62:84:41:9c:f2:e3:c0:af:0e:31:ba:18: 1d:16:ef:bc:b8:99:c4:9c:15:49:fb:19:a2:7f:19:da: 42:f3:1d:6c:9c:1c:06:c5:54:37:3f:40:70:68:4c:cd: e2:d8:a3:95:2e:0a:41:e1:75:2b:b3:04:11:10:94:fc: 8d:c8:20:02:b3:31:d6:6f:58:11:10:77:f8:14:0d:90: dc:ac:6c:68:f4:49:95:a5:0a:24:a7:26:e8:9d:d1:cb: 6f:e6:79:71:db:43:e3:81:3f:96:fb:c5:ee:89:ba:73: 3b:8d:71:a1:62:e1:da:bc:8b:b5:75:70:1c:42:91:d9: b7:70:63:50:e4:88:e5:9f:0d:d8:0f:d6:70:a9:49:cd: e6:8f:ff:39:fc:ed:7e:1c:de:70:2e:66:45:82:20:97: fd:64:62:de:2a:0a:f9:79:4a:38:85:ef:d8:49:90:8a Fingerprint (SHA-256): EF:C2:40:0F:55:E2:BF:2D:58:30:D3:2D:60:7A:34:A4:D9:41:D4:8B:FC:1D:F5:A7:A4:2E:C2:DA:C2:44:8D:32 Fingerprint (SHA1): E8:B6:8C:C8:A6:53:13:DF:BB:39:DA:15:E4:01:12:3D:F9:EF:9B:10 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #6675: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6676: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6677: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6678: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6679: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #6680: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #6681: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #6682: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #6683: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #6684: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #6685: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #6686: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #6687: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #6688: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #6689: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #6690: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #6691: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #6692: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #6693: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122736 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6694: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #6695: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #6696: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6697: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510122737 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6698: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6699: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #6700: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6701: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510122738 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6702: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6703: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #6704: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6705: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 510122739 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6706: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6707: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #6708: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6709: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 510122740 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6710: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6711: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #6712: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6713: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 510122741 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6714: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6715: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #6716: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6717: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 510122742 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6718: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6719: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #6720: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6721: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 510122743 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6722: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6723: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #6724: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6725: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 510122744 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6726: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6727: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #6728: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122736 (0x1e67daf0) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:29:43 2017 Not After : Tue May 10 12:29:43 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 29:56:79:18:b2:87:e7:e6:5b:38:f9:03:a7:d5:76:3f: ba:f7:88:d9:93:8f:da:86:48:7f:1a:1c:78:bd:f6:24: dd:6c:4b:30:2f:a7:95:79:e0:a1:72:a2:fb:26:ea:4f: ac:a9:b0:38:28:59:c1:c7:08:ca:ad:ef:88:10:fb:5b: 10:38:6d:0f:75:27:66:7f:84:0d:6b:b9:d7:85:98:0b: 8c:34:1e:5d:d1:8a:94:c6:12:a6:14:d2:dc:3d:3d:85: fd:74:dd:86:e2:7f:c3:53:b8:d7:e0:cd:22:fc:e7:6a: 1c:e2:e2:38:73:b1:0f:7e:25:1d:de:51:31:cc:a9:d4: c9:71:e5:4f:dc:48:05:b9:0c:1d:01:dc:e7:60:f8:50: 13:f2:96:b6:50:70:64:54:43:4b:6a:e3:a2:35:ad:26: 51:f8:03:d2:1b:1f:fd:cd:62:2b:4e:95:6c:bc:e8:4a: 31:90:57:9c:eb:30:f7:d3:bd:e9:96:52:9e:b9:b2:94: e9:70:c0:44:c0:cf:8b:2c:e3:03:d7:9b:2c:b3:ab:96: 80:48:9f:58:42:df:eb:61:d5:7b:e7:e7:65:4d:6f:5e: 52:2f:b9:d6:5c:84:36:e2:c8:d8:fd:f6:58:31:c2:77: ac:bd:be:52:1b:e2:cb:fb:fa:80:c2:56:1a:61:a1:64 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:0e:93:02:e1:16:18:fe:2f:43:6d:f4:5b: c9:c5:d1:d1:9f:9a:2e:96:44:c9:8b:25:20:ae:2e:3b: 02:1d:00:a3:7a:e9:55:d3:d6:8c:9b:e2:3d:f9:26:99: 3b:3c:60:c5:6b:d8:0a:64:8f:da:1d:f8:6a:01:59 Fingerprint (SHA-256): 8C:80:37:42:2B:2E:0A:C5:12:4A:B0:F9:0E:25:09:59:B2:42:D7:94:B4:45:1E:38:E3:B6:B2:40:85:12:19:84 Fingerprint (SHA1): 78:D2:07:2F:C7:5D:43:B6:08:AB:65:B6:6C:33:4C:7B:5F:82:1C:A9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6729: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122736 (0x1e67daf0) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:29:43 2017 Not After : Tue May 10 12:29:43 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 29:56:79:18:b2:87:e7:e6:5b:38:f9:03:a7:d5:76:3f: ba:f7:88:d9:93:8f:da:86:48:7f:1a:1c:78:bd:f6:24: dd:6c:4b:30:2f:a7:95:79:e0:a1:72:a2:fb:26:ea:4f: ac:a9:b0:38:28:59:c1:c7:08:ca:ad:ef:88:10:fb:5b: 10:38:6d:0f:75:27:66:7f:84:0d:6b:b9:d7:85:98:0b: 8c:34:1e:5d:d1:8a:94:c6:12:a6:14:d2:dc:3d:3d:85: fd:74:dd:86:e2:7f:c3:53:b8:d7:e0:cd:22:fc:e7:6a: 1c:e2:e2:38:73:b1:0f:7e:25:1d:de:51:31:cc:a9:d4: c9:71:e5:4f:dc:48:05:b9:0c:1d:01:dc:e7:60:f8:50: 13:f2:96:b6:50:70:64:54:43:4b:6a:e3:a2:35:ad:26: 51:f8:03:d2:1b:1f:fd:cd:62:2b:4e:95:6c:bc:e8:4a: 31:90:57:9c:eb:30:f7:d3:bd:e9:96:52:9e:b9:b2:94: e9:70:c0:44:c0:cf:8b:2c:e3:03:d7:9b:2c:b3:ab:96: 80:48:9f:58:42:df:eb:61:d5:7b:e7:e7:65:4d:6f:5e: 52:2f:b9:d6:5c:84:36:e2:c8:d8:fd:f6:58:31:c2:77: ac:bd:be:52:1b:e2:cb:fb:fa:80:c2:56:1a:61:a1:64 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:0e:93:02:e1:16:18:fe:2f:43:6d:f4:5b: c9:c5:d1:d1:9f:9a:2e:96:44:c9:8b:25:20:ae:2e:3b: 02:1d:00:a3:7a:e9:55:d3:d6:8c:9b:e2:3d:f9:26:99: 3b:3c:60:c5:6b:d8:0a:64:8f:da:1d:f8:6a:01:59 Fingerprint (SHA-256): 8C:80:37:42:2B:2E:0A:C5:12:4A:B0:F9:0E:25:09:59:B2:42:D7:94:B4:45:1E:38:E3:B6:B2:40:85:12:19:84 Fingerprint (SHA1): 78:D2:07:2F:C7:5D:43:B6:08:AB:65:B6:6C:33:4C:7B:5F:82:1C:A9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #6730: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122736 (0x1e67daf0) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:29:43 2017 Not After : Tue May 10 12:29:43 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 29:56:79:18:b2:87:e7:e6:5b:38:f9:03:a7:d5:76:3f: ba:f7:88:d9:93:8f:da:86:48:7f:1a:1c:78:bd:f6:24: dd:6c:4b:30:2f:a7:95:79:e0:a1:72:a2:fb:26:ea:4f: ac:a9:b0:38:28:59:c1:c7:08:ca:ad:ef:88:10:fb:5b: 10:38:6d:0f:75:27:66:7f:84:0d:6b:b9:d7:85:98:0b: 8c:34:1e:5d:d1:8a:94:c6:12:a6:14:d2:dc:3d:3d:85: fd:74:dd:86:e2:7f:c3:53:b8:d7:e0:cd:22:fc:e7:6a: 1c:e2:e2:38:73:b1:0f:7e:25:1d:de:51:31:cc:a9:d4: c9:71:e5:4f:dc:48:05:b9:0c:1d:01:dc:e7:60:f8:50: 13:f2:96:b6:50:70:64:54:43:4b:6a:e3:a2:35:ad:26: 51:f8:03:d2:1b:1f:fd:cd:62:2b:4e:95:6c:bc:e8:4a: 31:90:57:9c:eb:30:f7:d3:bd:e9:96:52:9e:b9:b2:94: e9:70:c0:44:c0:cf:8b:2c:e3:03:d7:9b:2c:b3:ab:96: 80:48:9f:58:42:df:eb:61:d5:7b:e7:e7:65:4d:6f:5e: 52:2f:b9:d6:5c:84:36:e2:c8:d8:fd:f6:58:31:c2:77: ac:bd:be:52:1b:e2:cb:fb:fa:80:c2:56:1a:61:a1:64 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:0e:93:02:e1:16:18:fe:2f:43:6d:f4:5b: c9:c5:d1:d1:9f:9a:2e:96:44:c9:8b:25:20:ae:2e:3b: 02:1d:00:a3:7a:e9:55:d3:d6:8c:9b:e2:3d:f9:26:99: 3b:3c:60:c5:6b:d8:0a:64:8f:da:1d:f8:6a:01:59 Fingerprint (SHA-256): 8C:80:37:42:2B:2E:0A:C5:12:4A:B0:F9:0E:25:09:59:B2:42:D7:94:B4:45:1E:38:E3:B6:B2:40:85:12:19:84 Fingerprint (SHA1): 78:D2:07:2F:C7:5D:43:B6:08:AB:65:B6:6C:33:4C:7B:5F:82:1C:A9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #6731: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122736 (0x1e67daf0) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:29:43 2017 Not After : Tue May 10 12:29:43 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 29:56:79:18:b2:87:e7:e6:5b:38:f9:03:a7:d5:76:3f: ba:f7:88:d9:93:8f:da:86:48:7f:1a:1c:78:bd:f6:24: dd:6c:4b:30:2f:a7:95:79:e0:a1:72:a2:fb:26:ea:4f: ac:a9:b0:38:28:59:c1:c7:08:ca:ad:ef:88:10:fb:5b: 10:38:6d:0f:75:27:66:7f:84:0d:6b:b9:d7:85:98:0b: 8c:34:1e:5d:d1:8a:94:c6:12:a6:14:d2:dc:3d:3d:85: fd:74:dd:86:e2:7f:c3:53:b8:d7:e0:cd:22:fc:e7:6a: 1c:e2:e2:38:73:b1:0f:7e:25:1d:de:51:31:cc:a9:d4: c9:71:e5:4f:dc:48:05:b9:0c:1d:01:dc:e7:60:f8:50: 13:f2:96:b6:50:70:64:54:43:4b:6a:e3:a2:35:ad:26: 51:f8:03:d2:1b:1f:fd:cd:62:2b:4e:95:6c:bc:e8:4a: 31:90:57:9c:eb:30:f7:d3:bd:e9:96:52:9e:b9:b2:94: e9:70:c0:44:c0:cf:8b:2c:e3:03:d7:9b:2c:b3:ab:96: 80:48:9f:58:42:df:eb:61:d5:7b:e7:e7:65:4d:6f:5e: 52:2f:b9:d6:5c:84:36:e2:c8:d8:fd:f6:58:31:c2:77: ac:bd:be:52:1b:e2:cb:fb:fa:80:c2:56:1a:61:a1:64 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:0e:93:02:e1:16:18:fe:2f:43:6d:f4:5b: c9:c5:d1:d1:9f:9a:2e:96:44:c9:8b:25:20:ae:2e:3b: 02:1d:00:a3:7a:e9:55:d3:d6:8c:9b:e2:3d:f9:26:99: 3b:3c:60:c5:6b:d8:0a:64:8f:da:1d:f8:6a:01:59 Fingerprint (SHA-256): 8C:80:37:42:2B:2E:0A:C5:12:4A:B0:F9:0E:25:09:59:B2:42:D7:94:B4:45:1E:38:E3:B6:B2:40:85:12:19:84 Fingerprint (SHA1): 78:D2:07:2F:C7:5D:43:B6:08:AB:65:B6:6C:33:4C:7B:5F:82:1C:A9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #6732: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #6733: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 10 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6734: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #6735: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #6736: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6737: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6738: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6739: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #6740: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6741: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6742: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6743: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #6744: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6745: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6746: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6747: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #6748: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6749: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6750: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6751: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #6752: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6753: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6754: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6755: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #6756: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6757: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6758: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6759: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20170510122959Z nextupdate=20180510122959Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed May 10 12:29:59 2017 Next Update: Thu May 10 12:29:59 2018 CRL Extensions: chains.sh: #6760: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510122959Z nextupdate=20180510122959Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 12:29:59 2017 Next Update: Thu May 10 12:29:59 2018 CRL Extensions: chains.sh: #6761: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170510122959Z nextupdate=20180510122959Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed May 10 12:29:59 2017 Next Update: Thu May 10 12:29:59 2018 CRL Extensions: chains.sh: #6762: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20170510122959Z nextupdate=20180510122959Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed May 10 12:29:59 2017 Next Update: Thu May 10 12:29:59 2018 CRL Extensions: chains.sh: #6763: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170510123000Z addcert 14 20170510123000Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed May 10 12:30:00 2017 Next Update: Thu May 10 12:29:59 2018 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Wed May 10 12:30:00 2017 CRL Extensions: chains.sh: #6764: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510123001Z addcert 15 20170510123001Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 12:30:01 2017 Next Update: Thu May 10 12:29:59 2018 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Wed May 10 12:30:01 2017 CRL Extensions: chains.sh: #6765: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #6766: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6767: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #6768: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #6769: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #6770: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #6771: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #6772: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #6773: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #6774: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:29:52 2017 Not After : Tue May 10 12:29:52 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:0f:9e:f9:99:61:0a:b8:37:16:04:d5:85:0e:b3:23: 04:49:7a:4f:31:e4:34:66:0a:11:2c:22:46:d3:6a:f3: 9a:49:f6:14:2e:63:46:1b:66:19:f5:77:6a:6b:01:87: 04:d9:eb:1c:3f:c3:de:c7:49:d0:e2:ef:86:d5:69:5f: 8d:09:7d:8f:a8:0b:1f:9c:b5:e3:5d:1b:be:de:e7:09: bf:1e:1e:d8:07:af:f6:a9:b5:bb:81:e0:7b:ef:88:c6: ee:d0:dd:68:13:72:70:1b:28:bf:6e:b6:4e:74:cc:bc: e5:d9:f4:60:a8:d9:16:e0:e6:0e:eb:b1:5c:91:ab:86: f2:2e:05:77:ec:87:dd:58:ab:38:69:d6:33:11:de:89: be:77:1e:50:e7:26:a9:fc:58:d7:27:97:b3:e1:f8:f9: c0:c7:7d:7c:c8:f9:2f:39:e3:ae:5c:2a:62:55:b5:be: 2d:f2:9e:ea:dd:30:7e:94:2c:42:9a:25:75:42:86:18: 4c:1f:35:78:24:6e:c6:8f:cd:da:01:77:c4:7a:21:ad: 6a:94:e8:94:72:64:61:87:c1:78:4a:de:8f:f1:89:9b: 3a:e9:57:8f:a0:d0:86:c5:0d:fc:fb:13:ff:df:4f:10: 46:b4:94:91:39:6c:fb:d8:b0:e8:e3:60:5e:53:1f:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:97:3a:b4:1a:fa:90:da:f6:46:39:64:a0:0e:a8:ff: d7:8f:d7:2e:b6:11:7c:50:fa:b4:a0:3d:0e:76:32:ba: 8e:e7:c4:be:d3:24:f6:f2:1f:b6:ec:11:01:20:45:fe: 31:18:d3:4a:f3:21:82:50:49:30:b1:5a:ed:31:54:49: 5b:a9:15:86:bd:b7:11:c3:63:ba:12:88:15:e4:b4:0f: 46:73:07:25:0a:3f:dc:0a:0c:9d:b1:8c:ad:57:7c:19: d9:00:bc:13:00:05:d5:e3:58:4f:a9:8a:dd:c0:72:44: e4:58:e7:80:4c:62:f0:83:b1:8c:12:6e:a9:ef:98:74: 0d:19:c3:f3:c7:7f:fb:08:53:9a:b2:f2:04:d0:43:ff: 40:40:02:a6:f1:e7:9d:8a:4b:fa:bf:80:22:12:5c:2f: 3e:1c:aa:bf:a5:4e:14:e4:b3:76:ee:f9:dc:3f:8b:e9: 57:a0:4e:5c:99:3d:2f:24:70:af:5a:e9:20:58:0d:63: 5a:95:a0:e7:80:fc:ec:bc:ab:bc:ec:da:1e:24:17:b7: 74:09:5e:b4:2c:b1:d1:2d:2e:e5:39:91:40:40:5c:ab: 25:90:04:0b:a4:8e:84:21:55:8a:67:3a:4f:e5:bc:76: 31:32:8a:d3:3a:b8:74:11:71:ff:3e:36:92:02:55:05 Fingerprint (SHA-256): 74:AE:63:7B:CB:58:2D:9A:50:B9:02:8B:EE:D3:F1:0D:69:29:64:51:7E:27:E2:0D:0A:06:CA:BB:BB:10:58:75 Fingerprint (SHA1): E5:A6:CB:C1:2E:EF:FE:09:44:D1:2E:E9:AB:4D:4F:03:77:34:8A:00 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #6775: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #6776: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:29:52 2017 Not After : Tue May 10 12:29:52 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:0f:9e:f9:99:61:0a:b8:37:16:04:d5:85:0e:b3:23: 04:49:7a:4f:31:e4:34:66:0a:11:2c:22:46:d3:6a:f3: 9a:49:f6:14:2e:63:46:1b:66:19:f5:77:6a:6b:01:87: 04:d9:eb:1c:3f:c3:de:c7:49:d0:e2:ef:86:d5:69:5f: 8d:09:7d:8f:a8:0b:1f:9c:b5:e3:5d:1b:be:de:e7:09: bf:1e:1e:d8:07:af:f6:a9:b5:bb:81:e0:7b:ef:88:c6: ee:d0:dd:68:13:72:70:1b:28:bf:6e:b6:4e:74:cc:bc: e5:d9:f4:60:a8:d9:16:e0:e6:0e:eb:b1:5c:91:ab:86: f2:2e:05:77:ec:87:dd:58:ab:38:69:d6:33:11:de:89: be:77:1e:50:e7:26:a9:fc:58:d7:27:97:b3:e1:f8:f9: c0:c7:7d:7c:c8:f9:2f:39:e3:ae:5c:2a:62:55:b5:be: 2d:f2:9e:ea:dd:30:7e:94:2c:42:9a:25:75:42:86:18: 4c:1f:35:78:24:6e:c6:8f:cd:da:01:77:c4:7a:21:ad: 6a:94:e8:94:72:64:61:87:c1:78:4a:de:8f:f1:89:9b: 3a:e9:57:8f:a0:d0:86:c5:0d:fc:fb:13:ff:df:4f:10: 46:b4:94:91:39:6c:fb:d8:b0:e8:e3:60:5e:53:1f:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:97:3a:b4:1a:fa:90:da:f6:46:39:64:a0:0e:a8:ff: d7:8f:d7:2e:b6:11:7c:50:fa:b4:a0:3d:0e:76:32:ba: 8e:e7:c4:be:d3:24:f6:f2:1f:b6:ec:11:01:20:45:fe: 31:18:d3:4a:f3:21:82:50:49:30:b1:5a:ed:31:54:49: 5b:a9:15:86:bd:b7:11:c3:63:ba:12:88:15:e4:b4:0f: 46:73:07:25:0a:3f:dc:0a:0c:9d:b1:8c:ad:57:7c:19: d9:00:bc:13:00:05:d5:e3:58:4f:a9:8a:dd:c0:72:44: e4:58:e7:80:4c:62:f0:83:b1:8c:12:6e:a9:ef:98:74: 0d:19:c3:f3:c7:7f:fb:08:53:9a:b2:f2:04:d0:43:ff: 40:40:02:a6:f1:e7:9d:8a:4b:fa:bf:80:22:12:5c:2f: 3e:1c:aa:bf:a5:4e:14:e4:b3:76:ee:f9:dc:3f:8b:e9: 57:a0:4e:5c:99:3d:2f:24:70:af:5a:e9:20:58:0d:63: 5a:95:a0:e7:80:fc:ec:bc:ab:bc:ec:da:1e:24:17:b7: 74:09:5e:b4:2c:b1:d1:2d:2e:e5:39:91:40:40:5c:ab: 25:90:04:0b:a4:8e:84:21:55:8a:67:3a:4f:e5:bc:76: 31:32:8a:d3:3a:b8:74:11:71:ff:3e:36:92:02:55:05 Fingerprint (SHA-256): 74:AE:63:7B:CB:58:2D:9A:50:B9:02:8B:EE:D3:F1:0D:69:29:64:51:7E:27:E2:0D:0A:06:CA:BB:BB:10:58:75 Fingerprint (SHA1): E5:A6:CB:C1:2E:EF:FE:09:44:D1:2E:E9:AB:4D:4F:03:77:34:8A:00 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #6777: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #6778: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #6779: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122745 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6780: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #6781: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #6782: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6783: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 510122746 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6784: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6785: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #6786: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510122636.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #6787: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0Root-510122621.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #6788: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6789: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #6790: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510122636.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #6791: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 510122747 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6792: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6793: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #6794: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510122636.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #6795: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0Root-510122622.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #6796: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6797: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #6798: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6799: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 510122748 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6800: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6801: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #6802: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510122636.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #6803: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0Root-510122623.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #6804: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6805: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #6806: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510122636.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #6807: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0Root-510122624.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #6808: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6809: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20170510123015Z nextupdate=20180510123015Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed May 10 12:30:15 2017 Next Update: Thu May 10 12:30:15 2018 CRL Extensions: chains.sh: #6810: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510123015Z nextupdate=20180510123015Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 12:30:15 2017 Next Update: Thu May 10 12:30:15 2018 CRL Extensions: chains.sh: #6811: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170510123016Z nextupdate=20180510123016Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed May 10 12:30:16 2017 Next Update: Thu May 10 12:30:16 2018 CRL Extensions: chains.sh: #6812: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20170510123016Z nextupdate=20180510123016Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed May 10 12:30:16 2017 Next Update: Thu May 10 12:30:16 2018 CRL Extensions: chains.sh: #6813: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510123017Z addcert 20 20170510123017Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 12:30:17 2017 Next Update: Thu May 10 12:30:15 2018 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed May 10 12:30:17 2017 CRL Extensions: chains.sh: #6814: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510123018Z addcert 40 20170510123018Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 12:30:18 2017 Next Update: Thu May 10 12:30:15 2018 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed May 10 12:30:17 2017 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Wed May 10 12:30:18 2017 CRL Extensions: chains.sh: #6815: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #6816: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6817: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #6818: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122745 (0x1e67daf9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:30:04 2017 Not After : Tue May 10 12:30:04 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:d2:fd:7f:0b:d9:68:83:ef:86:98:cf:8a:02:e7:d4: 2a:bb:96:a6:5b:47:68:06:76:0c:bb:4b:21:61:70:ee: 10:93:31:c9:c9:61:0f:85:4e:62:20:7e:21:17:4a:1f: f6:1b:06:27:c8:a5:85:15:f3:52:16:45:8d:35:54:a4: a0:e1:85:70:2f:e7:e4:af:7b:a5:03:9d:1f:65:52:07: ad:b7:2e:be:b3:91:40:df:a2:8e:99:7a:13:68:bc:4c: ee:12:13:f6:54:c0:f6:32:71:1d:67:88:3d:93:e9:86: 74:41:e7:37:c7:a2:d5:31:28:33:6e:67:a6:c5:31:94: 93:1b:b0:e4:db:91:85:94:a6:d3:11:5e:a2:ae:72:e2: 4d:cb:f3:38:c2:72:ea:9a:df:ad:45:2c:8f:55:eb:69: 26:fc:13:84:c7:6f:f9:15:06:da:5f:fb:29:3f:56:94: 29:3f:e2:c0:08:d9:d5:8d:1a:31:4b:07:bc:e7:f0:21: 2e:a6:c2:6a:08:99:e2:e9:e1:4a:f4:4c:8f:0a:24:75: 37:30:f9:4f:2a:06:ce:b4:58:18:86:66:a6:64:43:50: 8d:d5:91:c8:a1:30:51:bf:87:9f:d1:0d:23:23:f2:54: 47:c2:89:85:8f:c5:74:c5:4d:15:38:a3:6a:ff:44:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 09:99:96:e1:bf:e1:7a:89:89:da:e4:aa:5c:51:ce:d6: 09:09:c3:81:63:b8:af:a1:e1:ac:6b:67:44:02:d2:21: 27:e9:73:b5:2a:e1:3e:20:d7:a6:f7:75:1b:27:f7:58: e4:77:eb:a0:43:df:c0:15:ed:f2:b5:dd:c8:e9:95:7e: 41:93:fd:b7:81:ef:c8:b9:43:95:c0:65:40:e9:57:46: 69:b6:f7:00:b1:ef:6e:b8:8a:af:fa:db:4a:f0:a4:e0: 78:31:c1:32:5e:c8:cd:5b:90:5c:15:bf:57:5d:3a:4d: 67:65:8f:b4:96:29:80:e5:f3:2b:12:d4:c3:c3:32:be: 11:bc:58:6b:38:bd:96:0f:63:78:9a:63:2c:99:4f:02: 83:52:4c:82:97:02:9b:d2:00:1f:29:c4:6c:1a:71:1a: 77:00:1c:97:56:70:db:2b:0f:18:7d:53:df:ac:95:2a: 31:86:56:83:3f:47:3e:8a:ed:b0:d7:2f:ad:eb:89:3e: 2d:e8:6d:ee:7e:ad:61:74:62:b8:09:0c:41:bf:bd:de: 4c:37:55:67:6c:6e:56:39:df:8c:0d:f2:b9:f8:29:48: 21:8e:0c:6c:e9:3d:f1:04:89:07:c9:f1:23:60:9d:18: 1c:b1:eb:a8:0b:7a:01:81:2a:2f:35:ff:a0:bc:4f:01 Fingerprint (SHA-256): 6F:FD:0B:B8:9F:B2:A1:DF:D7:A6:23:7B:20:A7:18:F8:A0:42:3B:C1:A2:B7:EB:EE:2E:35:2D:37:50:4D:A1:56 Fingerprint (SHA1): EF:2E:7A:1F:62:4B:0B:46:7C:BB:2D:6B:62:D9:CB:BE:5B:5C:44:49 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #6819: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #6820: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122745 (0x1e67daf9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:30:04 2017 Not After : Tue May 10 12:30:04 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:d2:fd:7f:0b:d9:68:83:ef:86:98:cf:8a:02:e7:d4: 2a:bb:96:a6:5b:47:68:06:76:0c:bb:4b:21:61:70:ee: 10:93:31:c9:c9:61:0f:85:4e:62:20:7e:21:17:4a:1f: f6:1b:06:27:c8:a5:85:15:f3:52:16:45:8d:35:54:a4: a0:e1:85:70:2f:e7:e4:af:7b:a5:03:9d:1f:65:52:07: ad:b7:2e:be:b3:91:40:df:a2:8e:99:7a:13:68:bc:4c: ee:12:13:f6:54:c0:f6:32:71:1d:67:88:3d:93:e9:86: 74:41:e7:37:c7:a2:d5:31:28:33:6e:67:a6:c5:31:94: 93:1b:b0:e4:db:91:85:94:a6:d3:11:5e:a2:ae:72:e2: 4d:cb:f3:38:c2:72:ea:9a:df:ad:45:2c:8f:55:eb:69: 26:fc:13:84:c7:6f:f9:15:06:da:5f:fb:29:3f:56:94: 29:3f:e2:c0:08:d9:d5:8d:1a:31:4b:07:bc:e7:f0:21: 2e:a6:c2:6a:08:99:e2:e9:e1:4a:f4:4c:8f:0a:24:75: 37:30:f9:4f:2a:06:ce:b4:58:18:86:66:a6:64:43:50: 8d:d5:91:c8:a1:30:51:bf:87:9f:d1:0d:23:23:f2:54: 47:c2:89:85:8f:c5:74:c5:4d:15:38:a3:6a:ff:44:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 09:99:96:e1:bf:e1:7a:89:89:da:e4:aa:5c:51:ce:d6: 09:09:c3:81:63:b8:af:a1:e1:ac:6b:67:44:02:d2:21: 27:e9:73:b5:2a:e1:3e:20:d7:a6:f7:75:1b:27:f7:58: e4:77:eb:a0:43:df:c0:15:ed:f2:b5:dd:c8:e9:95:7e: 41:93:fd:b7:81:ef:c8:b9:43:95:c0:65:40:e9:57:46: 69:b6:f7:00:b1:ef:6e:b8:8a:af:fa:db:4a:f0:a4:e0: 78:31:c1:32:5e:c8:cd:5b:90:5c:15:bf:57:5d:3a:4d: 67:65:8f:b4:96:29:80:e5:f3:2b:12:d4:c3:c3:32:be: 11:bc:58:6b:38:bd:96:0f:63:78:9a:63:2c:99:4f:02: 83:52:4c:82:97:02:9b:d2:00:1f:29:c4:6c:1a:71:1a: 77:00:1c:97:56:70:db:2b:0f:18:7d:53:df:ac:95:2a: 31:86:56:83:3f:47:3e:8a:ed:b0:d7:2f:ad:eb:89:3e: 2d:e8:6d:ee:7e:ad:61:74:62:b8:09:0c:41:bf:bd:de: 4c:37:55:67:6c:6e:56:39:df:8c:0d:f2:b9:f8:29:48: 21:8e:0c:6c:e9:3d:f1:04:89:07:c9:f1:23:60:9d:18: 1c:b1:eb:a8:0b:7a:01:81:2a:2f:35:ff:a0:bc:4f:01 Fingerprint (SHA-256): 6F:FD:0B:B8:9F:B2:A1:DF:D7:A6:23:7B:20:A7:18:F8:A0:42:3B:C1:A2:B7:EB:EE:2E:35:2D:37:50:4D:A1:56 Fingerprint (SHA1): EF:2E:7A:1F:62:4B:0B:46:7C:BB:2D:6B:62:D9:CB:BE:5B:5C:44:49 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #6821: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #6822: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #6823: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122749 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6824: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #6825: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #6826: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6827: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 510122750 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6828: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6829: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #6830: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6831: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510122751 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6832: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6833: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #6834: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6835: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 510122752 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6836: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6837: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #6838: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122753 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6839: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #6840: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #6841: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6842: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 510122754 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6843: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6844: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #6845: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6846: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 510122755 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6847: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6848: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #6849: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #6850: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #6851: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122749 (0x1e67dafd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:30:20 2017 Not After : Tue May 10 12:30:20 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:2e:7a:5a:d6:f4:f2:f5:51:bc:60:53:b0:63:12:77: e0:25:67:1e:15:aa:62:33:32:9c:de:dd:e5:61:66:d2: 1f:77:29:c2:fc:2f:15:eb:ad:09:c6:0d:82:a1:6f:36: 30:8a:a6:19:c5:c8:a1:15:a3:12:97:bf:86:a5:a1:59: 03:a5:3b:fc:ff:69:91:a2:b4:08:5a:30:9f:b8:19:44: 86:c8:01:07:98:37:a8:1f:de:f4:62:58:be:51:b7:c6: a3:87:eb:ea:dd:49:54:9c:22:89:39:c1:7a:6d:7f:ba: d7:d8:16:e3:1c:b1:eb:31:86:5f:37:83:4c:fc:ec:a3: e7:82:38:85:3c:9b:c5:96:43:0a:ba:4a:27:f6:94:88: 7f:01:03:27:db:48:82:75:8e:36:e1:91:69:3f:d7:b8: 8e:77:ac:17:a9:90:66:90:d1:83:cb:71:31:a3:5d:42: 49:05:a0:60:d7:fa:fe:16:1d:9a:d4:06:12:06:d8:fa: 74:71:6d:da:43:ac:0e:59:24:67:06:e7:fa:3e:99:68: 4b:52:01:92:f9:be:50:d8:c3:0b:92:a9:51:7a:1e:a0: 42:da:85:e2:e6:4a:5f:d6:ab:22:e1:d5:be:12:ff:9f: bf:82:72:6b:5a:ed:11:bb:3d:ee:0b:f3:d4:62:b2:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:10:12:c5:c3:3d:26:96:2d:75:97:b0:1b:c1:28:60: ee:f2:31:40:66:0e:1b:64:76:a1:eb:82:ea:b8:fc:40: 04:15:45:70:ea:8f:a2:d8:a5:13:1e:57:d6:59:fe:50: bc:b5:9c:ae:cb:7c:64:34:40:ab:c8:3a:81:69:91:bc: 8c:00:75:53:86:82:8a:be:cb:89:36:65:a5:64:12:7d: 33:fb:4e:4d:24:ca:31:0e:71:ad:5f:df:46:5d:3c:1b: 7c:e4:51:32:20:e7:79:e4:43:e5:f8:92:d2:da:1b:7d: cb:53:79:e0:65:7a:3a:a6:97:06:76:4b:d4:82:89:29: 9f:ec:70:14:c1:c6:73:3c:06:da:59:e3:1c:07:ea:5c: 77:8a:1f:b2:db:f2:01:b5:cf:0f:81:84:a4:5f:99:36: 6e:ea:02:f0:31:fe:e6:57:70:96:c4:9b:3d:12:a3:d6: 50:e7:5e:a8:60:60:28:be:6a:b0:22:4b:c5:e5:a3:90: 17:07:ea:17:f3:f9:0e:ba:2c:18:c5:14:e7:d1:e2:f7: 44:ff:bf:78:0a:c9:32:7c:23:65:4f:a3:13:f9:eb:8e: ef:60:a6:7b:c4:c0:99:fa:4e:fb:a4:c4:e2:6a:9b:a9: 74:bb:1b:23:51:5e:20:7d:31:4f:4d:d6:9a:03:0d:73 Fingerprint (SHA-256): F9:7C:8E:D3:E7:3C:49:8D:23:60:82:72:FC:C5:91:CC:52:3A:FB:0A:1B:DB:31:1A:4C:37:3C:BC:28:06:14:0D Fingerprint (SHA1): D8:CB:4C:C7:EE:E1:2E:1E:E5:81:DC:F6:AE:88:34:70:F2:2B:82:98 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6852: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122751 (0x1e67daff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:30:22 2017 Not After : Tue May 10 12:30:22 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:17:8f:ce:00:f9:af:a0:8a:97:e4:45:a6:00:af:5c: 47:3f:c9:7f:7f:25:40:39:e1:0b:68:f6:55:3e:f6:ef: d9:69:0a:f3:4b:bd:da:b6:45:50:01:b0:df:3b:a9:2f: 21:23:05:9e:61:c8:08:9b:e5:e7:07:54:e2:f3:64:50: 06:c2:84:47:e6:51:f5:97:eb:e1:8a:91:95:5a:30:81: fb:1b:12:77:5b:ad:aa:8b:e0:df:32:83:f3:7a:3b:51: ba:34:9f:88:b0:b8:86:55:f7:36:b9:c8:d0:a0:3e:f1: e4:c9:3d:c6:53:5d:c7:bb:d8:8b:76:89:d8:ad:ae:de: 48:70:06:ab:c1:2a:31:7c:d7:84:c8:03:87:b4:4e:68: a1:a6:cc:65:06:f2:24:a6:af:4e:88:b7:ee:69:12:6a: 9e:2e:80:e7:e2:ad:ad:cd:ca:85:e5:c0:25:89:de:6d: 39:01:67:4d:1f:9a:ee:25:d0:cd:27:15:e9:dd:99:b2: 4c:ab:0e:29:64:eb:52:cb:63:9c:20:b3:d1:45:8d:24: b4:ba:fa:0c:96:7f:80:5d:63:72:a4:90:2d:6a:14:36: 7d:75:8a:fd:0e:b7:6b:77:cd:06:85:c8:7b:55:33:e7: fb:a2:65:5b:81:a5:47:b3:c5:c7:9b:52:cc:3c:77:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:72:06:1b:87:15:bc:df:7b:be:cb:db:42:09:ab:fb: be:d3:96:8e:c3:40:77:ec:a9:72:4f:06:19:87:84:4b: 37:8b:d3:da:4b:d8:f7:c3:ed:6f:b6:a3:21:b0:3d:23: 62:30:b3:93:9c:ee:8e:b9:f4:69:f5:8d:f6:e1:43:bf: 45:c6:ad:aa:a5:16:57:3e:61:b6:e0:7f:54:f1:cd:95: 37:b1:a9:0f:24:09:e5:38:cc:3e:f8:48:db:3d:d0:65: 90:ef:69:a5:d8:a4:b9:47:7d:26:c8:5f:d0:75:0f:b7: bc:87:20:48:c6:5f:90:b3:43:38:1e:1b:10:b9:26:c0: 13:c4:ca:7c:a5:c3:07:db:05:6f:7c:b6:54:d1:bd:4f: 19:c2:fe:04:e7:0b:1e:d6:ce:d7:b6:a2:9e:dc:fb:67: a9:60:e9:9b:3b:ef:65:01:f0:5e:b2:46:a5:51:02:ba: 5b:c5:44:43:c1:35:57:03:18:eb:30:88:7c:5c:a7:ba: 99:97:67:b2:e9:9b:11:1e:19:af:0f:8e:57:df:1d:e2: b2:1f:64:f9:39:ca:8f:f4:34:fd:61:31:39:1b:65:70: e4:59:1e:ab:e1:51:bc:9c:db:75:9c:1d:5c:25:88:61: 8e:0d:f1:77:76:cf:e3:4d:59:65:c5:76:37:d0:73:77 Fingerprint (SHA-256): 55:84:FC:08:B6:88:67:63:F8:A4:A4:8F:D0:11:CF:BF:5A:70:7A:70:EF:A5:DE:42:40:31:F1:6F:94:DF:DD:69 Fingerprint (SHA1): 4C:B2:A4:E4:14:ED:8A:5D:6F:46:65:6A:22:8D:D9:28:34:E1:C7:C7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #6853: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122749 (0x1e67dafd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:30:20 2017 Not After : Tue May 10 12:30:20 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:2e:7a:5a:d6:f4:f2:f5:51:bc:60:53:b0:63:12:77: e0:25:67:1e:15:aa:62:33:32:9c:de:dd:e5:61:66:d2: 1f:77:29:c2:fc:2f:15:eb:ad:09:c6:0d:82:a1:6f:36: 30:8a:a6:19:c5:c8:a1:15:a3:12:97:bf:86:a5:a1:59: 03:a5:3b:fc:ff:69:91:a2:b4:08:5a:30:9f:b8:19:44: 86:c8:01:07:98:37:a8:1f:de:f4:62:58:be:51:b7:c6: a3:87:eb:ea:dd:49:54:9c:22:89:39:c1:7a:6d:7f:ba: d7:d8:16:e3:1c:b1:eb:31:86:5f:37:83:4c:fc:ec:a3: e7:82:38:85:3c:9b:c5:96:43:0a:ba:4a:27:f6:94:88: 7f:01:03:27:db:48:82:75:8e:36:e1:91:69:3f:d7:b8: 8e:77:ac:17:a9:90:66:90:d1:83:cb:71:31:a3:5d:42: 49:05:a0:60:d7:fa:fe:16:1d:9a:d4:06:12:06:d8:fa: 74:71:6d:da:43:ac:0e:59:24:67:06:e7:fa:3e:99:68: 4b:52:01:92:f9:be:50:d8:c3:0b:92:a9:51:7a:1e:a0: 42:da:85:e2:e6:4a:5f:d6:ab:22:e1:d5:be:12:ff:9f: bf:82:72:6b:5a:ed:11:bb:3d:ee:0b:f3:d4:62:b2:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:10:12:c5:c3:3d:26:96:2d:75:97:b0:1b:c1:28:60: ee:f2:31:40:66:0e:1b:64:76:a1:eb:82:ea:b8:fc:40: 04:15:45:70:ea:8f:a2:d8:a5:13:1e:57:d6:59:fe:50: bc:b5:9c:ae:cb:7c:64:34:40:ab:c8:3a:81:69:91:bc: 8c:00:75:53:86:82:8a:be:cb:89:36:65:a5:64:12:7d: 33:fb:4e:4d:24:ca:31:0e:71:ad:5f:df:46:5d:3c:1b: 7c:e4:51:32:20:e7:79:e4:43:e5:f8:92:d2:da:1b:7d: cb:53:79:e0:65:7a:3a:a6:97:06:76:4b:d4:82:89:29: 9f:ec:70:14:c1:c6:73:3c:06:da:59:e3:1c:07:ea:5c: 77:8a:1f:b2:db:f2:01:b5:cf:0f:81:84:a4:5f:99:36: 6e:ea:02:f0:31:fe:e6:57:70:96:c4:9b:3d:12:a3:d6: 50:e7:5e:a8:60:60:28:be:6a:b0:22:4b:c5:e5:a3:90: 17:07:ea:17:f3:f9:0e:ba:2c:18:c5:14:e7:d1:e2:f7: 44:ff:bf:78:0a:c9:32:7c:23:65:4f:a3:13:f9:eb:8e: ef:60:a6:7b:c4:c0:99:fa:4e:fb:a4:c4:e2:6a:9b:a9: 74:bb:1b:23:51:5e:20:7d:31:4f:4d:d6:9a:03:0d:73 Fingerprint (SHA-256): F9:7C:8E:D3:E7:3C:49:8D:23:60:82:72:FC:C5:91:CC:52:3A:FB:0A:1B:DB:31:1A:4C:37:3C:BC:28:06:14:0D Fingerprint (SHA1): D8:CB:4C:C7:EE:E1:2E:1E:E5:81:DC:F6:AE:88:34:70:F2:2B:82:98 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6854: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #6855: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122749 (0x1e67dafd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:30:20 2017 Not After : Tue May 10 12:30:20 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:2e:7a:5a:d6:f4:f2:f5:51:bc:60:53:b0:63:12:77: e0:25:67:1e:15:aa:62:33:32:9c:de:dd:e5:61:66:d2: 1f:77:29:c2:fc:2f:15:eb:ad:09:c6:0d:82:a1:6f:36: 30:8a:a6:19:c5:c8:a1:15:a3:12:97:bf:86:a5:a1:59: 03:a5:3b:fc:ff:69:91:a2:b4:08:5a:30:9f:b8:19:44: 86:c8:01:07:98:37:a8:1f:de:f4:62:58:be:51:b7:c6: a3:87:eb:ea:dd:49:54:9c:22:89:39:c1:7a:6d:7f:ba: d7:d8:16:e3:1c:b1:eb:31:86:5f:37:83:4c:fc:ec:a3: e7:82:38:85:3c:9b:c5:96:43:0a:ba:4a:27:f6:94:88: 7f:01:03:27:db:48:82:75:8e:36:e1:91:69:3f:d7:b8: 8e:77:ac:17:a9:90:66:90:d1:83:cb:71:31:a3:5d:42: 49:05:a0:60:d7:fa:fe:16:1d:9a:d4:06:12:06:d8:fa: 74:71:6d:da:43:ac:0e:59:24:67:06:e7:fa:3e:99:68: 4b:52:01:92:f9:be:50:d8:c3:0b:92:a9:51:7a:1e:a0: 42:da:85:e2:e6:4a:5f:d6:ab:22:e1:d5:be:12:ff:9f: bf:82:72:6b:5a:ed:11:bb:3d:ee:0b:f3:d4:62:b2:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:10:12:c5:c3:3d:26:96:2d:75:97:b0:1b:c1:28:60: ee:f2:31:40:66:0e:1b:64:76:a1:eb:82:ea:b8:fc:40: 04:15:45:70:ea:8f:a2:d8:a5:13:1e:57:d6:59:fe:50: bc:b5:9c:ae:cb:7c:64:34:40:ab:c8:3a:81:69:91:bc: 8c:00:75:53:86:82:8a:be:cb:89:36:65:a5:64:12:7d: 33:fb:4e:4d:24:ca:31:0e:71:ad:5f:df:46:5d:3c:1b: 7c:e4:51:32:20:e7:79:e4:43:e5:f8:92:d2:da:1b:7d: cb:53:79:e0:65:7a:3a:a6:97:06:76:4b:d4:82:89:29: 9f:ec:70:14:c1:c6:73:3c:06:da:59:e3:1c:07:ea:5c: 77:8a:1f:b2:db:f2:01:b5:cf:0f:81:84:a4:5f:99:36: 6e:ea:02:f0:31:fe:e6:57:70:96:c4:9b:3d:12:a3:d6: 50:e7:5e:a8:60:60:28:be:6a:b0:22:4b:c5:e5:a3:90: 17:07:ea:17:f3:f9:0e:ba:2c:18:c5:14:e7:d1:e2:f7: 44:ff:bf:78:0a:c9:32:7c:23:65:4f:a3:13:f9:eb:8e: ef:60:a6:7b:c4:c0:99:fa:4e:fb:a4:c4:e2:6a:9b:a9: 74:bb:1b:23:51:5e:20:7d:31:4f:4d:d6:9a:03:0d:73 Fingerprint (SHA-256): F9:7C:8E:D3:E7:3C:49:8D:23:60:82:72:FC:C5:91:CC:52:3A:FB:0A:1B:DB:31:1A:4C:37:3C:BC:28:06:14:0D Fingerprint (SHA1): D8:CB:4C:C7:EE:E1:2E:1E:E5:81:DC:F6:AE:88:34:70:F2:2B:82:98 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6856: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122751 (0x1e67daff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:30:22 2017 Not After : Tue May 10 12:30:22 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:17:8f:ce:00:f9:af:a0:8a:97:e4:45:a6:00:af:5c: 47:3f:c9:7f:7f:25:40:39:e1:0b:68:f6:55:3e:f6:ef: d9:69:0a:f3:4b:bd:da:b6:45:50:01:b0:df:3b:a9:2f: 21:23:05:9e:61:c8:08:9b:e5:e7:07:54:e2:f3:64:50: 06:c2:84:47:e6:51:f5:97:eb:e1:8a:91:95:5a:30:81: fb:1b:12:77:5b:ad:aa:8b:e0:df:32:83:f3:7a:3b:51: ba:34:9f:88:b0:b8:86:55:f7:36:b9:c8:d0:a0:3e:f1: e4:c9:3d:c6:53:5d:c7:bb:d8:8b:76:89:d8:ad:ae:de: 48:70:06:ab:c1:2a:31:7c:d7:84:c8:03:87:b4:4e:68: a1:a6:cc:65:06:f2:24:a6:af:4e:88:b7:ee:69:12:6a: 9e:2e:80:e7:e2:ad:ad:cd:ca:85:e5:c0:25:89:de:6d: 39:01:67:4d:1f:9a:ee:25:d0:cd:27:15:e9:dd:99:b2: 4c:ab:0e:29:64:eb:52:cb:63:9c:20:b3:d1:45:8d:24: b4:ba:fa:0c:96:7f:80:5d:63:72:a4:90:2d:6a:14:36: 7d:75:8a:fd:0e:b7:6b:77:cd:06:85:c8:7b:55:33:e7: fb:a2:65:5b:81:a5:47:b3:c5:c7:9b:52:cc:3c:77:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:72:06:1b:87:15:bc:df:7b:be:cb:db:42:09:ab:fb: be:d3:96:8e:c3:40:77:ec:a9:72:4f:06:19:87:84:4b: 37:8b:d3:da:4b:d8:f7:c3:ed:6f:b6:a3:21:b0:3d:23: 62:30:b3:93:9c:ee:8e:b9:f4:69:f5:8d:f6:e1:43:bf: 45:c6:ad:aa:a5:16:57:3e:61:b6:e0:7f:54:f1:cd:95: 37:b1:a9:0f:24:09:e5:38:cc:3e:f8:48:db:3d:d0:65: 90:ef:69:a5:d8:a4:b9:47:7d:26:c8:5f:d0:75:0f:b7: bc:87:20:48:c6:5f:90:b3:43:38:1e:1b:10:b9:26:c0: 13:c4:ca:7c:a5:c3:07:db:05:6f:7c:b6:54:d1:bd:4f: 19:c2:fe:04:e7:0b:1e:d6:ce:d7:b6:a2:9e:dc:fb:67: a9:60:e9:9b:3b:ef:65:01:f0:5e:b2:46:a5:51:02:ba: 5b:c5:44:43:c1:35:57:03:18:eb:30:88:7c:5c:a7:ba: 99:97:67:b2:e9:9b:11:1e:19:af:0f:8e:57:df:1d:e2: b2:1f:64:f9:39:ca:8f:f4:34:fd:61:31:39:1b:65:70: e4:59:1e:ab:e1:51:bc:9c:db:75:9c:1d:5c:25:88:61: 8e:0d:f1:77:76:cf:e3:4d:59:65:c5:76:37:d0:73:77 Fingerprint (SHA-256): 55:84:FC:08:B6:88:67:63:F8:A4:A4:8F:D0:11:CF:BF:5A:70:7A:70:EF:A5:DE:42:40:31:F1:6F:94:DF:DD:69 Fingerprint (SHA1): 4C:B2:A4:E4:14:ED:8A:5D:6F:46:65:6A:22:8D:D9:28:34:E1:C7:C7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #6857: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #6858: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #6859: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #6860: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122749 (0x1e67dafd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:30:20 2017 Not After : Tue May 10 12:30:20 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:2e:7a:5a:d6:f4:f2:f5:51:bc:60:53:b0:63:12:77: e0:25:67:1e:15:aa:62:33:32:9c:de:dd:e5:61:66:d2: 1f:77:29:c2:fc:2f:15:eb:ad:09:c6:0d:82:a1:6f:36: 30:8a:a6:19:c5:c8:a1:15:a3:12:97:bf:86:a5:a1:59: 03:a5:3b:fc:ff:69:91:a2:b4:08:5a:30:9f:b8:19:44: 86:c8:01:07:98:37:a8:1f:de:f4:62:58:be:51:b7:c6: a3:87:eb:ea:dd:49:54:9c:22:89:39:c1:7a:6d:7f:ba: d7:d8:16:e3:1c:b1:eb:31:86:5f:37:83:4c:fc:ec:a3: e7:82:38:85:3c:9b:c5:96:43:0a:ba:4a:27:f6:94:88: 7f:01:03:27:db:48:82:75:8e:36:e1:91:69:3f:d7:b8: 8e:77:ac:17:a9:90:66:90:d1:83:cb:71:31:a3:5d:42: 49:05:a0:60:d7:fa:fe:16:1d:9a:d4:06:12:06:d8:fa: 74:71:6d:da:43:ac:0e:59:24:67:06:e7:fa:3e:99:68: 4b:52:01:92:f9:be:50:d8:c3:0b:92:a9:51:7a:1e:a0: 42:da:85:e2:e6:4a:5f:d6:ab:22:e1:d5:be:12:ff:9f: bf:82:72:6b:5a:ed:11:bb:3d:ee:0b:f3:d4:62:b2:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:10:12:c5:c3:3d:26:96:2d:75:97:b0:1b:c1:28:60: ee:f2:31:40:66:0e:1b:64:76:a1:eb:82:ea:b8:fc:40: 04:15:45:70:ea:8f:a2:d8:a5:13:1e:57:d6:59:fe:50: bc:b5:9c:ae:cb:7c:64:34:40:ab:c8:3a:81:69:91:bc: 8c:00:75:53:86:82:8a:be:cb:89:36:65:a5:64:12:7d: 33:fb:4e:4d:24:ca:31:0e:71:ad:5f:df:46:5d:3c:1b: 7c:e4:51:32:20:e7:79:e4:43:e5:f8:92:d2:da:1b:7d: cb:53:79:e0:65:7a:3a:a6:97:06:76:4b:d4:82:89:29: 9f:ec:70:14:c1:c6:73:3c:06:da:59:e3:1c:07:ea:5c: 77:8a:1f:b2:db:f2:01:b5:cf:0f:81:84:a4:5f:99:36: 6e:ea:02:f0:31:fe:e6:57:70:96:c4:9b:3d:12:a3:d6: 50:e7:5e:a8:60:60:28:be:6a:b0:22:4b:c5:e5:a3:90: 17:07:ea:17:f3:f9:0e:ba:2c:18:c5:14:e7:d1:e2:f7: 44:ff:bf:78:0a:c9:32:7c:23:65:4f:a3:13:f9:eb:8e: ef:60:a6:7b:c4:c0:99:fa:4e:fb:a4:c4:e2:6a:9b:a9: 74:bb:1b:23:51:5e:20:7d:31:4f:4d:d6:9a:03:0d:73 Fingerprint (SHA-256): F9:7C:8E:D3:E7:3C:49:8D:23:60:82:72:FC:C5:91:CC:52:3A:FB:0A:1B:DB:31:1A:4C:37:3C:BC:28:06:14:0D Fingerprint (SHA1): D8:CB:4C:C7:EE:E1:2E:1E:E5:81:DC:F6:AE:88:34:70:F2:2B:82:98 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6861: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122753 (0x1e67db01) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed May 10 12:30:24 2017 Not After : Tue May 10 12:30:24 2067 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:ce:1e:c7:4f:3b:1a:be:2e:e2:e3:b6:01:78:ea:1e: b9:13:96:29:0b:2d:f7:db:90:14:37:22:a5:82:64:ae: 4e:3f:43:9f:e2:65:47:49:e7:e1:94:f5:ab:e1:3e:14: 01:c7:77:fc:5a:70:44:00:9d:05:10:a6:aa:6a:22:fc: 2b:92:6c:43:77:86:fc:1d:9a:ae:29:ff:b0:e7:70:56: 4c:d3:9f:21:8d:38:b5:14:d9:1f:2e:ed:47:af:c8:9c: a7:b5:ad:69:22:00:37:ae:7c:0f:71:08:ef:1c:c2:32: d9:65:4c:2e:0d:89:77:f4:fe:6c:77:70:60:e8:86:bc: e2:05:ed:b6:87:a7:83:43:3c:f1:2d:4b:3b:68:2d:d7: 01:2c:81:d2:95:e9:11:68:71:b2:ab:02:76:04:e9:fb: 66:29:1c:49:8f:ab:50:03:2e:b6:5a:1a:c7:13:da:f0: ff:bc:28:17:ce:39:ed:a3:a3:35:12:58:cb:c9:74:7e: 07:4e:7a:55:08:60:8e:25:ec:07:2c:e1:99:8a:1e:98: b5:d0:e2:b9:d4:b4:fd:e8:d1:b1:f5:16:a9:6b:76:24: 41:c8:d2:3e:f8:c5:25:50:c1:da:dc:6b:e7:d6:2d:9e: cc:ed:f1:8c:4f:e7:70:3d:7a:77:7b:ce:c9:48:fc:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:87:3f:c3:52:26:2c:f9:dc:1a:4f:6c:6d:92:63:c4: eb:c5:d1:87:56:0e:5d:59:d8:fd:f8:99:f9:db:86:19: 47:44:d9:a7:71:f4:03:09:69:41:af:48:08:0c:3f:0e: 06:f6:1f:c5:66:29:bc:d6:16:ea:47:19:96:db:77:6b: ed:74:90:5c:d3:14:a6:3d:03:37:a0:b5:21:4c:57:a3: 30:91:d9:64:4d:67:f3:38:a7:67:78:de:e3:59:ad:b3: 75:b2:5f:a0:81:b2:8c:a0:94:4b:59:c8:dd:cc:4e:fc: 49:36:ee:d9:42:97:e1:df:07:95:87:a6:01:e4:ef:9a: 91:17:27:7f:47:51:02:ea:03:39:96:e1:31:6f:6f:52: 28:58:76:fb:a1:b2:05:a6:dc:88:00:4c:6c:07:19:53: 14:66:e7:5a:e7:d6:a5:45:a2:4d:21:0a:0f:87:62:46: 7c:4f:a5:3f:92:6b:e2:74:f2:ca:c3:e2:eb:5c:0b:7c: dd:32:af:fa:f7:38:72:82:68:c9:ec:3f:0b:02:bc:bb: aa:a9:fb:b2:40:e4:44:f5:54:9e:3a:5a:35:4d:65:07: b8:54:50:42:1d:28:1f:67:d7:6a:c5:92:01:20:d0:bc: b2:97:1c:d4:f9:f1:04:72:36:5d:1f:04:fa:e2:2e:b6 Fingerprint (SHA-256): 19:33:EC:78:67:E7:34:73:A8:1D:C4:5D:BE:1E:07:70:43:78:2B:11:B0:F7:1D:60:CF:95:9A:A3:85:A9:26:D0 Fingerprint (SHA1): 02:7A:C6:6A:46:52:9E:2A:F5:8E:48:E9:9E:25:86:31:AD:A0:D2:8E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #6862: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122749 (0x1e67dafd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:30:20 2017 Not After : Tue May 10 12:30:20 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:2e:7a:5a:d6:f4:f2:f5:51:bc:60:53:b0:63:12:77: e0:25:67:1e:15:aa:62:33:32:9c:de:dd:e5:61:66:d2: 1f:77:29:c2:fc:2f:15:eb:ad:09:c6:0d:82:a1:6f:36: 30:8a:a6:19:c5:c8:a1:15:a3:12:97:bf:86:a5:a1:59: 03:a5:3b:fc:ff:69:91:a2:b4:08:5a:30:9f:b8:19:44: 86:c8:01:07:98:37:a8:1f:de:f4:62:58:be:51:b7:c6: a3:87:eb:ea:dd:49:54:9c:22:89:39:c1:7a:6d:7f:ba: d7:d8:16:e3:1c:b1:eb:31:86:5f:37:83:4c:fc:ec:a3: e7:82:38:85:3c:9b:c5:96:43:0a:ba:4a:27:f6:94:88: 7f:01:03:27:db:48:82:75:8e:36:e1:91:69:3f:d7:b8: 8e:77:ac:17:a9:90:66:90:d1:83:cb:71:31:a3:5d:42: 49:05:a0:60:d7:fa:fe:16:1d:9a:d4:06:12:06:d8:fa: 74:71:6d:da:43:ac:0e:59:24:67:06:e7:fa:3e:99:68: 4b:52:01:92:f9:be:50:d8:c3:0b:92:a9:51:7a:1e:a0: 42:da:85:e2:e6:4a:5f:d6:ab:22:e1:d5:be:12:ff:9f: bf:82:72:6b:5a:ed:11:bb:3d:ee:0b:f3:d4:62:b2:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:10:12:c5:c3:3d:26:96:2d:75:97:b0:1b:c1:28:60: ee:f2:31:40:66:0e:1b:64:76:a1:eb:82:ea:b8:fc:40: 04:15:45:70:ea:8f:a2:d8:a5:13:1e:57:d6:59:fe:50: bc:b5:9c:ae:cb:7c:64:34:40:ab:c8:3a:81:69:91:bc: 8c:00:75:53:86:82:8a:be:cb:89:36:65:a5:64:12:7d: 33:fb:4e:4d:24:ca:31:0e:71:ad:5f:df:46:5d:3c:1b: 7c:e4:51:32:20:e7:79:e4:43:e5:f8:92:d2:da:1b:7d: cb:53:79:e0:65:7a:3a:a6:97:06:76:4b:d4:82:89:29: 9f:ec:70:14:c1:c6:73:3c:06:da:59:e3:1c:07:ea:5c: 77:8a:1f:b2:db:f2:01:b5:cf:0f:81:84:a4:5f:99:36: 6e:ea:02:f0:31:fe:e6:57:70:96:c4:9b:3d:12:a3:d6: 50:e7:5e:a8:60:60:28:be:6a:b0:22:4b:c5:e5:a3:90: 17:07:ea:17:f3:f9:0e:ba:2c:18:c5:14:e7:d1:e2:f7: 44:ff:bf:78:0a:c9:32:7c:23:65:4f:a3:13:f9:eb:8e: ef:60:a6:7b:c4:c0:99:fa:4e:fb:a4:c4:e2:6a:9b:a9: 74:bb:1b:23:51:5e:20:7d:31:4f:4d:d6:9a:03:0d:73 Fingerprint (SHA-256): F9:7C:8E:D3:E7:3C:49:8D:23:60:82:72:FC:C5:91:CC:52:3A:FB:0A:1B:DB:31:1A:4C:37:3C:BC:28:06:14:0D Fingerprint (SHA1): D8:CB:4C:C7:EE:E1:2E:1E:E5:81:DC:F6:AE:88:34:70:F2:2B:82:98 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #6863: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #6864: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #6865: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #6866: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #6867: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #6868: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122754 (0x1e67db02) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed May 10 12:30:26 2017 Not After : Tue May 10 12:30:26 2022 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:e0:11:2c:c1:a3:b1:e1:a9:19:4d:93:1e:e9:e3:b7: cc:6e:4a:bf:d5:c4:18:78:3c:15:d9:23:97:85:7f:33: db:25:c9:af:ac:9b:5e:44:a6:27:88:22:47:0e:d6:18: d8:43:59:9c:37:2b:ce:74:af:90:bb:2d:e6:26:6b:77: a8:d9:e7:34:a9:c0:fe:43:2f:d4:25:96:30:13:80:29: 8e:b7:05:d9:f0:8f:21:50:76:01:70:7f:9b:14:65:49: 1e:13:ee:f7:7c:a6:a9:13:d3:62:40:9d:2e:b9:af:25: a4:c2:c8:13:7f:81:fe:92:c7:8f:e9:cb:44:f8:21:89: d6:94:06:94:02:0f:e7:0b:cd:d4:df:3e:47:38:6e:7c: 76:25:81:e5:4d:f6:28:ec:32:12:0a:a5:85:38:df:2a: 72:73:b9:1a:ad:db:89:58:d8:cf:9b:96:13:19:44:7d: c0:1e:2e:31:d3:24:d7:83:3f:ca:5d:ff:49:f9:eb:a1: b1:f8:a1:2e:98:83:4c:ad:1c:e6:0b:8a:ea:c7:6c:88: 47:c4:bb:ff:a6:ac:d1:50:54:ae:c8:b2:95:fe:7b:9c: 98:f8:67:d3:ca:57:fc:31:ba:b3:a2:54:9f:26:50:3a: f8:e6:1f:84:be:58:95:7d:cb:f6:68:d8:d2:1a:ef:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b9:ab:dc:55:71:22:ba:b6:99:d6:c4:67:db:ed:90:72: 98:86:2b:58:58:ac:93:54:7e:1d:e4:be:bc:ea:27:9c: 8d:ec:9e:97:7b:44:e2:2d:95:ad:80:ac:b4:3f:2d:6a: d1:99:a2:cc:00:02:06:36:ee:8c:b5:be:88:6a:18:ae: 81:7d:52:e4:01:55:19:d2:46:50:58:23:b5:e0:af:0b: 45:45:8f:2a:e7:44:ac:94:4a:4a:7a:a0:03:cd:e6:3f: 35:d4:cb:98:16:37:6d:e6:22:bd:77:39:1c:dd:da:cc: a6:fc:fc:a1:92:f6:35:6d:e0:cf:59:07:38:34:d6:43: c6:69:e7:61:94:b6:ba:a0:c7:a1:53:83:d9:1a:e5:64: af:6d:c8:fb:78:a5:df:a7:5b:93:6f:8b:b4:a4:eb:f8: ad:d1:28:80:92:7c:7c:90:4b:7c:c2:40:af:fb:ba:1f: 0b:70:b2:42:91:c2:bf:65:fe:ba:b6:af:c2:d5:98:43: 4d:4f:60:33:43:bb:31:d9:5c:42:8c:5c:53:37:f7:b9: 95:79:5e:ac:e3:64:6b:bc:71:a3:79:73:cd:20:e9:57: 7f:14:23:4c:d5:5c:27:0b:6a:6a:76:be:b9:a7:91:12: 31:ee:da:17:0b:03:f3:74:91:a1:ee:17:4e:b9:b2:5e Fingerprint (SHA-256): 94:5C:77:54:73:1A:B1:1B:3A:89:5A:22:D9:A4:CD:6A:5C:B0:5B:5E:FC:A5:A1:B2:76:31:26:9C:9C:62:BB:C5 Fingerprint (SHA1): AD:EA:A3:8C:3F:0B:79:01:64:A6:B1:73:82:D8:F6:FB:C4:06:39:44 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #6869: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #6870: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #6871: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #6872: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #6873: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #6874: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #6875: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #6876: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #6877: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #6878: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #6879: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #6880: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #6881: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #6882: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #6883: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #6884: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #6885: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #6886: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #6887: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #6888: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #6889: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #6890: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #6891: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #6892: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 19511 at Wed May 10 12:30:33 UTC 2017 kill -USR1 19511 httpserv: normal termination httpserv -b -p 9218 2>/dev/null; httpserv with PID 19511 killed at Wed May 10 12:30:33 UTC 2017 httpserv starting at Wed May 10 12:30:33 UTC 2017 httpserv -D -p 9218 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/aiahttp/http_pid.1556 & trying to connect to httpserv at Wed May 10 12:30:33 UTC 2017 tstclnt -p 9218 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9218 (address=::1) tstclnt: exiting with return code 0 kill -0 2526 >/dev/null 2>/dev/null httpserv with PID 2526 found at Wed May 10 12:30:33 UTC 2017 httpserv with PID 2526 started at Wed May 10 12:30:33 UTC 2017 chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #6893: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122756 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6894: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #6895: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #6896: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122757 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6897: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #6898: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #6899: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6900: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 510122758 -7 Bridge@Army < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6901: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6902: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 510122759 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6903: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6904: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #6905: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #6906: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #6907: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 510122760 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6908: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6909: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #6910: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #6911: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #6912: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122757 (0x1e67db05) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:30:36 2017 Not After : Tue May 10 12:30:36 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f8:a0:89:6f:d7:bf:8b:1a:e3:8b:e5:c0:8f:79:ed: 03:db:53:a5:a3:cc:30:31:ba:66:7f:44:4d:78:65:60: 95:0b:90:23:51:18:81:09:82:80:4b:30:68:84:bc:df: d5:d6:59:20:bd:57:8a:1a:0b:99:f4:65:5d:4a:96:ad: 20:d8:ed:15:ec:85:60:a0:19:10:bf:54:b1:4f:7a:6f: 31:3a:bd:3d:3a:7c:95:6a:fe:20:a9:09:35:f8:f6:26: c2:cc:db:21:c3:0d:81:c8:5c:ba:c1:ea:be:83:93:29: 90:5e:fd:65:8f:e1:8e:e4:62:a8:f8:07:82:bb:db:64: 27:e1:69:13:82:d5:b6:0a:8d:b5:93:35:c8:3f:b7:73: 46:8f:76:bc:be:c4:48:8f:82:c9:5f:03:d9:da:31:ed: e8:a4:bf:7e:12:44:bb:76:03:f6:f8:74:2b:19:56:f3: c9:88:91:40:2b:93:f6:4a:e2:d0:9d:31:7c:a3:0a:c3: 4d:4d:ae:70:73:5b:26:3e:41:b4:5d:62:f7:f7:2d:29: 5b:35:1f:f2:75:af:e0:f5:51:bb:0e:5b:74:b2:7f:ae: e0:26:a6:4a:72:c9:77:65:b7:6d:3d:fe:1d:d1:83:3f: 12:a0:0c:72:b9:8e:3b:5e:e5:5f:ea:68:01:fd:1a:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:04:96:e2:9a:8d:6c:a9:b0:b2:7d:c4:57:be:6e:41: f0:ab:f6:16:2c:d3:3e:c2:49:81:a2:de:32:da:c9:ee: 5e:2c:bf:ed:d1:34:71:40:ab:54:5f:80:36:74:bc:bc: 18:5a:ae:8d:f1:be:50:36:89:35:e8:89:ab:3e:9a:45: be:4c:64:55:10:19:a5:fd:c3:c9:e8:1e:8a:88:ec:51: ac:08:eb:26:ed:b6:51:fd:4d:a4:12:97:4f:e1:9b:02: 49:a4:16:c5:56:2e:ec:98:38:80:0b:60:90:fc:3d:b2: 87:71:31:5c:2f:4e:1d:69:c9:1a:6b:48:a0:83:63:f1: 3f:60:91:d1:8b:58:9c:b7:fa:9c:c8:75:3a:a7:5c:0b: 83:d7:87:84:27:83:db:b8:27:40:77:32:38:0c:2c:a0: 26:a9:92:16:70:05:49:10:2d:ca:85:9b:73:be:c4:e1: c0:98:36:ef:f8:88:7a:2f:de:e9:0c:d9:0d:4e:b0:ee: a4:5b:89:e9:a7:4b:f4:a6:2a:a6:94:76:e0:e7:d2:30: b0:9f:99:7c:aa:81:81:75:ed:f0:14:ff:ae:01:6b:0b: a5:20:98:dd:3c:7e:e9:2f:78:9b:f3:36:68:d5:5c:ba: e2:fb:40:1e:65:41:bf:bd:14:8a:4d:37:59:c1:c6:a0 Fingerprint (SHA-256): 21:15:0E:D3:8F:2C:35:7C:56:AF:56:6B:FC:5D:07:6D:45:FF:13:CB:10:F0:3C:18:DA:A0:5D:FF:94:F6:A1:E6 Fingerprint (SHA1): 18:BB:6A:6D:E9:05:C6:84:2F:CF:27:B6:AE:7D:36:99:72:1A:48:59 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #6913: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122756 (0x1e67db04) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 12:30:35 2017 Not After : Tue May 10 12:30:35 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 96:d9:8d:a4:f0:01:ca:28:a3:4d:74:8b:31:36:45:77: 99:cd:a2:e1:8d:23:91:85:36:b3:36:d0:0c:bb:7d:d3: 2e:39:a4:f2:9f:7f:ae:1b:90:40:74:fc:50:05:62:2f: 0b:92:5d:f9:d1:4d:cc:c7:ce:85:92:0b:76:53:ff:74: ea:ed:f6:30:92:0b:2b:27:9d:a6:b1:e6:36:5a:58:79: 7e:e0:8f:8a:c9:c4:2b:31:2b:d5:40:d3:57:72:12:92: 6c:1a:94:41:5f:5e:df:fe:0c:a2:af:b1:d8:ec:ab:1c: ab:6d:7d:f6:40:4d:60:ce:3f:37:90:2f:ab:cc:ae:cc: fb:9b:91:fd:0f:0b:cd:20:f9:c0:c1:7f:a5:39:40:6f: fa:91:5f:bf:dc:d6:33:83:59:5c:99:83:1f:96:d7:66: 81:66:5c:a3:1a:a7:11:fb:7c:ff:59:45:43:b9:26:e2: a4:58:9b:c0:f2:d1:34:8b:e7:cc:cd:65:cc:8e:a1:0b: c6:38:c3:e5:05:74:94:2e:59:6a:83:4f:7c:3a:e8:76: b0:84:6a:3c:8b:b1:a2:b4:9e:63:aa:8f:1c:cc:37:5c: c7:35:4b:7f:ee:2d:5e:29:2c:45:f5:9f:57:4b:cb:95: 56:f4:2a:86:57:d0:a3:8e:9e:1c:41:1a:79:fe:9c:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:6a:17:4a:0b:2c:be:96:71:cb:48:d8:af:c1:bc:75: 50:1c:d5:1d:5c:8c:3b:5b:0b:73:a3:21:fc:84:d5:ac: 00:0e:42:a5:06:31:c9:09:2f:50:df:82:91:11:c4:cc: f6:16:2a:e1:94:1e:59:b2:3a:13:de:62:45:ae:a3:79: 86:f1:a2:9c:ae:5d:a2:f9:7b:9e:fc:1a:e1:9f:55:8c: 66:32:68:dd:8d:c1:f1:85:c9:16:29:0a:94:9d:85:ff: fc:99:7c:99:68:70:b5:df:1c:6b:90:8d:11:5f:3e:ee: 8f:19:96:1f:2c:fa:ea:b5:97:51:ca:8e:9f:df:8f:18: 30:12:95:c7:af:cc:39:35:aa:1f:21:da:94:02:08:c4: 22:1e:c2:26:b1:c8:f2:df:6d:bf:63:e0:70:18:56:07: f1:5f:48:bb:72:e5:a8:e7:71:84:76:4f:f2:da:68:d6: 62:93:88:da:a0:2d:d5:ab:ae:55:cf:45:79:85:93:0e: fc:a8:88:ed:9c:de:1d:f6:b3:17:d2:ad:58:59:a8:c8: a3:6b:fa:de:2e:4a:50:34:8d:97:c8:db:8d:d1:73:cb: 49:41:9b:74:d9:5a:42:2c:9d:40:2b:f4:b4:7f:f1:57: 91:16:c4:9a:46:d0:82:a0:4a:9f:8e:54:a4:04:c1:74 Fingerprint (SHA-256): 1A:8C:9E:C1:6B:C2:99:35:BD:A3:94:35:6C:16:EF:50:02:B8:23:9A:E1:A9:44:F8:89:62:5A:80:09:44:62:DF Fingerprint (SHA1): 6B:D9:5F:49:A7:E8:50:A5:C1:89:62:DA:9C:78:FF:56:4D:FC:A5:34 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #6914: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #6915: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #6916: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #6917: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122756 (0x1e67db04) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 12:30:35 2017 Not After : Tue May 10 12:30:35 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 96:d9:8d:a4:f0:01:ca:28:a3:4d:74:8b:31:36:45:77: 99:cd:a2:e1:8d:23:91:85:36:b3:36:d0:0c:bb:7d:d3: 2e:39:a4:f2:9f:7f:ae:1b:90:40:74:fc:50:05:62:2f: 0b:92:5d:f9:d1:4d:cc:c7:ce:85:92:0b:76:53:ff:74: ea:ed:f6:30:92:0b:2b:27:9d:a6:b1:e6:36:5a:58:79: 7e:e0:8f:8a:c9:c4:2b:31:2b:d5:40:d3:57:72:12:92: 6c:1a:94:41:5f:5e:df:fe:0c:a2:af:b1:d8:ec:ab:1c: ab:6d:7d:f6:40:4d:60:ce:3f:37:90:2f:ab:cc:ae:cc: fb:9b:91:fd:0f:0b:cd:20:f9:c0:c1:7f:a5:39:40:6f: fa:91:5f:bf:dc:d6:33:83:59:5c:99:83:1f:96:d7:66: 81:66:5c:a3:1a:a7:11:fb:7c:ff:59:45:43:b9:26:e2: a4:58:9b:c0:f2:d1:34:8b:e7:cc:cd:65:cc:8e:a1:0b: c6:38:c3:e5:05:74:94:2e:59:6a:83:4f:7c:3a:e8:76: b0:84:6a:3c:8b:b1:a2:b4:9e:63:aa:8f:1c:cc:37:5c: c7:35:4b:7f:ee:2d:5e:29:2c:45:f5:9f:57:4b:cb:95: 56:f4:2a:86:57:d0:a3:8e:9e:1c:41:1a:79:fe:9c:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:6a:17:4a:0b:2c:be:96:71:cb:48:d8:af:c1:bc:75: 50:1c:d5:1d:5c:8c:3b:5b:0b:73:a3:21:fc:84:d5:ac: 00:0e:42:a5:06:31:c9:09:2f:50:df:82:91:11:c4:cc: f6:16:2a:e1:94:1e:59:b2:3a:13:de:62:45:ae:a3:79: 86:f1:a2:9c:ae:5d:a2:f9:7b:9e:fc:1a:e1:9f:55:8c: 66:32:68:dd:8d:c1:f1:85:c9:16:29:0a:94:9d:85:ff: fc:99:7c:99:68:70:b5:df:1c:6b:90:8d:11:5f:3e:ee: 8f:19:96:1f:2c:fa:ea:b5:97:51:ca:8e:9f:df:8f:18: 30:12:95:c7:af:cc:39:35:aa:1f:21:da:94:02:08:c4: 22:1e:c2:26:b1:c8:f2:df:6d:bf:63:e0:70:18:56:07: f1:5f:48:bb:72:e5:a8:e7:71:84:76:4f:f2:da:68:d6: 62:93:88:da:a0:2d:d5:ab:ae:55:cf:45:79:85:93:0e: fc:a8:88:ed:9c:de:1d:f6:b3:17:d2:ad:58:59:a8:c8: a3:6b:fa:de:2e:4a:50:34:8d:97:c8:db:8d:d1:73:cb: 49:41:9b:74:d9:5a:42:2c:9d:40:2b:f4:b4:7f:f1:57: 91:16:c4:9a:46:d0:82:a0:4a:9f:8e:54:a4:04:c1:74 Fingerprint (SHA-256): 1A:8C:9E:C1:6B:C2:99:35:BD:A3:94:35:6C:16:EF:50:02:B8:23:9A:E1:A9:44:F8:89:62:5A:80:09:44:62:DF Fingerprint (SHA1): 6B:D9:5F:49:A7:E8:50:A5:C1:89:62:DA:9C:78:FF:56:4D:FC:A5:34 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #6918: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122757 (0x1e67db05) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:30:36 2017 Not After : Tue May 10 12:30:36 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f8:a0:89:6f:d7:bf:8b:1a:e3:8b:e5:c0:8f:79:ed: 03:db:53:a5:a3:cc:30:31:ba:66:7f:44:4d:78:65:60: 95:0b:90:23:51:18:81:09:82:80:4b:30:68:84:bc:df: d5:d6:59:20:bd:57:8a:1a:0b:99:f4:65:5d:4a:96:ad: 20:d8:ed:15:ec:85:60:a0:19:10:bf:54:b1:4f:7a:6f: 31:3a:bd:3d:3a:7c:95:6a:fe:20:a9:09:35:f8:f6:26: c2:cc:db:21:c3:0d:81:c8:5c:ba:c1:ea:be:83:93:29: 90:5e:fd:65:8f:e1:8e:e4:62:a8:f8:07:82:bb:db:64: 27:e1:69:13:82:d5:b6:0a:8d:b5:93:35:c8:3f:b7:73: 46:8f:76:bc:be:c4:48:8f:82:c9:5f:03:d9:da:31:ed: e8:a4:bf:7e:12:44:bb:76:03:f6:f8:74:2b:19:56:f3: c9:88:91:40:2b:93:f6:4a:e2:d0:9d:31:7c:a3:0a:c3: 4d:4d:ae:70:73:5b:26:3e:41:b4:5d:62:f7:f7:2d:29: 5b:35:1f:f2:75:af:e0:f5:51:bb:0e:5b:74:b2:7f:ae: e0:26:a6:4a:72:c9:77:65:b7:6d:3d:fe:1d:d1:83:3f: 12:a0:0c:72:b9:8e:3b:5e:e5:5f:ea:68:01:fd:1a:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:04:96:e2:9a:8d:6c:a9:b0:b2:7d:c4:57:be:6e:41: f0:ab:f6:16:2c:d3:3e:c2:49:81:a2:de:32:da:c9:ee: 5e:2c:bf:ed:d1:34:71:40:ab:54:5f:80:36:74:bc:bc: 18:5a:ae:8d:f1:be:50:36:89:35:e8:89:ab:3e:9a:45: be:4c:64:55:10:19:a5:fd:c3:c9:e8:1e:8a:88:ec:51: ac:08:eb:26:ed:b6:51:fd:4d:a4:12:97:4f:e1:9b:02: 49:a4:16:c5:56:2e:ec:98:38:80:0b:60:90:fc:3d:b2: 87:71:31:5c:2f:4e:1d:69:c9:1a:6b:48:a0:83:63:f1: 3f:60:91:d1:8b:58:9c:b7:fa:9c:c8:75:3a:a7:5c:0b: 83:d7:87:84:27:83:db:b8:27:40:77:32:38:0c:2c:a0: 26:a9:92:16:70:05:49:10:2d:ca:85:9b:73:be:c4:e1: c0:98:36:ef:f8:88:7a:2f:de:e9:0c:d9:0d:4e:b0:ee: a4:5b:89:e9:a7:4b:f4:a6:2a:a6:94:76:e0:e7:d2:30: b0:9f:99:7c:aa:81:81:75:ed:f0:14:ff:ae:01:6b:0b: a5:20:98:dd:3c:7e:e9:2f:78:9b:f3:36:68:d5:5c:ba: e2:fb:40:1e:65:41:bf:bd:14:8a:4d:37:59:c1:c6:a0 Fingerprint (SHA-256): 21:15:0E:D3:8F:2C:35:7C:56:AF:56:6B:FC:5D:07:6D:45:FF:13:CB:10:F0:3C:18:DA:A0:5D:FF:94:F6:A1:E6 Fingerprint (SHA1): 18:BB:6A:6D:E9:05:C6:84:2F:CF:27:B6:AE:7D:36:99:72:1A:48:59 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #6919: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #6920: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #6921: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #6922: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #6923: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #6924: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122757 (0x1e67db05) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:30:36 2017 Not After : Tue May 10 12:30:36 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f8:a0:89:6f:d7:bf:8b:1a:e3:8b:e5:c0:8f:79:ed: 03:db:53:a5:a3:cc:30:31:ba:66:7f:44:4d:78:65:60: 95:0b:90:23:51:18:81:09:82:80:4b:30:68:84:bc:df: d5:d6:59:20:bd:57:8a:1a:0b:99:f4:65:5d:4a:96:ad: 20:d8:ed:15:ec:85:60:a0:19:10:bf:54:b1:4f:7a:6f: 31:3a:bd:3d:3a:7c:95:6a:fe:20:a9:09:35:f8:f6:26: c2:cc:db:21:c3:0d:81:c8:5c:ba:c1:ea:be:83:93:29: 90:5e:fd:65:8f:e1:8e:e4:62:a8:f8:07:82:bb:db:64: 27:e1:69:13:82:d5:b6:0a:8d:b5:93:35:c8:3f:b7:73: 46:8f:76:bc:be:c4:48:8f:82:c9:5f:03:d9:da:31:ed: e8:a4:bf:7e:12:44:bb:76:03:f6:f8:74:2b:19:56:f3: c9:88:91:40:2b:93:f6:4a:e2:d0:9d:31:7c:a3:0a:c3: 4d:4d:ae:70:73:5b:26:3e:41:b4:5d:62:f7:f7:2d:29: 5b:35:1f:f2:75:af:e0:f5:51:bb:0e:5b:74:b2:7f:ae: e0:26:a6:4a:72:c9:77:65:b7:6d:3d:fe:1d:d1:83:3f: 12:a0:0c:72:b9:8e:3b:5e:e5:5f:ea:68:01:fd:1a:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:04:96:e2:9a:8d:6c:a9:b0:b2:7d:c4:57:be:6e:41: f0:ab:f6:16:2c:d3:3e:c2:49:81:a2:de:32:da:c9:ee: 5e:2c:bf:ed:d1:34:71:40:ab:54:5f:80:36:74:bc:bc: 18:5a:ae:8d:f1:be:50:36:89:35:e8:89:ab:3e:9a:45: be:4c:64:55:10:19:a5:fd:c3:c9:e8:1e:8a:88:ec:51: ac:08:eb:26:ed:b6:51:fd:4d:a4:12:97:4f:e1:9b:02: 49:a4:16:c5:56:2e:ec:98:38:80:0b:60:90:fc:3d:b2: 87:71:31:5c:2f:4e:1d:69:c9:1a:6b:48:a0:83:63:f1: 3f:60:91:d1:8b:58:9c:b7:fa:9c:c8:75:3a:a7:5c:0b: 83:d7:87:84:27:83:db:b8:27:40:77:32:38:0c:2c:a0: 26:a9:92:16:70:05:49:10:2d:ca:85:9b:73:be:c4:e1: c0:98:36:ef:f8:88:7a:2f:de:e9:0c:d9:0d:4e:b0:ee: a4:5b:89:e9:a7:4b:f4:a6:2a:a6:94:76:e0:e7:d2:30: b0:9f:99:7c:aa:81:81:75:ed:f0:14:ff:ae:01:6b:0b: a5:20:98:dd:3c:7e:e9:2f:78:9b:f3:36:68:d5:5c:ba: e2:fb:40:1e:65:41:bf:bd:14:8a:4d:37:59:c1:c6:a0 Fingerprint (SHA-256): 21:15:0E:D3:8F:2C:35:7C:56:AF:56:6B:FC:5D:07:6D:45:FF:13:CB:10:F0:3C:18:DA:A0:5D:FF:94:F6:A1:E6 Fingerprint (SHA1): 18:BB:6A:6D:E9:05:C6:84:2F:CF:27:B6:AE:7D:36:99:72:1A:48:59 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #6925: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122757 (0x1e67db05) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:30:36 2017 Not After : Tue May 10 12:30:36 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:f8:a0:89:6f:d7:bf:8b:1a:e3:8b:e5:c0:8f:79:ed: 03:db:53:a5:a3:cc:30:31:ba:66:7f:44:4d:78:65:60: 95:0b:90:23:51:18:81:09:82:80:4b:30:68:84:bc:df: d5:d6:59:20:bd:57:8a:1a:0b:99:f4:65:5d:4a:96:ad: 20:d8:ed:15:ec:85:60:a0:19:10:bf:54:b1:4f:7a:6f: 31:3a:bd:3d:3a:7c:95:6a:fe:20:a9:09:35:f8:f6:26: c2:cc:db:21:c3:0d:81:c8:5c:ba:c1:ea:be:83:93:29: 90:5e:fd:65:8f:e1:8e:e4:62:a8:f8:07:82:bb:db:64: 27:e1:69:13:82:d5:b6:0a:8d:b5:93:35:c8:3f:b7:73: 46:8f:76:bc:be:c4:48:8f:82:c9:5f:03:d9:da:31:ed: e8:a4:bf:7e:12:44:bb:76:03:f6:f8:74:2b:19:56:f3: c9:88:91:40:2b:93:f6:4a:e2:d0:9d:31:7c:a3:0a:c3: 4d:4d:ae:70:73:5b:26:3e:41:b4:5d:62:f7:f7:2d:29: 5b:35:1f:f2:75:af:e0:f5:51:bb:0e:5b:74:b2:7f:ae: e0:26:a6:4a:72:c9:77:65:b7:6d:3d:fe:1d:d1:83:3f: 12:a0:0c:72:b9:8e:3b:5e:e5:5f:ea:68:01:fd:1a:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:04:96:e2:9a:8d:6c:a9:b0:b2:7d:c4:57:be:6e:41: f0:ab:f6:16:2c:d3:3e:c2:49:81:a2:de:32:da:c9:ee: 5e:2c:bf:ed:d1:34:71:40:ab:54:5f:80:36:74:bc:bc: 18:5a:ae:8d:f1:be:50:36:89:35:e8:89:ab:3e:9a:45: be:4c:64:55:10:19:a5:fd:c3:c9:e8:1e:8a:88:ec:51: ac:08:eb:26:ed:b6:51:fd:4d:a4:12:97:4f:e1:9b:02: 49:a4:16:c5:56:2e:ec:98:38:80:0b:60:90:fc:3d:b2: 87:71:31:5c:2f:4e:1d:69:c9:1a:6b:48:a0:83:63:f1: 3f:60:91:d1:8b:58:9c:b7:fa:9c:c8:75:3a:a7:5c:0b: 83:d7:87:84:27:83:db:b8:27:40:77:32:38:0c:2c:a0: 26:a9:92:16:70:05:49:10:2d:ca:85:9b:73:be:c4:e1: c0:98:36:ef:f8:88:7a:2f:de:e9:0c:d9:0d:4e:b0:ee: a4:5b:89:e9:a7:4b:f4:a6:2a:a6:94:76:e0:e7:d2:30: b0:9f:99:7c:aa:81:81:75:ed:f0:14:ff:ae:01:6b:0b: a5:20:98:dd:3c:7e:e9:2f:78:9b:f3:36:68:d5:5c:ba: e2:fb:40:1e:65:41:bf:bd:14:8a:4d:37:59:c1:c6:a0 Fingerprint (SHA-256): 21:15:0E:D3:8F:2C:35:7C:56:AF:56:6B:FC:5D:07:6D:45:FF:13:CB:10:F0:3C:18:DA:A0:5D:FF:94:F6:A1:E6 Fingerprint (SHA1): 18:BB:6A:6D:E9:05:C6:84:2F:CF:27:B6:AE:7D:36:99:72:1A:48:59 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #6926: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #6927: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #6928: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #6929: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #6930: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #6931: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122756 (0x1e67db04) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 12:30:35 2017 Not After : Tue May 10 12:30:35 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 96:d9:8d:a4:f0:01:ca:28:a3:4d:74:8b:31:36:45:77: 99:cd:a2:e1:8d:23:91:85:36:b3:36:d0:0c:bb:7d:d3: 2e:39:a4:f2:9f:7f:ae:1b:90:40:74:fc:50:05:62:2f: 0b:92:5d:f9:d1:4d:cc:c7:ce:85:92:0b:76:53:ff:74: ea:ed:f6:30:92:0b:2b:27:9d:a6:b1:e6:36:5a:58:79: 7e:e0:8f:8a:c9:c4:2b:31:2b:d5:40:d3:57:72:12:92: 6c:1a:94:41:5f:5e:df:fe:0c:a2:af:b1:d8:ec:ab:1c: ab:6d:7d:f6:40:4d:60:ce:3f:37:90:2f:ab:cc:ae:cc: fb:9b:91:fd:0f:0b:cd:20:f9:c0:c1:7f:a5:39:40:6f: fa:91:5f:bf:dc:d6:33:83:59:5c:99:83:1f:96:d7:66: 81:66:5c:a3:1a:a7:11:fb:7c:ff:59:45:43:b9:26:e2: a4:58:9b:c0:f2:d1:34:8b:e7:cc:cd:65:cc:8e:a1:0b: c6:38:c3:e5:05:74:94:2e:59:6a:83:4f:7c:3a:e8:76: b0:84:6a:3c:8b:b1:a2:b4:9e:63:aa:8f:1c:cc:37:5c: c7:35:4b:7f:ee:2d:5e:29:2c:45:f5:9f:57:4b:cb:95: 56:f4:2a:86:57:d0:a3:8e:9e:1c:41:1a:79:fe:9c:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:6a:17:4a:0b:2c:be:96:71:cb:48:d8:af:c1:bc:75: 50:1c:d5:1d:5c:8c:3b:5b:0b:73:a3:21:fc:84:d5:ac: 00:0e:42:a5:06:31:c9:09:2f:50:df:82:91:11:c4:cc: f6:16:2a:e1:94:1e:59:b2:3a:13:de:62:45:ae:a3:79: 86:f1:a2:9c:ae:5d:a2:f9:7b:9e:fc:1a:e1:9f:55:8c: 66:32:68:dd:8d:c1:f1:85:c9:16:29:0a:94:9d:85:ff: fc:99:7c:99:68:70:b5:df:1c:6b:90:8d:11:5f:3e:ee: 8f:19:96:1f:2c:fa:ea:b5:97:51:ca:8e:9f:df:8f:18: 30:12:95:c7:af:cc:39:35:aa:1f:21:da:94:02:08:c4: 22:1e:c2:26:b1:c8:f2:df:6d:bf:63:e0:70:18:56:07: f1:5f:48:bb:72:e5:a8:e7:71:84:76:4f:f2:da:68:d6: 62:93:88:da:a0:2d:d5:ab:ae:55:cf:45:79:85:93:0e: fc:a8:88:ed:9c:de:1d:f6:b3:17:d2:ad:58:59:a8:c8: a3:6b:fa:de:2e:4a:50:34:8d:97:c8:db:8d:d1:73:cb: 49:41:9b:74:d9:5a:42:2c:9d:40:2b:f4:b4:7f:f1:57: 91:16:c4:9a:46:d0:82:a0:4a:9f:8e:54:a4:04:c1:74 Fingerprint (SHA-256): 1A:8C:9E:C1:6B:C2:99:35:BD:A3:94:35:6C:16:EF:50:02:B8:23:9A:E1:A9:44:F8:89:62:5A:80:09:44:62:DF Fingerprint (SHA1): 6B:D9:5F:49:A7:E8:50:A5:C1:89:62:DA:9C:78:FF:56:4D:FC:A5:34 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #6932: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122756 (0x1e67db04) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 12:30:35 2017 Not After : Tue May 10 12:30:35 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 96:d9:8d:a4:f0:01:ca:28:a3:4d:74:8b:31:36:45:77: 99:cd:a2:e1:8d:23:91:85:36:b3:36:d0:0c:bb:7d:d3: 2e:39:a4:f2:9f:7f:ae:1b:90:40:74:fc:50:05:62:2f: 0b:92:5d:f9:d1:4d:cc:c7:ce:85:92:0b:76:53:ff:74: ea:ed:f6:30:92:0b:2b:27:9d:a6:b1:e6:36:5a:58:79: 7e:e0:8f:8a:c9:c4:2b:31:2b:d5:40:d3:57:72:12:92: 6c:1a:94:41:5f:5e:df:fe:0c:a2:af:b1:d8:ec:ab:1c: ab:6d:7d:f6:40:4d:60:ce:3f:37:90:2f:ab:cc:ae:cc: fb:9b:91:fd:0f:0b:cd:20:f9:c0:c1:7f:a5:39:40:6f: fa:91:5f:bf:dc:d6:33:83:59:5c:99:83:1f:96:d7:66: 81:66:5c:a3:1a:a7:11:fb:7c:ff:59:45:43:b9:26:e2: a4:58:9b:c0:f2:d1:34:8b:e7:cc:cd:65:cc:8e:a1:0b: c6:38:c3:e5:05:74:94:2e:59:6a:83:4f:7c:3a:e8:76: b0:84:6a:3c:8b:b1:a2:b4:9e:63:aa:8f:1c:cc:37:5c: c7:35:4b:7f:ee:2d:5e:29:2c:45:f5:9f:57:4b:cb:95: 56:f4:2a:86:57:d0:a3:8e:9e:1c:41:1a:79:fe:9c:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:6a:17:4a:0b:2c:be:96:71:cb:48:d8:af:c1:bc:75: 50:1c:d5:1d:5c:8c:3b:5b:0b:73:a3:21:fc:84:d5:ac: 00:0e:42:a5:06:31:c9:09:2f:50:df:82:91:11:c4:cc: f6:16:2a:e1:94:1e:59:b2:3a:13:de:62:45:ae:a3:79: 86:f1:a2:9c:ae:5d:a2:f9:7b:9e:fc:1a:e1:9f:55:8c: 66:32:68:dd:8d:c1:f1:85:c9:16:29:0a:94:9d:85:ff: fc:99:7c:99:68:70:b5:df:1c:6b:90:8d:11:5f:3e:ee: 8f:19:96:1f:2c:fa:ea:b5:97:51:ca:8e:9f:df:8f:18: 30:12:95:c7:af:cc:39:35:aa:1f:21:da:94:02:08:c4: 22:1e:c2:26:b1:c8:f2:df:6d:bf:63:e0:70:18:56:07: f1:5f:48:bb:72:e5:a8:e7:71:84:76:4f:f2:da:68:d6: 62:93:88:da:a0:2d:d5:ab:ae:55:cf:45:79:85:93:0e: fc:a8:88:ed:9c:de:1d:f6:b3:17:d2:ad:58:59:a8:c8: a3:6b:fa:de:2e:4a:50:34:8d:97:c8:db:8d:d1:73:cb: 49:41:9b:74:d9:5a:42:2c:9d:40:2b:f4:b4:7f:f1:57: 91:16:c4:9a:46:d0:82:a0:4a:9f:8e:54:a4:04:c1:74 Fingerprint (SHA-256): 1A:8C:9E:C1:6B:C2:99:35:BD:A3:94:35:6C:16:EF:50:02:B8:23:9A:E1:A9:44:F8:89:62:5A:80:09:44:62:DF Fingerprint (SHA1): 6B:D9:5F:49:A7:E8:50:A5:C1:89:62:DA:9C:78:FF:56:4D:FC:A5:34 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #6933: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #6934: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122761 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6935: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #6936: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #6937: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122762 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6938: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #6939: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #6940: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122763 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6941: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #6942: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #6943: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122764 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6944: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #6945: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #6946: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122765 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6947: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #6948: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #6949: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122766 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6950: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #6951: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #6952: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122767 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6953: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #6954: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #6955: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122768 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6956: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #6957: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #6958: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122769 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #6959: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #6960: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #6961: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6962: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 510122770 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6963: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6964: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 510122771 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6965: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6966: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 510122772 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6967: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6968: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #6969: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #6970: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6971: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 510122773 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6972: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6973: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 510122774 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6974: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6975: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 510122775 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6976: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6977: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #6978: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #6979: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6980: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 510122776 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6981: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6982: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 510122777 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6983: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6984: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 510122778 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6985: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6986: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #6987: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #6988: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6989: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 510122779 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6990: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6991: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 510122780 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6992: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6993: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 510122781 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6994: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #6995: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #6996: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #6997: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6998: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 510122782 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #6999: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7000: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #7001: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7002: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510122783 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7003: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7004: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122761 (0x1e67db09) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Wed May 10 12:30:44 2017 Not After : Tue May 10 12:30:44 2067 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:d1:c3:61:9d:3a:23:20:22:73:2f:66:49:27:da:1c: 04:25:ce:88:9e:e1:7b:9d:7f:54:52:30:ac:a1:a1:3f: fe:f8:25:35:7e:b2:13:b4:db:93:6c:19:1d:76:c9:15: 3b:04:a9:d1:ee:c0:76:4a:a3:2f:dc:07:54:f4:67:8a: 75:12:31:2d:03:0e:99:a0:b1:d4:2b:eb:af:61:22:2d: 49:5c:b0:2c:8d:b0:6a:85:38:77:34:84:90:3e:19:29: 47:56:bc:7a:ab:c2:c3:15:52:19:37:36:38:6f:d2:12: 86:f3:a8:58:b5:5e:93:85:17:f4:f2:a7:0a:73:e9:26: d7:26:06:29:94:18:12:69:72:3c:2e:63:ca:bc:84:1c: ad:64:ff:30:98:7b:dd:61:8b:ff:c0:24:80:95:86:f3: 28:5e:84:79:c1:8f:b5:f9:d3:10:64:5f:88:02:9d:28: cb:c4:47:08:bd:ae:f4:67:27:f2:fe:3b:1f:7e:74:35: f3:3f:2f:20:74:17:db:d6:be:74:9a:b4:48:f2:dd:ad: f6:b3:9b:f6:18:81:69:2c:ee:b3:a7:09:7e:39:73:b5: 13:e1:dc:a3:b6:13:04:38:21:52:63:bf:01:d0:66:06: b6:7a:b4:f8:a6:06:b2:91:08:f0:6c:11:29:ec:2d:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d5:1d:64:b5:9d:ef:c8:35:27:0e:0b:46:72:be:be:0c: ca:ae:40:ad:a6:09:0a:57:e6:63:66:64:d0:b4:d1:de: 05:5b:58:d7:c3:c8:0f:60:24:d7:8e:8d:2b:b4:3b:f8: fa:87:a2:83:e1:f6:fe:47:4c:db:0e:4b:e9:98:57:10: e7:b3:72:db:5e:d5:fc:d1:0f:67:76:1e:b7:9a:40:58: 8b:70:5e:9d:c8:70:07:bf:67:7e:c2:f9:5b:34:4c:c5: 4b:88:40:2d:10:ae:e4:f9:30:bf:1e:89:af:bd:13:d3: 0d:9c:4c:15:ed:f9:3f:6c:e6:ed:58:77:3f:78:3f:70: e8:1b:88:f1:79:04:91:e0:c5:bf:b7:23:c0:2e:7d:fd: 0d:13:fe:6f:4c:e2:e6:92:b9:34:f5:b9:82:8b:80:45: ae:f8:7d:d0:fb:fb:56:5f:2c:2c:0a:e4:23:e5:9e:62: 5f:cd:55:1e:83:fa:0d:a8:75:bb:e4:a2:43:10:9b:6b: 35:03:ca:4c:e4:9a:40:d4:2e:83:1b:d3:56:3c:ca:01: 9a:c4:56:a2:10:fb:60:2e:1e:1e:f1:0f:c6:4e:53:95: 74:05:d0:a5:93:7d:7c:94:ab:f7:de:8b:7c:cd:78:cc: 8b:da:0d:96:9d:9f:79:93:99:26:55:0d:61:99:de:89 Fingerprint (SHA-256): 4F:AE:E4:A8:EC:2F:DF:AF:DB:D8:83:F2:AD:E5:45:B2:29:AD:A2:91:90:F4:51:E9:C1:94:E8:FB:06:7C:3A:1C Fingerprint (SHA1): 83:39:A4:17:3B:F6:A5:1A:3C:1E:3E:A6:B2:22:29:65:1F:64:70:2F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #7005: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122762 (0x1e67db0a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Wed May 10 12:30:46 2017 Not After : Tue May 10 12:30:46 2067 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:49:be:76:b8:9e:c3:8a:b3:12:f3:8f:85:17:a6:2b: e7:fb:27:2b:cf:fd:10:81:df:5a:33:76:4d:a7:47:2e: 25:99:e6:63:16:83:93:e7:65:45:9c:8a:f7:a5:76:0e: 5c:9b:66:7c:87:3b:93:f5:bf:99:5b:55:cd:93:1e:67: 0c:cb:38:fc:59:c8:db:44:15:10:7d:bd:59:c1:f5:15: 02:10:58:1f:0b:a6:9b:5d:ae:7d:88:e4:c2:d6:6f:0c: f3:ed:06:6f:eb:88:20:e9:61:3e:89:27:73:13:15:ca: dd:0d:9c:46:5d:49:a7:c5:e1:64:c4:4c:06:0b:d1:ec: 59:e1:df:e6:ea:72:10:70:2f:a8:63:95:d3:0d:6b:8a: 7f:03:64:47:91:7b:31:ca:a8:7e:ba:2a:d9:90:fa:0e: 3a:91:b0:f5:06:df:a2:12:a8:41:b8:25:9d:f0:0b:1e: b3:5b:8a:d4:5f:8d:84:51:f1:42:cf:17:2b:c2:0b:0a: 97:29:4d:11:71:23:6e:cc:0d:4e:76:37:0f:47:f8:58: fa:e3:12:73:e4:59:d9:72:a6:b5:83:61:e8:cc:a0:3e: 95:bb:2f:0b:85:4f:1b:fd:36:79:50:e4:62:1c:7c:ce: b4:4b:4a:09:df:0e:eb:0a:74:c2:1a:6b:66:d6:00:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:e2:5d:14:9c:3e:86:6e:24:55:a9:b5:36:74:ec:d9: 8b:e7:fd:30:1e:fa:fd:e6:8f:da:85:d5:35:c3:b2:e9: fe:4b:11:36:37:fe:bf:44:ee:da:05:65:c5:24:a4:57: 49:54:4e:eb:5e:72:0c:26:19:ed:2f:45:32:93:77:ca: 2d:43:49:ec:d5:81:da:a6:db:a3:89:06:0e:f4:01:cd: 27:3a:d2:31:f0:1a:a2:1c:53:db:c5:76:b1:b9:22:db: 1d:52:9d:5b:21:a2:f5:bd:2e:2b:67:de:2b:7c:bf:4d: a0:8e:60:bd:d5:9d:08:35:18:19:87:ea:d5:eb:21:51: 53:63:8c:ae:91:97:1e:82:16:f1:92:c0:83:4a:2d:b9: 34:91:52:6a:d8:6c:25:62:79:a8:90:7e:e0:20:99:69: f0:9f:b5:b7:d6:0d:6b:6d:c7:33:81:65:68:6e:70:c2: f7:0e:43:98:f1:ff:33:02:0a:19:6b:dc:76:f5:40:b6: 2f:c4:07:7e:19:6d:74:3a:17:89:b6:49:c8:1d:b3:3d: 92:9d:5a:66:ec:88:3e:aa:ab:68:df:ff:9f:e5:74:42: 9a:c8:ac:bb:e0:db:f8:07:47:74:fa:41:0f:10:c6:d3: 3c:a4:54:be:95:96:d9:cc:bc:1d:fb:3a:d8:dd:e9:aa Fingerprint (SHA-256): B6:59:D9:2C:37:E0:70:45:17:4C:75:DA:51:98:8C:53:6B:19:71:8D:15:AA:04:8D:AC:74:89:44:36:57:6B:71 Fingerprint (SHA1): 8C:24:76:C8:CB:3B:61:4E:6C:40:6A:58:92:EE:B3:89:D7:F0:45:E2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #7006: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122763 (0x1e67db0b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Wed May 10 12:30:49 2017 Not After : Tue May 10 12:30:49 2067 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:fd:b9:b0:90:64:6b:44:0e:d9:76:bd:d1:3f:1d:ec: c6:a8:bc:2a:45:43:b0:e7:ea:9b:08:b2:b6:f7:01:3d: c3:d8:4c:04:5f:ac:fd:7c:2c:42:62:38:2b:03:ac:2c: 40:e0:6f:3c:59:bb:35:e4:63:03:3e:9b:58:67:4e:96: 20:bf:6a:d6:d0:18:a6:85:7d:38:01:72:25:07:d8:b5: 09:30:96:51:55:74:3a:5f:37:46:36:a7:95:9d:9d:16: b4:11:92:2f:fd:59:a1:5d:11:11:f1:a4:4b:bf:86:00: 50:4a:15:0a:2b:32:a4:e5:a6:75:4a:e7:62:78:5a:56: db:e5:66:8e:ee:d1:70:6a:23:09:63:89:73:e5:25:96: 43:8f:3c:73:39:a7:69:d0:30:8d:cd:f9:9d:fc:07:3c: 43:16:d0:a8:e0:31:d6:b3:9f:cf:d8:17:2e:21:22:4b: f8:8f:a7:ce:c8:e3:ab:e1:3a:17:01:27:5f:de:a7:06: d0:db:12:ae:c4:13:2f:ea:3a:33:15:a3:0c:bb:dc:cc: 27:02:91:39:8c:05:6c:30:52:81:91:2b:16:37:09:c6: 40:8e:4f:17:e6:18:24:db:dc:4c:4c:96:42:25:f2:2b: b4:77:ad:87:95:c3:d9:f2:a9:21:92:3f:c1:d4:cc:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b9:a7:4d:a3:47:9d:f1:9d:bc:90:91:33:98:2d:56:8a: a4:34:78:b3:13:96:08:84:ac:81:04:85:00:f2:4d:bd: e5:0f:22:1f:18:24:59:2d:52:50:bc:64:bd:c2:11:cf: 8e:3e:6f:c3:aa:f2:0d:4e:ec:45:04:d0:c3:70:8e:ee: 31:c9:fb:6c:64:22:7f:f5:4b:bf:cc:5e:25:d9:b0:76: 34:53:1b:87:23:6f:8f:da:b3:fb:ee:0d:85:30:d5:35: 26:70:8d:8c:6d:ae:f1:9a:05:cb:2b:fe:8a:05:00:50: 50:85:7f:1e:d6:9f:2c:82:ee:9c:dd:0b:71:fb:a7:e6: b5:98:92:6d:6a:ea:ff:44:82:be:6c:96:8c:30:0d:bb: bc:af:fb:8a:72:13:ed:b8:24:54:13:48:61:c8:d6:c2: 9a:2f:f8:77:a9:8a:c1:38:ad:b5:b3:42:49:80:b5:25: 6f:9d:8d:a3:32:5b:db:83:76:a9:84:33:ff:99:a9:51: 1b:51:68:bf:6d:32:ac:a3:d6:f1:74:65:88:3c:4e:9d: 37:a4:cd:70:c8:e8:2b:1a:a6:23:2b:a3:fc:28:a7:c2: 13:fc:bd:73:e0:ed:b4:10:32:c8:c5:b6:fb:91:a9:eb: 94:3c:d3:18:ae:a2:fd:80:09:4f:fb:e9:e0:08:65:06 Fingerprint (SHA-256): 3D:D3:2B:8C:4A:F3:5D:44:22:0A:78:EC:7C:8C:3A:DB:C5:5A:3E:87:43:86:01:96:75:70:B0:87:05:3F:3E:F5 Fingerprint (SHA1): CC:5E:98:0A:E4:77:48:C3:29:3C:82:F0:DC:65:52:99:3B:74:FE:09 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #7007: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122764 (0x1e67db0c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Wed May 10 12:30:52 2017 Not After : Tue May 10 12:30:52 2067 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:5c:43:6e:91:2e:cb:b5:b9:33:4c:40:68:61:af:61: 0b:b3:d5:a2:24:b9:c6:77:7c:20:16:4c:4d:22:16:ea: 22:b6:2a:c6:f2:e7:81:60:49:66:f8:bc:db:7d:b5:38: c7:27:83:c6:8d:96:b6:ff:9e:1d:c0:de:45:2e:c7:15: fd:d4:c8:88:1f:db:9e:90:a8:37:32:62:cf:09:b1:65: 64:6e:51:09:56:7e:bc:39:a6:fa:e7:fb:37:da:f5:46: 1e:e7:d3:eb:8f:a9:18:80:bb:ca:96:df:73:fe:e1:b2: be:4b:8d:49:69:72:d2:e3:7c:d4:33:ac:55:6e:ac:e3: 12:4d:2d:92:f7:75:b0:d8:57:ef:5e:12:4f:01:e4:f8: 9b:2d:ad:6a:f2:ee:32:77:42:bd:86:29:f6:9b:44:45: de:13:a7:5d:51:7f:32:16:36:3a:c7:a9:b3:f4:16:28: 5e:0a:4e:05:e5:1d:05:f7:e5:cc:ec:12:7e:59:30:7f: 7c:12:44:bb:9f:8f:fd:51:cf:09:5c:f3:1a:31:43:8c: 8d:cc:31:b0:b0:b6:96:b9:61:9b:cd:9c:e4:b4:9a:d1: a0:ac:55:ba:d9:5e:22:ee:a3:b7:e6:56:2b:0e:77:21: 9c:57:de:69:c9:7e:8f:1e:c0:d9:eb:6a:46:63:3a:93 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:a8:e7:af:0e:4d:53:a6:53:86:ef:7c:d4:e2:d8:0a: 61:15:b7:14:02:bc:4f:bd:8e:f1:86:44:59:ae:d8:de: 85:81:59:21:18:38:6e:53:bb:0b:48:9b:19:80:bf:6d: b1:27:03:c7:51:c1:6d:ff:e4:5d:7b:79:96:e9:40:8f: ea:e3:4d:20:10:f0:58:ab:33:af:44:30:98:f8:2e:e6: 55:96:c5:2f:b8:d7:37:98:e9:94:f3:dd:0b:c8:ad:89: d4:b4:96:e1:1f:92:d8:2a:a8:e6:1a:8b:a7:fd:46:8e: 41:fd:39:01:db:ff:5e:7f:6f:58:c5:08:2a:41:18:a2: d1:f0:28:46:1d:e8:41:af:95:1c:a0:0a:01:fb:ac:e3: f9:f1:6c:b2:1f:90:b9:be:ab:0f:9b:de:bb:10:41:b8: 2b:5c:cb:3a:cd:35:ec:75:e8:be:5d:9b:cd:a0:f1:2f: 91:b3:f8:34:40:e4:ac:69:84:70:30:38:05:79:99:c0: 6c:15:1e:b6:4b:cf:7d:42:00:4e:fb:62:41:15:7f:ff: e8:e4:eb:cc:90:58:a0:04:b0:2c:64:d1:fd:b6:14:4f: 9d:5f:d0:31:86:94:e4:28:0d:55:d3:6c:ad:c3:bb:ca: 34:ee:aa:c3:e4:b3:ac:02:df:37:ca:21:e0:1b:b9:c6 Fingerprint (SHA-256): 69:20:55:7D:BA:E9:64:1C:80:68:B2:C2:48:5F:E8:32:A7:9B:D5:93:1E:F1:F9:77:4D:4C:34:97:94:AA:74:12 Fingerprint (SHA1): F9:C8:42:D9:37:8B:19:2E:84:EF:C0:54:9C:83:66:2C:BB:FE:C8:03 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #7008: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122765 (0x1e67db0d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Wed May 10 12:30:54 2017 Not After : Tue May 10 12:30:54 2067 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:26:6c:62:da:a5:95:6d:e3:2a:cd:23:f3:48:cf:de: 53:8d:88:9a:18:d0:89:d9:05:8e:f0:7b:f6:f5:dc:2e: 0f:39:3d:57:6f:00:8d:23:df:6c:e4:75:b4:99:90:b2: 6b:90:49:ff:c1:a7:ee:9d:f0:ce:db:76:1f:0e:ed:f7: 25:21:ba:24:c8:5d:9b:14:35:18:91:01:59:e3:4f:37: a6:60:e5:97:7d:ca:56:79:d9:05:93:9d:1f:dc:e5:35: 7c:d3:72:7c:eb:21:6a:47:52:53:06:a2:69:2e:0d:de: 69:3f:37:b3:3e:28:0c:a8:61:5d:49:a6:fc:66:23:f2: 74:d8:20:16:37:c5:59:ff:e2:ae:b0:0f:05:d6:3b:cd: fd:8c:b9:14:57:52:94:65:97:2c:8e:73:ab:99:e9:3c: 7e:74:60:ab:45:e9:bc:00:1d:7a:82:7b:79:41:60:07: 59:d1:b5:0a:02:49:09:12:31:0f:fc:df:46:34:9c:06: 8d:24:73:61:ed:0d:31:72:a2:82:77:3d:c7:6a:32:af: 0f:9e:c1:7b:a0:1d:10:21:bc:ad:56:4c:0e:f5:12:b6: e1:01:20:fe:e3:33:ec:81:6b:fd:d0:11:86:9e:dc:38: 41:d4:e5:ae:fe:09:bc:ef:80:24:7e:59:27:1a:40:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:fe:1b:e5:c7:ee:f4:ed:d0:f6:29:08:45:32:9a:e5: 76:c2:f1:87:47:ad:82:a0:ea:f8:cc:a7:7f:12:bc:51: ed:73:70:99:51:f8:3c:ea:1c:c7:8a:5e:16:ef:5c:34: 2a:30:77:13:df:4b:f1:15:5d:c8:13:83:6d:03:3e:31: cc:2d:d9:76:f7:f7:e1:e1:24:7b:0e:4c:c7:30:bd:0e: 14:a0:65:ca:52:30:83:fd:2f:46:a1:1b:65:22:1a:68: b9:02:09:81:33:54:63:24:f3:11:3d:7f:d2:b1:b7:0d: 23:19:f5:9b:cb:37:8b:36:d7:e5:fa:84:42:25:ec:de: 66:79:19:35:b4:e7:71:08:3f:f9:95:89:50:23:e2:78: ae:9f:3c:27:ed:62:ed:5d:e9:ab:eb:4e:c4:44:5b:25: 39:c9:f8:af:24:fd:ad:53:c7:32:66:78:a5:ce:db:55: b1:17:f4:be:8e:b2:4c:05:6e:69:31:a1:a5:6a:bc:bc: d0:68:31:57:12:ed:a9:de:82:4f:a5:f9:82:ca:ed:af: de:d1:1f:bf:9c:89:16:d2:b3:5e:41:c6:c8:b3:51:3d: 9f:bd:ba:70:30:9c:84:4f:27:43:46:2e:9d:8b:0a:8f: 37:b5:f1:7f:7c:7b:a2:d4:5e:a4:15:c4:82:4a:8e:fe Fingerprint (SHA-256): 0E:64:E8:0C:8C:40:6E:EF:62:89:A0:23:3D:41:5C:38:A6:D3:C0:58:E0:39:72:82:F9:C1:68:48:EA:C6:F3:36 Fingerprint (SHA1): 07:CE:CB:6C:F9:97:27:4E:23:7E:41:5F:2D:D6:79:AC:7E:FF:18:C6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #7009: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122766 (0x1e67db0e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Wed May 10 12:30:56 2017 Not After : Tue May 10 12:30:56 2067 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:ff:ba:ba:62:04:88:2b:f1:47:00:46:06:04:64:66: 9b:78:d7:88:6d:cd:97:c0:47:fe:33:33:e8:d0:5b:c9: 6c:74:88:94:9f:81:ff:25:77:fe:0b:0e:1c:f8:4c:9b: 7b:03:b7:64:fb:66:35:ec:9a:c5:60:af:68:ba:f6:c3: af:b8:61:2c:04:2d:b2:e7:be:bf:69:e6:c3:98:ab:08: 17:ac:3b:bb:48:57:65:43:ad:04:d7:e6:dc:be:3c:04: fc:8a:0f:49:49:8b:da:d9:96:56:40:d2:07:0f:bf:b3: c3:e8:c3:c0:ad:c3:7a:aa:57:a8:c5:90:7b:63:e1:06: 08:b6:90:68:89:0a:4d:af:5c:83:ef:28:8e:c3:53:ac: 46:f7:71:a2:72:aa:d9:fb:17:1b:02:99:f2:b0:48:73: 37:70:06:e5:3a:8f:2d:3a:a4:5e:17:5d:c4:d0:b3:ab: 59:db:0b:84:e4:6e:29:56:fe:50:04:4a:79:e6:91:fe: d5:aa:2e:b4:c9:17:32:30:c5:ea:cb:6e:e6:1e:d7:e0: e4:a6:20:db:83:20:38:bc:b4:77:82:08:84:ac:e0:5a: 43:7c:d8:6b:e8:9e:87:9a:2c:24:d9:2d:d6:7f:ca:f4: 7a:c5:ec:64:df:ae:99:07:da:4f:12:35:3d:16:a0:8b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 17:37:b8:5f:0f:af:00:75:c8:2d:34:43:bc:e1:ef:82: eb:f7:ce:36:5e:a1:f2:67:58:30:15:9a:45:8e:de:d4: f6:c3:ec:e8:bd:04:a3:9d:95:d5:fa:d1:c3:a4:00:fe: 14:ff:75:2b:aa:04:86:04:37:ea:08:08:8b:b5:e3:a8: e0:73:53:31:c8:15:df:e5:3f:c7:ce:ea:1c:fc:88:bf: 12:da:8f:3d:48:45:5e:41:82:06:c7:38:05:7d:69:5f: e4:33:cb:c0:f4:bd:13:a1:6d:e1:6e:74:fc:f2:db:c5: d3:32:68:70:09:57:cb:e7:96:54:1d:01:d1:37:45:a0: 5e:d5:7d:29:47:bd:63:2b:55:f7:ad:3d:4d:ce:10:c2: ac:b7:09:3e:38:61:75:85:50:76:bc:5a:f3:35:fc:cd: 39:63:ad:63:3f:f9:a6:e7:66:76:5f:38:86:e6:09:75: 8c:91:e0:6f:04:38:02:8d:c2:1f:8a:f6:14:0d:34:85: 92:b0:fb:e4:bf:48:56:b1:1d:2b:8e:59:c1:53:e8:75: 4f:2b:d5:c6:c3:05:a3:69:e6:d8:fe:6d:6b:57:69:e8: d5:6f:09:d7:d3:7d:fa:9b:5f:3f:22:6f:78:a0:d2:0b: ad:df:f5:28:6b:e3:c8:54:23:28:fd:2d:ec:5f:fa:2e Fingerprint (SHA-256): 3F:5E:25:BE:AE:81:92:B8:3B:81:33:D4:A8:D9:7D:D7:41:5A:A6:E5:A8:83:C8:E7:EB:CF:A3:C0:84:49:54:8C Fingerprint (SHA1): E0:98:96:84:55:FD:F3:E3:28:45:A7:7E:C0:3B:70:64:23:C5:56:63 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #7010: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122767 (0x1e67db0f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Wed May 10 12:30:57 2017 Not After : Tue May 10 12:30:57 2067 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:bb:0b:af:81:de:e7:0b:35:7f:b2:f0:d8:dd:2c:d2: 26:17:dd:8b:1e:46:de:5f:b6:dd:1d:e9:a9:a0:83:c6: 14:90:df:28:66:71:33:90:97:44:13:5b:77:e1:80:2c: c2:af:a5:45:0c:af:f8:53:10:58:51:b5:42:ad:41:60: 07:35:79:dc:03:5f:06:72:41:87:14:39:1d:36:ba:3a: 68:93:cf:a4:33:32:3f:0e:c0:df:5c:0b:cd:60:24:63: d6:77:ff:f0:1b:b7:fa:0e:83:24:2c:a7:b4:77:d5:71: 04:4d:65:0d:57:bb:07:d5:55:46:77:f5:b7:88:9b:2c: 48:b0:29:f7:8a:07:2a:80:10:b2:27:46:bf:64:40:08: b0:f7:87:f1:85:1c:e0:42:28:d1:32:c8:8c:89:b1:ce: fb:50:b3:7e:c9:3f:3b:af:f6:06:c3:2a:e0:01:dc:5a: c4:64:dd:9c:dc:b9:bb:d8:ed:7a:57:ce:bf:0a:c6:3e: e7:42:e5:b6:36:11:26:9d:16:84:9e:d5:c8:3b:ce:6a: af:2a:8a:4b:59:bb:b5:dd:e8:b6:5b:55:f4:5b:01:6e: 23:af:5f:74:8b:d2:6a:2a:74:24:65:f6:67:34:40:c7: fc:b7:ff:2c:54:98:90:c0:2b:74:67:1a:62:8a:c8:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:59:a1:02:d8:a0:54:8e:9a:8d:2c:68:b1:9d:c2:e1: 09:b6:86:d1:4a:b8:5a:b4:23:5c:90:34:b7:a9:58:0e: 39:1f:35:b8:97:1b:df:63:4e:0b:e7:9c:96:71:63:fa: 90:dd:61:72:76:11:d0:79:8c:7c:ed:57:03:42:00:eb: fa:30:4d:57:73:03:cf:a5:3e:b4:95:26:35:01:d7:1e: 03:93:c2:a5:af:53:fe:5d:6c:45:93:a2:42:29:75:4d: 7a:85:de:c1:8b:92:27:2a:06:1b:86:a3:8b:3c:1d:33: 75:68:8d:61:83:78:7e:ef:82:1c:6a:fa:c7:e0:4d:1c: 79:f0:54:96:07:e4:aa:06:83:e0:db:e0:6a:f4:05:23: af:2e:a7:32:f7:09:f3:4e:3b:91:75:2b:2f:b8:0c:44: e7:e6:8f:9e:05:06:45:32:8f:e9:ad:dd:4b:66:17:3d: 6f:0c:c5:f2:e9:22:ea:15:54:c4:93:af:2e:08:f2:49: 87:d7:98:06:4d:5e:34:e6:e2:a4:35:53:16:c4:bb:3d: 70:5f:1b:0c:76:9c:10:3c:85:e7:78:75:ae:f1:08:5c: 8a:21:b0:6e:01:cc:c2:b1:1c:54:a7:b1:ed:27:8a:59: 0c:c4:55:b1:21:17:73:5a:b7:75:88:13:55:32:ec:8e Fingerprint (SHA-256): 63:81:2A:F9:F9:F4:25:A5:73:97:99:05:DF:AD:83:69:6E:9A:32:90:08:DA:0C:DD:62:7D:89:B4:33:31:49:AC Fingerprint (SHA1): 17:FC:A1:32:A8:D6:BE:88:61:0C:89:FE:44:47:7D:3E:64:29:6F:3D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #7011: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122768 (0x1e67db10) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Wed May 10 12:30:58 2017 Not After : Tue May 10 12:30:58 2067 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:d3:20:e7:98:95:97:60:b9:01:d7:97:62:85:b6:eb: e0:38:e4:43:0b:e7:13:95:6b:c9:6f:e5:65:4c:32:47: c6:c5:e1:42:d2:1c:03:a1:31:9d:69:40:52:90:d9:ca: bb:8d:89:9b:5d:30:cb:e7:02:cf:85:db:9b:e2:aa:53: 1f:bd:d0:f0:38:83:29:e3:cb:ed:23:7f:19:fe:d3:f5: 15:ca:62:63:d2:e9:25:6e:fb:4e:0c:18:32:60:d0:21: 3f:1e:a3:2c:3b:e2:ac:0e:fd:9e:13:c5:cb:52:40:91: 53:5e:8e:6b:79:76:e0:96:65:69:b2:de:8b:03:48:04: 74:f5:d0:12:4a:43:1b:ff:4e:99:c7:5e:ae:dc:90:48: be:d5:f8:ea:0f:86:c6:78:de:44:15:60:39:71:47:49: 99:a4:a8:b4:43:f1:e5:51:b6:ce:d2:57:6a:62:45:bf: a8:a4:72:31:b1:a0:56:2b:64:f7:6c:82:4d:a0:e7:73: 85:98:0c:0f:4e:ff:2d:57:71:ad:26:02:5d:18:b1:c7: a4:61:5e:48:8d:96:e8:c5:44:f9:fa:1d:38:bd:1d:14: a2:d9:9f:a1:d6:eb:7a:84:e9:f1:68:b1:c5:29:ec:49: 1c:9d:86:d9:d3:82:d2:be:f3:13:6d:39:7d:f5:86:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:2c:74:4e:ed:29:85:67:0a:e6:ba:05:d5:3e:cc:ef: f4:5e:35:fe:da:e5:7c:aa:dd:b3:f4:bc:c1:4b:82:8d: 1c:03:6d:68:0e:67:df:f9:77:d5:85:a0:98:df:2f:88: d3:be:d5:f6:a4:b7:2a:08:4d:c2:78:56:f9:d5:c3:bd: e7:c7:3a:41:52:85:22:b1:2b:2d:8c:22:16:bf:b3:79: 1a:3d:22:28:67:8a:fe:d4:7a:69:12:80:5f:b9:85:c3: 10:25:20:e8:4e:1c:c5:bf:ff:bc:d1:2b:f5:85:6a:dc: fa:34:7c:60:36:18:39:1e:b6:40:27:c6:d4:68:9b:cc: 96:e7:3c:ba:58:fd:5e:71:53:39:b8:ab:77:04:ba:1d: 2a:83:9c:79:7c:fd:d6:88:dd:56:b3:22:5c:1f:a0:e0: 28:5d:fb:f6:7a:f2:b4:6c:24:1d:91:c8:ab:7a:9d:93: f2:a4:c7:83:11:32:e1:82:5d:1d:84:09:6f:08:5c:77: 15:8c:13:d4:77:da:87:0c:0d:1d:2f:55:94:b3:e0:da: a0:06:95:59:7c:1c:70:56:77:b7:3a:11:45:09:e9:f9: f2:57:10:59:25:0a:a8:05:63:54:e0:72:3d:dc:50:1e: 58:ea:10:bc:d8:a0:7b:a4:85:ef:08:9b:e0:b2:7f:b2 Fingerprint (SHA-256): 57:9A:D9:3C:98:C0:BA:B5:D2:A6:EF:A2:14:44:B4:91:2C:F6:81:BD:AC:BF:44:B5:F1:23:1E:D7:E5:26:77:CB Fingerprint (SHA1): DD:67:1C:D6:AB:1D:1D:CD:18:69:29:3C:B0:A9:CC:FC:94:64:B1:AC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #7012: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122769 (0x1e67db11) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Wed May 10 12:30:59 2017 Not After : Tue May 10 12:30:59 2067 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9e:a8:ae:19:74:59:49:97:16:f6:a6:34:6b:61:81:4c: 78:25:a6:70:33:44:fa:56:ca:d1:70:0c:ca:7b:85:c0: 97:a6:d7:58:de:57:45:b0:c6:c1:d0:ba:c8:df:da:77: ba:07:f9:54:82:c3:4d:88:58:49:c5:5e:3f:62:94:ef: 23:c9:63:45:8f:2f:3f:65:0a:a2:10:9e:92:df:5e:9f: 32:1d:f0:8d:9e:df:60:8f:54:b6:89:68:ed:e9:bf:c9: 11:2f:e4:f1:65:01:3d:8f:a6:9b:92:87:6c:d7:0c:91: 4a:4c:f9:f9:52:ab:b4:49:c9:f2:3f:41:55:76:85:17: 24:87:eb:78:11:39:5e:1a:aa:b1:ae:b8:f2:2a:e3:d5: 29:8c:d5:21:1a:44:62:4c:ca:80:c0:a8:ec:fe:dc:5c: 49:bb:4f:9b:6a:be:a9:72:dc:e4:a3:f8:01:20:b5:99: 5c:a8:1f:56:d7:5b:6a:da:20:25:1f:66:a8:56:1d:ce: 65:56:4f:5d:8c:4e:f8:70:7e:95:51:a0:5f:30:e6:0a: d8:7a:b9:a4:26:05:77:bf:58:65:ec:3d:f4:63:3d:6e: 96:63:78:f2:5e:3b:2d:6c:80:10:c1:12:1e:e0:e3:c5: 19:03:92:37:4c:96:83:b3:07:ad:2d:fa:6c:d0:eb:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:72:02:56:8f:68:ec:0e:1a:06:05:bb:d5:22:98:91: 18:a8:b2:0a:5c:bd:a7:1b:ac:3e:8d:8a:1d:ed:77:9f: 36:64:6f:e1:2c:8e:0c:c2:09:c0:d0:0f:85:d8:42:12: 1d:20:00:bd:66:f2:05:72:ba:2c:22:3c:cc:c0:20:a1: 74:51:3a:55:1e:91:2d:38:1a:45:1b:f6:70:80:eb:0b: fa:76:6d:12:d2:c3:55:6b:80:d6:de:27:77:b1:93:7c: cd:0e:8d:6d:84:5a:e3:d3:56:a2:47:01:94:bd:28:d7: 35:b1:a5:60:32:21:80:bd:da:ba:99:12:8f:4f:49:34: cb:54:cd:21:46:04:62:3b:af:ce:12:69:86:66:48:82: dd:58:cb:50:a7:b9:fd:a7:71:fc:4d:5e:69:42:90:44: e3:52:77:33:ea:8e:16:a2:58:ab:1b:0d:60:7e:4f:21: 07:a2:cb:2e:d6:ba:20:66:fc:db:b5:12:0c:ea:23:83: c4:2a:90:a7:ad:46:fe:1c:99:7b:5f:67:42:f6:87:88: 3b:b7:b2:af:f3:29:1e:a0:60:d9:18:e4:6a:b6:27:14: 0d:2c:37:5f:61:b0:ad:6c:ea:31:9e:bf:22:8a:32:1b: 23:68:2b:c5:2e:d9:95:5b:d0:d1:8c:b0:5e:fa:98:7e Fingerprint (SHA-256): A7:EB:3E:EA:AB:23:A3:BE:E3:51:65:AC:B2:64:A8:0D:14:46:2B:17:55:40:4F:16:DE:7E:4A:7F:62:76:34:BB Fingerprint (SHA1): FD:4B:62:04:AC:26:43:A2:55:29:05:D1:02:6F:CF:A3:30:8E:DD:EF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #7013: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #7014: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122784 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7015: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #7016: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7017: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7018: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510122785 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7019: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7020: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7021: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7022: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510122786 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7023: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7024: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #7025: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7026: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 510122787 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7027: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7028: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7029: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122784 (0x1e67db20) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:31:11 2017 Not After : Tue May 10 12:31:11 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:c3:19:c8:89:ce:5e:93:b8:e9:51:c1:34:c2:aa:58: ab:32:ea:ae:54:d3:ba:e4:e7:7c:d8:85:28:a0:01:47: 26:fa:d0:a0:8c:61:5d:77:4a:3b:41:92:c1:e8:31:95: f6:b3:34:de:c6:39:28:55:2b:d5:56:bb:25:34:d6:0f: 27:78:40:70:a6:38:43:bb:74:7a:90:bc:5a:54:fa:50: 32:6f:a1:ea:57:be:00:67:e8:54:53:39:3a:ed:9e:2f: 83:f6:a9:46:80:a7:47:b2:f2:be:14:92:b6:ca:3d:ed: 78:a1:35:f8:7a:e7:2f:a7:1e:7a:c9:14:26:79:dd:04: 57:d0:3f:9f:68:3a:1e:30:75:53:11:bb:c7:56:44:bf: 68:b5:34:0b:ff:90:7a:2a:ec:9e:46:42:16:d6:79:96: fa:ee:b0:38:7e:1d:43:a6:ab:e3:f5:7a:b6:1b:e4:84: 99:93:19:63:a0:8f:eb:90:c7:b2:b2:21:c9:05:ee:c1: f4:77:7c:27:ad:12:68:c4:11:88:24:56:68:7b:10:57: a9:5c:1a:8c:e4:0d:6f:da:63:8b:bd:74:22:0a:f2:ab: 8e:2b:68:7d:c2:06:58:05:f2:d6:2a:79:0e:e5:56:ee: c9:72:1b:28:b2:25:67:f9:51:bd:5d:38:dd:68:d4:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:05:44:22:d1:ff:4e:ab:ff:2a:3a:14:d9:c6:74:eb: c6:a8:25:29:fe:8c:a9:fa:b6:d4:c5:64:71:a7:fd:ba: 99:3c:63:75:da:31:60:3d:02:4a:a2:cc:9e:e1:05:62: 39:74:bc:22:a5:07:a3:5c:55:5f:91:e5:ba:7a:a9:0b: 72:13:22:74:db:7e:2c:f6:49:c5:2a:8a:e1:d9:c2:89: 68:10:1d:cb:76:31:8a:be:e9:91:82:ac:ff:96:c9:2f: 77:a1:67:d0:88:9c:0d:6e:e3:53:64:7e:30:4a:15:fe: e3:e0:63:52:a6:e5:f0:e1:f8:92:01:74:2e:73:46:23: 17:a8:ed:44:e9:f6:cb:87:2e:c5:48:b3:17:6d:d5:ad: 32:64:f4:64:be:80:cb:5c:da:4b:c8:62:56:2a:01:53: 79:a2:1c:4b:9b:b1:ac:ee:86:eb:90:0e:7f:90:82:f9: 22:bc:32:9b:ef:38:0e:15:b5:de:9e:bc:a1:06:9c:af: 12:fe:4d:f8:10:0d:c2:f2:44:fb:99:11:3e:f7:37:8b: a5:69:18:5d:c8:77:12:b3:36:23:d2:3b:fc:ff:b9:31: 81:56:fc:91:7a:83:b5:4c:8c:98:8a:b4:8b:39:28:fe: 2f:8b:de:70:7b:83:17:6a:4b:b6:c9:a2:e3:aa:d4:56 Fingerprint (SHA-256): 45:5A:5B:05:94:AE:A6:E7:16:A4:84:8B:37:32:90:BC:F9:60:82:1B:C6:8F:0B:CF:43:4B:90:55:A4:F7:E1:AE Fingerprint (SHA1): CA:A3:C2:7A:11:8C:22:C4:24:48:18:A4:C3:F8:4F:5B:6C:04:34:F7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7030: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7031: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122785 (0x1e67db21) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:31:11 2017 Not After : Tue May 10 12:31:11 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:9d:87:37:57:b5:58:97:2e:a6:da:07:d9:e0:3f:25: 67:bd:44:a4:f8:17:0f:34:19:38:cf:43:c8:79:c1:36: a0:33:e2:53:a1:45:08:77:b5:85:74:81:71:d0:33:b3: 59:c0:27:dc:b7:54:f2:79:f8:9c:a0:5a:bb:5d:bb:2d: c4:d2:b4:c9:1c:1c:be:4b:fb:0e:a5:8a:be:7f:de:20: 9c:30:2f:71:34:f4:a5:ea:28:fc:85:aa:1f:5a:e1:a4: 23:5e:7f:01:4e:c1:88:a8:77:6f:b4:64:f1:b7:5d:db: 51:68:ee:c3:bf:3c:b1:b2:67:dc:e6:07:9a:f6:8f:05: 54:3a:fa:4f:d3:ca:31:c0:c0:d2:fc:61:c5:52:e0:a8: 9c:87:5d:45:e7:ff:70:99:39:1e:d2:30:1e:ad:12:e9: cc:88:5b:ff:47:3e:8b:cf:51:47:d2:21:65:8d:70:8c: 58:bb:0c:e5:7c:ed:77:14:7d:5d:e7:26:2b:66:27:75: 59:42:7f:8a:3a:4b:be:b1:a6:1b:df:24:fb:65:96:1f: 0b:92:91:7c:66:52:cd:e3:26:72:f1:91:17:17:c2:36: 5e:11:7f:d0:6b:da:80:0f:49:dd:75:71:b6:45:dc:22: d2:7a:35:ef:28:3a:71:21:89:6b:62:d4:f2:db:ca:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:11:0c:e7:7b:a1:9a:1f:d0:ce:ac:f1:8c:9c:03:34: e3:c1:63:da:52:a9:25:d5:0e:4b:56:f8:cb:db:66:16: c4:c3:02:48:39:6b:20:74:74:6b:cb:ad:57:c0:4d:2f: 0a:06:85:d6:6d:42:99:30:3d:f4:65:e1:ef:60:3c:8f: f5:a4:56:b3:4c:fe:9c:20:fb:2b:c2:bb:36:be:1f:c9: 0d:5c:8c:c5:d8:65:2d:33:c1:ca:29:de:e9:a9:61:f0: 0e:5e:12:47:ac:d2:6b:0a:45:7d:9e:bb:c4:31:20:57: b3:15:84:9a:0e:39:0f:d8:fb:d5:7d:da:f3:49:62:95: 4f:b4:e4:08:a7:cf:14:75:ea:69:54:6e:b0:4c:08:8f: 9c:3a:34:11:88:e7:12:c6:51:33:cd:14:83:52:57:f8: 38:80:c7:84:1f:eb:72:9a:6a:54:9b:42:55:61:a0:d4: 88:b2:c6:c3:82:c7:21:42:b5:47:eb:77:d9:45:de:43: 02:fe:25:4f:d6:be:06:03:aa:ea:bf:a0:f7:30:0d:f2: 11:52:92:7a:99:0e:21:e6:f6:ed:b1:c5:96:85:95:9c: e8:f5:18:53:e6:ce:8a:fb:48:0a:62:9c:4c:c4:7f:85: c5:52:a0:cb:da:06:2f:a0:fa:3c:14:e4:7f:42:cf:8b Fingerprint (SHA-256): 08:C0:3E:26:CF:E4:EB:83:0C:D1:54:41:9F:03:8D:A2:EB:C1:C0:54:9A:F1:79:37:0B:80:73:FC:1A:85:36:58 Fingerprint (SHA1): CE:E3:8D:ED:04:A1:5A:18:1E:EA:34:98:21:E0:8C:E5:E6:E6:CD:76 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #7032: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7033: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122786 (0x1e67db22) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:31:13 2017 Not After : Tue May 10 12:31:13 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:f5:fa:dc:7d:95:c3:e2:fb:81:9d:04:6d:c2:30:57: 07:af:d1:cf:ce:3f:16:55:f2:29:58:e8:32:47:4c:33: f1:67:a5:69:13:71:61:15:72:b4:d9:4a:93:ac:36:6a: 9e:d2:8c:eb:e4:83:96:ea:6c:4e:7a:0a:ff:6b:1e:4e: c7:c6:0f:3b:4e:29:09:d1:96:c1:dd:25:e9:be:c1:4a: f4:71:91:43:98:9e:51:ba:43:5d:7e:c5:71:c6:76:60: a7:aa:51:5b:e1:63:1a:73:d0:e8:3c:8f:ed:8b:cb:ac: e1:80:a4:5f:85:92:09:72:e3:dc:8f:ed:f3:56:45:de: 47:34:cd:d9:90:cb:84:37:df:98:80:00:a0:25:de:61: c7:44:51:2a:5e:67:90:92:f9:d2:36:4e:30:61:6a:94: d0:ff:f8:e0:5b:8d:bb:3c:db:79:e5:e9:e6:f0:45:4b: a0:81:84:14:62:82:60:19:cd:1c:44:04:7f:32:aa:f1: 30:71:83:91:ab:e9:7d:08:0a:d2:11:36:ba:d7:ed:c6: c8:d4:7d:4c:45:52:48:bb:fa:76:e1:01:6e:74:f6:14: 36:ad:93:6f:a5:1f:a3:49:d4:3f:3f:53:c4:84:d5:43: 0f:94:7a:52:1c:33:73:d9:91:9f:de:55:3e:ca:c2:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:06:d6:dd:d5:6b:3d:fa:5a:c6:d9:c7:61:7f:e3:b2: 92:e3:6c:ae:3f:63:4d:a4:4f:09:c8:11:fb:cc:9b:74: e2:22:ae:42:3c:c4:b4:f8:73:1e:5c:ee:cb:26:ce:97: aa:8d:4f:07:6c:6c:53:7d:dd:90:b6:0c:d6:a5:07:67: b0:e2:44:2e:0a:cc:f9:05:0f:21:41:3b:da:3a:74:6f: c7:46:81:28:ca:e3:58:c6:88:bb:f1:ef:21:fe:32:6a: 09:16:da:ba:5c:63:c2:1b:16:9c:b6:6b:0b:21:88:3e: c5:e9:da:c2:c0:17:ea:c1:9c:34:84:40:98:91:b0:97: 59:52:00:4e:9d:97:92:2d:25:a0:ad:b0:ff:39:80:88: 3e:79:35:9d:27:48:a2:2a:53:b3:c5:ca:8d:23:f2:c3: 33:06:4e:f0:a1:5f:c8:c5:ae:9d:63:ad:6e:bb:30:95: 27:d7:56:e8:c3:5a:ff:97:8c:54:31:5c:93:12:3f:89: d5:5a:7d:6a:af:1d:34:cd:15:f8:bd:10:a4:92:1a:cd: 1a:ef:1c:5d:88:a1:0c:7b:8f:2d:b6:4a:1a:3d:92:94: d3:ae:9c:de:7f:60:47:a6:79:3e:60:4c:f1:58:51:59: c8:04:49:40:b6:c4:85:60:3f:f1:48:51:04:60:c0:96 Fingerprint (SHA-256): 7D:C2:22:B7:DB:79:DB:96:D7:89:E1:47:69:AE:CF:16:25:D3:FF:AA:3D:22:4F:AA:47:03:5D:D6:D8:90:8E:17 Fingerprint (SHA1): 1C:29:21:B5:8F:EE:EE:96:32:D1:FE:8D:07:EE:1B:3F:D1:CA:B9:90 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #7034: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7035: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #7036: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #7037: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #7038: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122784 (0x1e67db20) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:31:11 2017 Not After : Tue May 10 12:31:11 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:c3:19:c8:89:ce:5e:93:b8:e9:51:c1:34:c2:aa:58: ab:32:ea:ae:54:d3:ba:e4:e7:7c:d8:85:28:a0:01:47: 26:fa:d0:a0:8c:61:5d:77:4a:3b:41:92:c1:e8:31:95: f6:b3:34:de:c6:39:28:55:2b:d5:56:bb:25:34:d6:0f: 27:78:40:70:a6:38:43:bb:74:7a:90:bc:5a:54:fa:50: 32:6f:a1:ea:57:be:00:67:e8:54:53:39:3a:ed:9e:2f: 83:f6:a9:46:80:a7:47:b2:f2:be:14:92:b6:ca:3d:ed: 78:a1:35:f8:7a:e7:2f:a7:1e:7a:c9:14:26:79:dd:04: 57:d0:3f:9f:68:3a:1e:30:75:53:11:bb:c7:56:44:bf: 68:b5:34:0b:ff:90:7a:2a:ec:9e:46:42:16:d6:79:96: fa:ee:b0:38:7e:1d:43:a6:ab:e3:f5:7a:b6:1b:e4:84: 99:93:19:63:a0:8f:eb:90:c7:b2:b2:21:c9:05:ee:c1: f4:77:7c:27:ad:12:68:c4:11:88:24:56:68:7b:10:57: a9:5c:1a:8c:e4:0d:6f:da:63:8b:bd:74:22:0a:f2:ab: 8e:2b:68:7d:c2:06:58:05:f2:d6:2a:79:0e:e5:56:ee: c9:72:1b:28:b2:25:67:f9:51:bd:5d:38:dd:68:d4:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:05:44:22:d1:ff:4e:ab:ff:2a:3a:14:d9:c6:74:eb: c6:a8:25:29:fe:8c:a9:fa:b6:d4:c5:64:71:a7:fd:ba: 99:3c:63:75:da:31:60:3d:02:4a:a2:cc:9e:e1:05:62: 39:74:bc:22:a5:07:a3:5c:55:5f:91:e5:ba:7a:a9:0b: 72:13:22:74:db:7e:2c:f6:49:c5:2a:8a:e1:d9:c2:89: 68:10:1d:cb:76:31:8a:be:e9:91:82:ac:ff:96:c9:2f: 77:a1:67:d0:88:9c:0d:6e:e3:53:64:7e:30:4a:15:fe: e3:e0:63:52:a6:e5:f0:e1:f8:92:01:74:2e:73:46:23: 17:a8:ed:44:e9:f6:cb:87:2e:c5:48:b3:17:6d:d5:ad: 32:64:f4:64:be:80:cb:5c:da:4b:c8:62:56:2a:01:53: 79:a2:1c:4b:9b:b1:ac:ee:86:eb:90:0e:7f:90:82:f9: 22:bc:32:9b:ef:38:0e:15:b5:de:9e:bc:a1:06:9c:af: 12:fe:4d:f8:10:0d:c2:f2:44:fb:99:11:3e:f7:37:8b: a5:69:18:5d:c8:77:12:b3:36:23:d2:3b:fc:ff:b9:31: 81:56:fc:91:7a:83:b5:4c:8c:98:8a:b4:8b:39:28:fe: 2f:8b:de:70:7b:83:17:6a:4b:b6:c9:a2:e3:aa:d4:56 Fingerprint (SHA-256): 45:5A:5B:05:94:AE:A6:E7:16:A4:84:8B:37:32:90:BC:F9:60:82:1B:C6:8F:0B:CF:43:4B:90:55:A4:F7:E1:AE Fingerprint (SHA1): CA:A3:C2:7A:11:8C:22:C4:24:48:18:A4:C3:F8:4F:5B:6C:04:34:F7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7039: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7040: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122785 (0x1e67db21) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:31:11 2017 Not After : Tue May 10 12:31:11 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:9d:87:37:57:b5:58:97:2e:a6:da:07:d9:e0:3f:25: 67:bd:44:a4:f8:17:0f:34:19:38:cf:43:c8:79:c1:36: a0:33:e2:53:a1:45:08:77:b5:85:74:81:71:d0:33:b3: 59:c0:27:dc:b7:54:f2:79:f8:9c:a0:5a:bb:5d:bb:2d: c4:d2:b4:c9:1c:1c:be:4b:fb:0e:a5:8a:be:7f:de:20: 9c:30:2f:71:34:f4:a5:ea:28:fc:85:aa:1f:5a:e1:a4: 23:5e:7f:01:4e:c1:88:a8:77:6f:b4:64:f1:b7:5d:db: 51:68:ee:c3:bf:3c:b1:b2:67:dc:e6:07:9a:f6:8f:05: 54:3a:fa:4f:d3:ca:31:c0:c0:d2:fc:61:c5:52:e0:a8: 9c:87:5d:45:e7:ff:70:99:39:1e:d2:30:1e:ad:12:e9: cc:88:5b:ff:47:3e:8b:cf:51:47:d2:21:65:8d:70:8c: 58:bb:0c:e5:7c:ed:77:14:7d:5d:e7:26:2b:66:27:75: 59:42:7f:8a:3a:4b:be:b1:a6:1b:df:24:fb:65:96:1f: 0b:92:91:7c:66:52:cd:e3:26:72:f1:91:17:17:c2:36: 5e:11:7f:d0:6b:da:80:0f:49:dd:75:71:b6:45:dc:22: d2:7a:35:ef:28:3a:71:21:89:6b:62:d4:f2:db:ca:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:11:0c:e7:7b:a1:9a:1f:d0:ce:ac:f1:8c:9c:03:34: e3:c1:63:da:52:a9:25:d5:0e:4b:56:f8:cb:db:66:16: c4:c3:02:48:39:6b:20:74:74:6b:cb:ad:57:c0:4d:2f: 0a:06:85:d6:6d:42:99:30:3d:f4:65:e1:ef:60:3c:8f: f5:a4:56:b3:4c:fe:9c:20:fb:2b:c2:bb:36:be:1f:c9: 0d:5c:8c:c5:d8:65:2d:33:c1:ca:29:de:e9:a9:61:f0: 0e:5e:12:47:ac:d2:6b:0a:45:7d:9e:bb:c4:31:20:57: b3:15:84:9a:0e:39:0f:d8:fb:d5:7d:da:f3:49:62:95: 4f:b4:e4:08:a7:cf:14:75:ea:69:54:6e:b0:4c:08:8f: 9c:3a:34:11:88:e7:12:c6:51:33:cd:14:83:52:57:f8: 38:80:c7:84:1f:eb:72:9a:6a:54:9b:42:55:61:a0:d4: 88:b2:c6:c3:82:c7:21:42:b5:47:eb:77:d9:45:de:43: 02:fe:25:4f:d6:be:06:03:aa:ea:bf:a0:f7:30:0d:f2: 11:52:92:7a:99:0e:21:e6:f6:ed:b1:c5:96:85:95:9c: e8:f5:18:53:e6:ce:8a:fb:48:0a:62:9c:4c:c4:7f:85: c5:52:a0:cb:da:06:2f:a0:fa:3c:14:e4:7f:42:cf:8b Fingerprint (SHA-256): 08:C0:3E:26:CF:E4:EB:83:0C:D1:54:41:9F:03:8D:A2:EB:C1:C0:54:9A:F1:79:37:0B:80:73:FC:1A:85:36:58 Fingerprint (SHA1): CE:E3:8D:ED:04:A1:5A:18:1E:EA:34:98:21:E0:8C:E5:E6:E6:CD:76 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #7041: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7042: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122786 (0x1e67db22) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:31:13 2017 Not After : Tue May 10 12:31:13 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:f5:fa:dc:7d:95:c3:e2:fb:81:9d:04:6d:c2:30:57: 07:af:d1:cf:ce:3f:16:55:f2:29:58:e8:32:47:4c:33: f1:67:a5:69:13:71:61:15:72:b4:d9:4a:93:ac:36:6a: 9e:d2:8c:eb:e4:83:96:ea:6c:4e:7a:0a:ff:6b:1e:4e: c7:c6:0f:3b:4e:29:09:d1:96:c1:dd:25:e9:be:c1:4a: f4:71:91:43:98:9e:51:ba:43:5d:7e:c5:71:c6:76:60: a7:aa:51:5b:e1:63:1a:73:d0:e8:3c:8f:ed:8b:cb:ac: e1:80:a4:5f:85:92:09:72:e3:dc:8f:ed:f3:56:45:de: 47:34:cd:d9:90:cb:84:37:df:98:80:00:a0:25:de:61: c7:44:51:2a:5e:67:90:92:f9:d2:36:4e:30:61:6a:94: d0:ff:f8:e0:5b:8d:bb:3c:db:79:e5:e9:e6:f0:45:4b: a0:81:84:14:62:82:60:19:cd:1c:44:04:7f:32:aa:f1: 30:71:83:91:ab:e9:7d:08:0a:d2:11:36:ba:d7:ed:c6: c8:d4:7d:4c:45:52:48:bb:fa:76:e1:01:6e:74:f6:14: 36:ad:93:6f:a5:1f:a3:49:d4:3f:3f:53:c4:84:d5:43: 0f:94:7a:52:1c:33:73:d9:91:9f:de:55:3e:ca:c2:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:06:d6:dd:d5:6b:3d:fa:5a:c6:d9:c7:61:7f:e3:b2: 92:e3:6c:ae:3f:63:4d:a4:4f:09:c8:11:fb:cc:9b:74: e2:22:ae:42:3c:c4:b4:f8:73:1e:5c:ee:cb:26:ce:97: aa:8d:4f:07:6c:6c:53:7d:dd:90:b6:0c:d6:a5:07:67: b0:e2:44:2e:0a:cc:f9:05:0f:21:41:3b:da:3a:74:6f: c7:46:81:28:ca:e3:58:c6:88:bb:f1:ef:21:fe:32:6a: 09:16:da:ba:5c:63:c2:1b:16:9c:b6:6b:0b:21:88:3e: c5:e9:da:c2:c0:17:ea:c1:9c:34:84:40:98:91:b0:97: 59:52:00:4e:9d:97:92:2d:25:a0:ad:b0:ff:39:80:88: 3e:79:35:9d:27:48:a2:2a:53:b3:c5:ca:8d:23:f2:c3: 33:06:4e:f0:a1:5f:c8:c5:ae:9d:63:ad:6e:bb:30:95: 27:d7:56:e8:c3:5a:ff:97:8c:54:31:5c:93:12:3f:89: d5:5a:7d:6a:af:1d:34:cd:15:f8:bd:10:a4:92:1a:cd: 1a:ef:1c:5d:88:a1:0c:7b:8f:2d:b6:4a:1a:3d:92:94: d3:ae:9c:de:7f:60:47:a6:79:3e:60:4c:f1:58:51:59: c8:04:49:40:b6:c4:85:60:3f:f1:48:51:04:60:c0:96 Fingerprint (SHA-256): 7D:C2:22:B7:DB:79:DB:96:D7:89:E1:47:69:AE:CF:16:25:D3:FF:AA:3D:22:4F:AA:47:03:5D:D6:D8:90:8E:17 Fingerprint (SHA1): 1C:29:21:B5:8F:EE:EE:96:32:D1:FE:8D:07:EE:1B:3F:D1:CA:B9:90 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #7043: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7044: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #7045: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122788 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7046: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #7047: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7048: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7049: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510122789 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7050: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7051: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7052: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7053: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510122790 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7054: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7055: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #7056: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7057: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 510122791 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7058: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7059: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #7060: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7061: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 510122792 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7062: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7063: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7064: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122788 (0x1e67db24) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:31:19 2017 Not After : Tue May 10 12:31:19 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:1d:d7:31:2c:5a:e7:b2:e9:7b:96:38:89:7c:7b:6b: 49:1b:a4:90:66:c0:43:4d:85:c8:c0:c0:82:f0:3b:f1: 39:44:58:6e:cf:b5:12:14:51:63:ea:f5:07:2c:fd:46: b9:7a:22:49:18:bf:32:ed:6e:35:4a:86:7d:4a:92:d8: e0:2e:b2:44:79:d0:e0:c6:c7:9f:20:a6:e4:a6:95:33: 79:0c:5c:e4:b2:32:1a:f2:d7:b5:af:84:12:41:a9:d3: c1:8d:ee:3b:ca:50:a0:cf:7f:3c:d7:44:cb:de:5b:58: 85:d0:32:93:16:99:b8:51:13:95:1a:a4:25:0e:ef:e7: 5e:4f:35:31:2e:f2:71:08:07:82:d9:19:ee:13:5b:54: 75:e8:f9:7f:20:70:fc:c8:d5:8c:c0:f3:24:71:68:71: 95:53:39:4b:98:89:9b:41:a4:d5:e4:2b:1a:fd:31:9b: 63:2e:39:06:2d:15:48:6f:54:a4:5f:5d:b9:a6:2c:b3: 50:97:24:00:1c:5f:8c:f6:82:3a:e2:f6:01:cc:e8:3b: 24:06:8e:2d:d1:af:91:94:de:1b:65:5a:a6:f1:b5:0d: a1:16:15:9f:0b:33:36:f6:d7:3d:d7:27:b1:e3:07:37: 0f:97:d1:e6:b2:65:d4:94:8b:f9:be:ca:18:c0:68:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1e:bd:a2:7d:92:38:15:f2:93:12:21:0c:5b:12:38:ae: 93:9d:4f:51:d9:2c:29:e2:8d:48:79:55:08:3c:de:08: 97:1e:22:35:4d:9e:5d:9c:65:a3:fb:57:7a:7c:e5:39: a2:ff:1b:ab:a9:58:34:a2:3e:dd:4a:e1:9e:fb:7b:a2: 6c:d9:c9:f3:d2:b0:0f:9d:d1:0b:fc:79:45:8a:ef:e7: 72:1b:ca:f6:75:18:53:88:69:f4:d2:1d:4c:e9:4a:41: 54:1d:61:d8:27:41:55:01:3b:81:46:14:47:d5:68:16: ff:ec:3f:f1:4e:a8:5d:44:df:41:9e:3d:2b:f9:5b:9d: 6b:08:03:4c:e1:20:28:e5:fa:ed:b9:26:38:c7:24:4e: b2:1f:f8:a4:cb:a9:ad:37:17:70:67:55:f8:5d:da:47: 83:1d:d0:b0:a3:bd:1a:53:78:d9:fd:30:b2:e2:9e:e0: 3c:00:9d:b9:53:72:c2:e0:5f:55:61:50:9f:4b:f3:3e: c5:70:b4:fe:38:09:0e:12:2e:d8:af:ee:01:7d:88:af: d6:c0:79:0c:cb:c3:77:44:b0:4d:79:0d:a1:c9:0b:cb: 20:0f:8e:44:52:4e:d6:0c:8c:4f:fe:d8:fb:84:18:56: fc:06:60:c6:65:41:b4:13:cf:73:8f:e8:2e:41:40:03 Fingerprint (SHA-256): C3:A0:D1:A5:11:B3:18:8B:6C:72:AC:2A:CB:4F:BF:17:D0:F4:4A:4E:4F:C9:5C:3E:21:2E:41:9D:34:8D:9C:96 Fingerprint (SHA1): AA:B2:81:F9:07:9B:DD:FA:DB:96:CF:48:E1:76:98:9E:6E:C9:DD:E6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7065: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7066: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122789 (0x1e67db25) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:31:19 2017 Not After : Tue May 10 12:31:19 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:77:91:ab:6f:ac:e5:c2:49:b1:6e:95:54:cb:05:82: 17:9b:57:60:bb:d5:c2:72:27:f0:d0:b0:ed:ed:31:3a: 4d:8b:bf:67:8e:04:67:0b:e6:8f:56:6a:e8:76:97:43: 73:ee:70:ee:0b:62:c7:b5:52:94:b5:4a:02:7c:7a:9a: 73:a0:17:4b:87:83:88:82:b1:93:85:13:b7:2e:24:34: 62:62:56:44:74:98:6d:12:5f:9f:a5:c4:a7:a4:35:bf: c8:4a:a9:3e:ec:64:0c:29:cf:23:73:b3:4e:1c:56:0c: 65:28:c2:bf:5c:8a:18:d4:39:2f:15:e4:b8:72:d1:11: 80:43:ec:11:49:43:4b:ec:d5:c8:89:37:5b:f7:5f:32: 98:15:dc:af:c5:e5:bc:ee:14:78:aa:92:f5:47:d7:5f: 33:fc:39:36:28:4d:c4:fe:11:02:02:a9:9d:fd:77:23: a5:1e:df:89:b8:83:6f:0a:e1:c5:e8:25:4c:59:7f:a7: 5f:8d:fc:79:03:c2:35:22:32:90:62:8f:21:aa:bb:e7: 46:46:a0:d1:ab:3e:b8:f3:cb:e6:36:81:10:28:e7:7c: 0a:b9:3c:65:6a:76:29:a1:c5:fd:68:27:46:3c:3b:47: f2:9c:50:66:bf:e1:10:cc:53:b9:d8:45:84:1d:6f:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:15:f1:2b:48:53:fa:69:9e:32:21:2e:f8:53:1c:92: 0b:a7:5f:f6:a5:d7:ce:8e:7e:76:8e:3f:12:7c:21:90: 67:a0:1c:49:32:21:c2:50:0e:b8:76:36:1d:c4:f4:20: a9:ab:72:d1:c2:d4:d6:aa:3e:2d:4e:c1:b8:49:a8:db: 24:00:0d:b8:f1:1a:63:0a:f9:6f:57:d6:75:8c:90:f8: d2:89:c0:95:6d:12:5c:48:c6:c4:d3:0b:c4:ab:d8:4f: ce:71:25:2e:cc:aa:3f:7e:69:a8:da:00:e7:bc:c1:72: cb:3a:15:8e:94:69:df:8b:ac:b2:32:34:18:a6:b1:3c: 0d:55:5e:be:bb:27:51:74:2d:dd:0f:c6:71:f5:f2:91: 1f:6c:79:f0:22:07:9e:76:dc:b2:09:ae:37:7c:6f:a8: e6:bd:4a:bb:42:bc:ac:2c:55:d0:39:56:49:a4:8e:92: 43:aa:72:83:3d:3b:8c:69:08:49:17:be:ea:a7:48:c0: 6b:52:b1:6c:ee:66:a6:25:34:48:9e:d9:01:da:ee:b1: 53:eb:a2:d3:50:e7:3c:37:5e:f0:49:16:b8:fb:5c:f5: 1f:48:39:05:13:e2:31:05:1a:d8:b5:36:78:59:b5:2d: 82:8a:be:d1:dd:25:d7:32:c7:5f:0c:a3:47:47:38:1e Fingerprint (SHA-256): D5:2B:4A:3C:1E:07:FC:CE:65:D7:B0:B7:60:38:43:F8:A4:19:DF:5E:26:65:6E:2E:1E:A7:91:31:50:5B:FA:D9 Fingerprint (SHA1): C8:C0:39:C5:9B:3D:AD:D8:CB:00:96:AF:11:76:80:67:93:C7:50:2D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #7067: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7068: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122790 (0x1e67db26) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:31:21 2017 Not After : Tue May 10 12:31:21 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:91:aa:09:88:b7:ff:23:2b:8b:b1:b8:f7:ae:ad:b5: 67:17:20:35:9a:08:33:bb:47:95:63:99:1a:11:82:f4: ad:31:26:10:15:21:74:33:20:64:29:c7:50:79:df:0d: 4b:08:71:e3:7f:bb:f8:bd:30:01:9e:a0:ee:25:0a:92: 04:ac:87:4e:bc:62:ff:34:7c:b7:e6:1b:04:67:a4:e2: 57:1e:0e:0f:e7:83:f8:66:72:ca:02:d5:08:9e:94:d8: 5e:99:f5:6f:a8:d1:6c:5b:aa:6a:fb:69:5d:de:26:c4: b4:7e:fe:f0:b4:a0:6d:7d:e0:63:93:02:c9:38:d8:b3: 70:a3:60:81:d0:ad:8b:a4:3b:41:80:47:60:10:2e:dd: 42:19:b8:b7:7d:ac:d1:be:0f:88:70:5b:82:c6:ef:89: 2a:6e:2e:07:19:0e:6d:cc:c3:33:24:96:b1:e6:be:c6: c1:2f:2b:25:4a:3e:37:d4:ac:35:33:cf:bd:69:c1:b0: 31:b3:c7:80:9e:8b:95:77:2c:a7:ca:f8:5a:19:76:a6: 22:cb:90:b4:57:eb:90:10:92:83:94:a7:ba:b0:d6:63: 80:a3:d7:0b:34:8c:0f:f6:8b:18:43:10:aa:3f:21:6b: b2:6d:ae:ea:a5:52:6e:ba:ab:28:b4:cd:f8:46:0e:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:42:8a:0b:9a:71:11:e1:5c:e6:2b:bb:c7:a8:4f:4f: fc:07:56:a4:19:5a:8b:1b:ed:2c:46:02:e3:c0:c6:8c: 47:b4:2c:02:50:e3:a2:8d:58:4c:78:de:7f:12:df:74: 5f:5a:95:41:5a:59:12:97:86:53:72:48:4d:ed:ee:05: a6:3f:f8:41:6c:fc:3e:c2:3e:42:f5:bf:9f:3f:0d:c4: 83:1d:78:86:ed:ba:ed:45:d6:b7:2e:28:09:99:7d:15: dc:41:71:7f:85:0e:3e:1e:b3:7a:83:40:94:8f:00:22: d7:49:07:95:0a:49:de:75:89:26:35:7b:bc:da:14:0f: 6a:09:42:15:ab:a5:c1:4c:68:e7:67:df:2b:0a:a6:d1: 38:d5:4c:38:69:ce:9b:a3:82:56:ad:5f:5c:88:71:4f: 84:47:1a:24:fa:09:b7:ee:ff:71:a9:4e:69:1f:93:1c: df:ae:d3:45:3b:f9:8a:6b:dd:90:39:e0:77:03:39:7f: 39:71:d5:e2:63:db:8e:7c:9c:fb:91:4a:e2:0c:d4:24: 37:38:79:88:cb:67:4c:4e:89:68:bd:e4:79:8c:37:fa: 71:88:02:46:b5:f3:30:89:21:35:1c:2e:a0:24:8f:1d: de:97:ff:32:f6:52:6f:47:dc:74:22:aa:a5:2e:1b:42 Fingerprint (SHA-256): 9D:7C:52:B3:5F:DE:0E:80:64:BD:18:67:CC:50:D3:75:71:5A:91:A9:D3:06:0A:56:76:05:ED:25:EB:03:6D:18 Fingerprint (SHA1): C7:3A:E6:60:9E:E8:88:B6:07:43:D6:04:77:26:BA:B8:4E:E7:DD:C5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #7069: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7070: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #7071: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #7072: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #7073: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122788 (0x1e67db24) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:31:19 2017 Not After : Tue May 10 12:31:19 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:1d:d7:31:2c:5a:e7:b2:e9:7b:96:38:89:7c:7b:6b: 49:1b:a4:90:66:c0:43:4d:85:c8:c0:c0:82:f0:3b:f1: 39:44:58:6e:cf:b5:12:14:51:63:ea:f5:07:2c:fd:46: b9:7a:22:49:18:bf:32:ed:6e:35:4a:86:7d:4a:92:d8: e0:2e:b2:44:79:d0:e0:c6:c7:9f:20:a6:e4:a6:95:33: 79:0c:5c:e4:b2:32:1a:f2:d7:b5:af:84:12:41:a9:d3: c1:8d:ee:3b:ca:50:a0:cf:7f:3c:d7:44:cb:de:5b:58: 85:d0:32:93:16:99:b8:51:13:95:1a:a4:25:0e:ef:e7: 5e:4f:35:31:2e:f2:71:08:07:82:d9:19:ee:13:5b:54: 75:e8:f9:7f:20:70:fc:c8:d5:8c:c0:f3:24:71:68:71: 95:53:39:4b:98:89:9b:41:a4:d5:e4:2b:1a:fd:31:9b: 63:2e:39:06:2d:15:48:6f:54:a4:5f:5d:b9:a6:2c:b3: 50:97:24:00:1c:5f:8c:f6:82:3a:e2:f6:01:cc:e8:3b: 24:06:8e:2d:d1:af:91:94:de:1b:65:5a:a6:f1:b5:0d: a1:16:15:9f:0b:33:36:f6:d7:3d:d7:27:b1:e3:07:37: 0f:97:d1:e6:b2:65:d4:94:8b:f9:be:ca:18:c0:68:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1e:bd:a2:7d:92:38:15:f2:93:12:21:0c:5b:12:38:ae: 93:9d:4f:51:d9:2c:29:e2:8d:48:79:55:08:3c:de:08: 97:1e:22:35:4d:9e:5d:9c:65:a3:fb:57:7a:7c:e5:39: a2:ff:1b:ab:a9:58:34:a2:3e:dd:4a:e1:9e:fb:7b:a2: 6c:d9:c9:f3:d2:b0:0f:9d:d1:0b:fc:79:45:8a:ef:e7: 72:1b:ca:f6:75:18:53:88:69:f4:d2:1d:4c:e9:4a:41: 54:1d:61:d8:27:41:55:01:3b:81:46:14:47:d5:68:16: ff:ec:3f:f1:4e:a8:5d:44:df:41:9e:3d:2b:f9:5b:9d: 6b:08:03:4c:e1:20:28:e5:fa:ed:b9:26:38:c7:24:4e: b2:1f:f8:a4:cb:a9:ad:37:17:70:67:55:f8:5d:da:47: 83:1d:d0:b0:a3:bd:1a:53:78:d9:fd:30:b2:e2:9e:e0: 3c:00:9d:b9:53:72:c2:e0:5f:55:61:50:9f:4b:f3:3e: c5:70:b4:fe:38:09:0e:12:2e:d8:af:ee:01:7d:88:af: d6:c0:79:0c:cb:c3:77:44:b0:4d:79:0d:a1:c9:0b:cb: 20:0f:8e:44:52:4e:d6:0c:8c:4f:fe:d8:fb:84:18:56: fc:06:60:c6:65:41:b4:13:cf:73:8f:e8:2e:41:40:03 Fingerprint (SHA-256): C3:A0:D1:A5:11:B3:18:8B:6C:72:AC:2A:CB:4F:BF:17:D0:F4:4A:4E:4F:C9:5C:3E:21:2E:41:9D:34:8D:9C:96 Fingerprint (SHA1): AA:B2:81:F9:07:9B:DD:FA:DB:96:CF:48:E1:76:98:9E:6E:C9:DD:E6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7074: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7075: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122789 (0x1e67db25) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:31:19 2017 Not After : Tue May 10 12:31:19 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:77:91:ab:6f:ac:e5:c2:49:b1:6e:95:54:cb:05:82: 17:9b:57:60:bb:d5:c2:72:27:f0:d0:b0:ed:ed:31:3a: 4d:8b:bf:67:8e:04:67:0b:e6:8f:56:6a:e8:76:97:43: 73:ee:70:ee:0b:62:c7:b5:52:94:b5:4a:02:7c:7a:9a: 73:a0:17:4b:87:83:88:82:b1:93:85:13:b7:2e:24:34: 62:62:56:44:74:98:6d:12:5f:9f:a5:c4:a7:a4:35:bf: c8:4a:a9:3e:ec:64:0c:29:cf:23:73:b3:4e:1c:56:0c: 65:28:c2:bf:5c:8a:18:d4:39:2f:15:e4:b8:72:d1:11: 80:43:ec:11:49:43:4b:ec:d5:c8:89:37:5b:f7:5f:32: 98:15:dc:af:c5:e5:bc:ee:14:78:aa:92:f5:47:d7:5f: 33:fc:39:36:28:4d:c4:fe:11:02:02:a9:9d:fd:77:23: a5:1e:df:89:b8:83:6f:0a:e1:c5:e8:25:4c:59:7f:a7: 5f:8d:fc:79:03:c2:35:22:32:90:62:8f:21:aa:bb:e7: 46:46:a0:d1:ab:3e:b8:f3:cb:e6:36:81:10:28:e7:7c: 0a:b9:3c:65:6a:76:29:a1:c5:fd:68:27:46:3c:3b:47: f2:9c:50:66:bf:e1:10:cc:53:b9:d8:45:84:1d:6f:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:15:f1:2b:48:53:fa:69:9e:32:21:2e:f8:53:1c:92: 0b:a7:5f:f6:a5:d7:ce:8e:7e:76:8e:3f:12:7c:21:90: 67:a0:1c:49:32:21:c2:50:0e:b8:76:36:1d:c4:f4:20: a9:ab:72:d1:c2:d4:d6:aa:3e:2d:4e:c1:b8:49:a8:db: 24:00:0d:b8:f1:1a:63:0a:f9:6f:57:d6:75:8c:90:f8: d2:89:c0:95:6d:12:5c:48:c6:c4:d3:0b:c4:ab:d8:4f: ce:71:25:2e:cc:aa:3f:7e:69:a8:da:00:e7:bc:c1:72: cb:3a:15:8e:94:69:df:8b:ac:b2:32:34:18:a6:b1:3c: 0d:55:5e:be:bb:27:51:74:2d:dd:0f:c6:71:f5:f2:91: 1f:6c:79:f0:22:07:9e:76:dc:b2:09:ae:37:7c:6f:a8: e6:bd:4a:bb:42:bc:ac:2c:55:d0:39:56:49:a4:8e:92: 43:aa:72:83:3d:3b:8c:69:08:49:17:be:ea:a7:48:c0: 6b:52:b1:6c:ee:66:a6:25:34:48:9e:d9:01:da:ee:b1: 53:eb:a2:d3:50:e7:3c:37:5e:f0:49:16:b8:fb:5c:f5: 1f:48:39:05:13:e2:31:05:1a:d8:b5:36:78:59:b5:2d: 82:8a:be:d1:dd:25:d7:32:c7:5f:0c:a3:47:47:38:1e Fingerprint (SHA-256): D5:2B:4A:3C:1E:07:FC:CE:65:D7:B0:B7:60:38:43:F8:A4:19:DF:5E:26:65:6E:2E:1E:A7:91:31:50:5B:FA:D9 Fingerprint (SHA1): C8:C0:39:C5:9B:3D:AD:D8:CB:00:96:AF:11:76:80:67:93:C7:50:2D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #7076: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7077: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122790 (0x1e67db26) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:31:21 2017 Not After : Tue May 10 12:31:21 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:91:aa:09:88:b7:ff:23:2b:8b:b1:b8:f7:ae:ad:b5: 67:17:20:35:9a:08:33:bb:47:95:63:99:1a:11:82:f4: ad:31:26:10:15:21:74:33:20:64:29:c7:50:79:df:0d: 4b:08:71:e3:7f:bb:f8:bd:30:01:9e:a0:ee:25:0a:92: 04:ac:87:4e:bc:62:ff:34:7c:b7:e6:1b:04:67:a4:e2: 57:1e:0e:0f:e7:83:f8:66:72:ca:02:d5:08:9e:94:d8: 5e:99:f5:6f:a8:d1:6c:5b:aa:6a:fb:69:5d:de:26:c4: b4:7e:fe:f0:b4:a0:6d:7d:e0:63:93:02:c9:38:d8:b3: 70:a3:60:81:d0:ad:8b:a4:3b:41:80:47:60:10:2e:dd: 42:19:b8:b7:7d:ac:d1:be:0f:88:70:5b:82:c6:ef:89: 2a:6e:2e:07:19:0e:6d:cc:c3:33:24:96:b1:e6:be:c6: c1:2f:2b:25:4a:3e:37:d4:ac:35:33:cf:bd:69:c1:b0: 31:b3:c7:80:9e:8b:95:77:2c:a7:ca:f8:5a:19:76:a6: 22:cb:90:b4:57:eb:90:10:92:83:94:a7:ba:b0:d6:63: 80:a3:d7:0b:34:8c:0f:f6:8b:18:43:10:aa:3f:21:6b: b2:6d:ae:ea:a5:52:6e:ba:ab:28:b4:cd:f8:46:0e:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:42:8a:0b:9a:71:11:e1:5c:e6:2b:bb:c7:a8:4f:4f: fc:07:56:a4:19:5a:8b:1b:ed:2c:46:02:e3:c0:c6:8c: 47:b4:2c:02:50:e3:a2:8d:58:4c:78:de:7f:12:df:74: 5f:5a:95:41:5a:59:12:97:86:53:72:48:4d:ed:ee:05: a6:3f:f8:41:6c:fc:3e:c2:3e:42:f5:bf:9f:3f:0d:c4: 83:1d:78:86:ed:ba:ed:45:d6:b7:2e:28:09:99:7d:15: dc:41:71:7f:85:0e:3e:1e:b3:7a:83:40:94:8f:00:22: d7:49:07:95:0a:49:de:75:89:26:35:7b:bc:da:14:0f: 6a:09:42:15:ab:a5:c1:4c:68:e7:67:df:2b:0a:a6:d1: 38:d5:4c:38:69:ce:9b:a3:82:56:ad:5f:5c:88:71:4f: 84:47:1a:24:fa:09:b7:ee:ff:71:a9:4e:69:1f:93:1c: df:ae:d3:45:3b:f9:8a:6b:dd:90:39:e0:77:03:39:7f: 39:71:d5:e2:63:db:8e:7c:9c:fb:91:4a:e2:0c:d4:24: 37:38:79:88:cb:67:4c:4e:89:68:bd:e4:79:8c:37:fa: 71:88:02:46:b5:f3:30:89:21:35:1c:2e:a0:24:8f:1d: de:97:ff:32:f6:52:6f:47:dc:74:22:aa:a5:2e:1b:42 Fingerprint (SHA-256): 9D:7C:52:B3:5F:DE:0E:80:64:BD:18:67:CC:50:D3:75:71:5A:91:A9:D3:06:0A:56:76:05:ED:25:EB:03:6D:18 Fingerprint (SHA1): C7:3A:E6:60:9E:E8:88:B6:07:43:D6:04:77:26:BA:B8:4E:E7:DD:C5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #7078: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7079: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122788 (0x1e67db24) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:31:19 2017 Not After : Tue May 10 12:31:19 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:1d:d7:31:2c:5a:e7:b2:e9:7b:96:38:89:7c:7b:6b: 49:1b:a4:90:66:c0:43:4d:85:c8:c0:c0:82:f0:3b:f1: 39:44:58:6e:cf:b5:12:14:51:63:ea:f5:07:2c:fd:46: b9:7a:22:49:18:bf:32:ed:6e:35:4a:86:7d:4a:92:d8: e0:2e:b2:44:79:d0:e0:c6:c7:9f:20:a6:e4:a6:95:33: 79:0c:5c:e4:b2:32:1a:f2:d7:b5:af:84:12:41:a9:d3: c1:8d:ee:3b:ca:50:a0:cf:7f:3c:d7:44:cb:de:5b:58: 85:d0:32:93:16:99:b8:51:13:95:1a:a4:25:0e:ef:e7: 5e:4f:35:31:2e:f2:71:08:07:82:d9:19:ee:13:5b:54: 75:e8:f9:7f:20:70:fc:c8:d5:8c:c0:f3:24:71:68:71: 95:53:39:4b:98:89:9b:41:a4:d5:e4:2b:1a:fd:31:9b: 63:2e:39:06:2d:15:48:6f:54:a4:5f:5d:b9:a6:2c:b3: 50:97:24:00:1c:5f:8c:f6:82:3a:e2:f6:01:cc:e8:3b: 24:06:8e:2d:d1:af:91:94:de:1b:65:5a:a6:f1:b5:0d: a1:16:15:9f:0b:33:36:f6:d7:3d:d7:27:b1:e3:07:37: 0f:97:d1:e6:b2:65:d4:94:8b:f9:be:ca:18:c0:68:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1e:bd:a2:7d:92:38:15:f2:93:12:21:0c:5b:12:38:ae: 93:9d:4f:51:d9:2c:29:e2:8d:48:79:55:08:3c:de:08: 97:1e:22:35:4d:9e:5d:9c:65:a3:fb:57:7a:7c:e5:39: a2:ff:1b:ab:a9:58:34:a2:3e:dd:4a:e1:9e:fb:7b:a2: 6c:d9:c9:f3:d2:b0:0f:9d:d1:0b:fc:79:45:8a:ef:e7: 72:1b:ca:f6:75:18:53:88:69:f4:d2:1d:4c:e9:4a:41: 54:1d:61:d8:27:41:55:01:3b:81:46:14:47:d5:68:16: ff:ec:3f:f1:4e:a8:5d:44:df:41:9e:3d:2b:f9:5b:9d: 6b:08:03:4c:e1:20:28:e5:fa:ed:b9:26:38:c7:24:4e: b2:1f:f8:a4:cb:a9:ad:37:17:70:67:55:f8:5d:da:47: 83:1d:d0:b0:a3:bd:1a:53:78:d9:fd:30:b2:e2:9e:e0: 3c:00:9d:b9:53:72:c2:e0:5f:55:61:50:9f:4b:f3:3e: c5:70:b4:fe:38:09:0e:12:2e:d8:af:ee:01:7d:88:af: d6:c0:79:0c:cb:c3:77:44:b0:4d:79:0d:a1:c9:0b:cb: 20:0f:8e:44:52:4e:d6:0c:8c:4f:fe:d8:fb:84:18:56: fc:06:60:c6:65:41:b4:13:cf:73:8f:e8:2e:41:40:03 Fingerprint (SHA-256): C3:A0:D1:A5:11:B3:18:8B:6C:72:AC:2A:CB:4F:BF:17:D0:F4:4A:4E:4F:C9:5C:3E:21:2E:41:9D:34:8D:9C:96 Fingerprint (SHA1): AA:B2:81:F9:07:9B:DD:FA:DB:96:CF:48:E1:76:98:9E:6E:C9:DD:E6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7080: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122788 (0x1e67db24) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:31:19 2017 Not After : Tue May 10 12:31:19 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:1d:d7:31:2c:5a:e7:b2:e9:7b:96:38:89:7c:7b:6b: 49:1b:a4:90:66:c0:43:4d:85:c8:c0:c0:82:f0:3b:f1: 39:44:58:6e:cf:b5:12:14:51:63:ea:f5:07:2c:fd:46: b9:7a:22:49:18:bf:32:ed:6e:35:4a:86:7d:4a:92:d8: e0:2e:b2:44:79:d0:e0:c6:c7:9f:20:a6:e4:a6:95:33: 79:0c:5c:e4:b2:32:1a:f2:d7:b5:af:84:12:41:a9:d3: c1:8d:ee:3b:ca:50:a0:cf:7f:3c:d7:44:cb:de:5b:58: 85:d0:32:93:16:99:b8:51:13:95:1a:a4:25:0e:ef:e7: 5e:4f:35:31:2e:f2:71:08:07:82:d9:19:ee:13:5b:54: 75:e8:f9:7f:20:70:fc:c8:d5:8c:c0:f3:24:71:68:71: 95:53:39:4b:98:89:9b:41:a4:d5:e4:2b:1a:fd:31:9b: 63:2e:39:06:2d:15:48:6f:54:a4:5f:5d:b9:a6:2c:b3: 50:97:24:00:1c:5f:8c:f6:82:3a:e2:f6:01:cc:e8:3b: 24:06:8e:2d:d1:af:91:94:de:1b:65:5a:a6:f1:b5:0d: a1:16:15:9f:0b:33:36:f6:d7:3d:d7:27:b1:e3:07:37: 0f:97:d1:e6:b2:65:d4:94:8b:f9:be:ca:18:c0:68:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1e:bd:a2:7d:92:38:15:f2:93:12:21:0c:5b:12:38:ae: 93:9d:4f:51:d9:2c:29:e2:8d:48:79:55:08:3c:de:08: 97:1e:22:35:4d:9e:5d:9c:65:a3:fb:57:7a:7c:e5:39: a2:ff:1b:ab:a9:58:34:a2:3e:dd:4a:e1:9e:fb:7b:a2: 6c:d9:c9:f3:d2:b0:0f:9d:d1:0b:fc:79:45:8a:ef:e7: 72:1b:ca:f6:75:18:53:88:69:f4:d2:1d:4c:e9:4a:41: 54:1d:61:d8:27:41:55:01:3b:81:46:14:47:d5:68:16: ff:ec:3f:f1:4e:a8:5d:44:df:41:9e:3d:2b:f9:5b:9d: 6b:08:03:4c:e1:20:28:e5:fa:ed:b9:26:38:c7:24:4e: b2:1f:f8:a4:cb:a9:ad:37:17:70:67:55:f8:5d:da:47: 83:1d:d0:b0:a3:bd:1a:53:78:d9:fd:30:b2:e2:9e:e0: 3c:00:9d:b9:53:72:c2:e0:5f:55:61:50:9f:4b:f3:3e: c5:70:b4:fe:38:09:0e:12:2e:d8:af:ee:01:7d:88:af: d6:c0:79:0c:cb:c3:77:44:b0:4d:79:0d:a1:c9:0b:cb: 20:0f:8e:44:52:4e:d6:0c:8c:4f:fe:d8:fb:84:18:56: fc:06:60:c6:65:41:b4:13:cf:73:8f:e8:2e:41:40:03 Fingerprint (SHA-256): C3:A0:D1:A5:11:B3:18:8B:6C:72:AC:2A:CB:4F:BF:17:D0:F4:4A:4E:4F:C9:5C:3E:21:2E:41:9D:34:8D:9C:96 Fingerprint (SHA1): AA:B2:81:F9:07:9B:DD:FA:DB:96:CF:48:E1:76:98:9E:6E:C9:DD:E6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7081: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122789 (0x1e67db25) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:31:19 2017 Not After : Tue May 10 12:31:19 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:77:91:ab:6f:ac:e5:c2:49:b1:6e:95:54:cb:05:82: 17:9b:57:60:bb:d5:c2:72:27:f0:d0:b0:ed:ed:31:3a: 4d:8b:bf:67:8e:04:67:0b:e6:8f:56:6a:e8:76:97:43: 73:ee:70:ee:0b:62:c7:b5:52:94:b5:4a:02:7c:7a:9a: 73:a0:17:4b:87:83:88:82:b1:93:85:13:b7:2e:24:34: 62:62:56:44:74:98:6d:12:5f:9f:a5:c4:a7:a4:35:bf: c8:4a:a9:3e:ec:64:0c:29:cf:23:73:b3:4e:1c:56:0c: 65:28:c2:bf:5c:8a:18:d4:39:2f:15:e4:b8:72:d1:11: 80:43:ec:11:49:43:4b:ec:d5:c8:89:37:5b:f7:5f:32: 98:15:dc:af:c5:e5:bc:ee:14:78:aa:92:f5:47:d7:5f: 33:fc:39:36:28:4d:c4:fe:11:02:02:a9:9d:fd:77:23: a5:1e:df:89:b8:83:6f:0a:e1:c5:e8:25:4c:59:7f:a7: 5f:8d:fc:79:03:c2:35:22:32:90:62:8f:21:aa:bb:e7: 46:46:a0:d1:ab:3e:b8:f3:cb:e6:36:81:10:28:e7:7c: 0a:b9:3c:65:6a:76:29:a1:c5:fd:68:27:46:3c:3b:47: f2:9c:50:66:bf:e1:10:cc:53:b9:d8:45:84:1d:6f:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:15:f1:2b:48:53:fa:69:9e:32:21:2e:f8:53:1c:92: 0b:a7:5f:f6:a5:d7:ce:8e:7e:76:8e:3f:12:7c:21:90: 67:a0:1c:49:32:21:c2:50:0e:b8:76:36:1d:c4:f4:20: a9:ab:72:d1:c2:d4:d6:aa:3e:2d:4e:c1:b8:49:a8:db: 24:00:0d:b8:f1:1a:63:0a:f9:6f:57:d6:75:8c:90:f8: d2:89:c0:95:6d:12:5c:48:c6:c4:d3:0b:c4:ab:d8:4f: ce:71:25:2e:cc:aa:3f:7e:69:a8:da:00:e7:bc:c1:72: cb:3a:15:8e:94:69:df:8b:ac:b2:32:34:18:a6:b1:3c: 0d:55:5e:be:bb:27:51:74:2d:dd:0f:c6:71:f5:f2:91: 1f:6c:79:f0:22:07:9e:76:dc:b2:09:ae:37:7c:6f:a8: e6:bd:4a:bb:42:bc:ac:2c:55:d0:39:56:49:a4:8e:92: 43:aa:72:83:3d:3b:8c:69:08:49:17:be:ea:a7:48:c0: 6b:52:b1:6c:ee:66:a6:25:34:48:9e:d9:01:da:ee:b1: 53:eb:a2:d3:50:e7:3c:37:5e:f0:49:16:b8:fb:5c:f5: 1f:48:39:05:13:e2:31:05:1a:d8:b5:36:78:59:b5:2d: 82:8a:be:d1:dd:25:d7:32:c7:5f:0c:a3:47:47:38:1e Fingerprint (SHA-256): D5:2B:4A:3C:1E:07:FC:CE:65:D7:B0:B7:60:38:43:F8:A4:19:DF:5E:26:65:6E:2E:1E:A7:91:31:50:5B:FA:D9 Fingerprint (SHA1): C8:C0:39:C5:9B:3D:AD:D8:CB:00:96:AF:11:76:80:67:93:C7:50:2D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #7082: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122789 (0x1e67db25) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:31:19 2017 Not After : Tue May 10 12:31:19 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:77:91:ab:6f:ac:e5:c2:49:b1:6e:95:54:cb:05:82: 17:9b:57:60:bb:d5:c2:72:27:f0:d0:b0:ed:ed:31:3a: 4d:8b:bf:67:8e:04:67:0b:e6:8f:56:6a:e8:76:97:43: 73:ee:70:ee:0b:62:c7:b5:52:94:b5:4a:02:7c:7a:9a: 73:a0:17:4b:87:83:88:82:b1:93:85:13:b7:2e:24:34: 62:62:56:44:74:98:6d:12:5f:9f:a5:c4:a7:a4:35:bf: c8:4a:a9:3e:ec:64:0c:29:cf:23:73:b3:4e:1c:56:0c: 65:28:c2:bf:5c:8a:18:d4:39:2f:15:e4:b8:72:d1:11: 80:43:ec:11:49:43:4b:ec:d5:c8:89:37:5b:f7:5f:32: 98:15:dc:af:c5:e5:bc:ee:14:78:aa:92:f5:47:d7:5f: 33:fc:39:36:28:4d:c4:fe:11:02:02:a9:9d:fd:77:23: a5:1e:df:89:b8:83:6f:0a:e1:c5:e8:25:4c:59:7f:a7: 5f:8d:fc:79:03:c2:35:22:32:90:62:8f:21:aa:bb:e7: 46:46:a0:d1:ab:3e:b8:f3:cb:e6:36:81:10:28:e7:7c: 0a:b9:3c:65:6a:76:29:a1:c5:fd:68:27:46:3c:3b:47: f2:9c:50:66:bf:e1:10:cc:53:b9:d8:45:84:1d:6f:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:15:f1:2b:48:53:fa:69:9e:32:21:2e:f8:53:1c:92: 0b:a7:5f:f6:a5:d7:ce:8e:7e:76:8e:3f:12:7c:21:90: 67:a0:1c:49:32:21:c2:50:0e:b8:76:36:1d:c4:f4:20: a9:ab:72:d1:c2:d4:d6:aa:3e:2d:4e:c1:b8:49:a8:db: 24:00:0d:b8:f1:1a:63:0a:f9:6f:57:d6:75:8c:90:f8: d2:89:c0:95:6d:12:5c:48:c6:c4:d3:0b:c4:ab:d8:4f: ce:71:25:2e:cc:aa:3f:7e:69:a8:da:00:e7:bc:c1:72: cb:3a:15:8e:94:69:df:8b:ac:b2:32:34:18:a6:b1:3c: 0d:55:5e:be:bb:27:51:74:2d:dd:0f:c6:71:f5:f2:91: 1f:6c:79:f0:22:07:9e:76:dc:b2:09:ae:37:7c:6f:a8: e6:bd:4a:bb:42:bc:ac:2c:55:d0:39:56:49:a4:8e:92: 43:aa:72:83:3d:3b:8c:69:08:49:17:be:ea:a7:48:c0: 6b:52:b1:6c:ee:66:a6:25:34:48:9e:d9:01:da:ee:b1: 53:eb:a2:d3:50:e7:3c:37:5e:f0:49:16:b8:fb:5c:f5: 1f:48:39:05:13:e2:31:05:1a:d8:b5:36:78:59:b5:2d: 82:8a:be:d1:dd:25:d7:32:c7:5f:0c:a3:47:47:38:1e Fingerprint (SHA-256): D5:2B:4A:3C:1E:07:FC:CE:65:D7:B0:B7:60:38:43:F8:A4:19:DF:5E:26:65:6E:2E:1E:A7:91:31:50:5B:FA:D9 Fingerprint (SHA1): C8:C0:39:C5:9B:3D:AD:D8:CB:00:96:AF:11:76:80:67:93:C7:50:2D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #7083: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122790 (0x1e67db26) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:31:21 2017 Not After : Tue May 10 12:31:21 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:91:aa:09:88:b7:ff:23:2b:8b:b1:b8:f7:ae:ad:b5: 67:17:20:35:9a:08:33:bb:47:95:63:99:1a:11:82:f4: ad:31:26:10:15:21:74:33:20:64:29:c7:50:79:df:0d: 4b:08:71:e3:7f:bb:f8:bd:30:01:9e:a0:ee:25:0a:92: 04:ac:87:4e:bc:62:ff:34:7c:b7:e6:1b:04:67:a4:e2: 57:1e:0e:0f:e7:83:f8:66:72:ca:02:d5:08:9e:94:d8: 5e:99:f5:6f:a8:d1:6c:5b:aa:6a:fb:69:5d:de:26:c4: b4:7e:fe:f0:b4:a0:6d:7d:e0:63:93:02:c9:38:d8:b3: 70:a3:60:81:d0:ad:8b:a4:3b:41:80:47:60:10:2e:dd: 42:19:b8:b7:7d:ac:d1:be:0f:88:70:5b:82:c6:ef:89: 2a:6e:2e:07:19:0e:6d:cc:c3:33:24:96:b1:e6:be:c6: c1:2f:2b:25:4a:3e:37:d4:ac:35:33:cf:bd:69:c1:b0: 31:b3:c7:80:9e:8b:95:77:2c:a7:ca:f8:5a:19:76:a6: 22:cb:90:b4:57:eb:90:10:92:83:94:a7:ba:b0:d6:63: 80:a3:d7:0b:34:8c:0f:f6:8b:18:43:10:aa:3f:21:6b: b2:6d:ae:ea:a5:52:6e:ba:ab:28:b4:cd:f8:46:0e:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:42:8a:0b:9a:71:11:e1:5c:e6:2b:bb:c7:a8:4f:4f: fc:07:56:a4:19:5a:8b:1b:ed:2c:46:02:e3:c0:c6:8c: 47:b4:2c:02:50:e3:a2:8d:58:4c:78:de:7f:12:df:74: 5f:5a:95:41:5a:59:12:97:86:53:72:48:4d:ed:ee:05: a6:3f:f8:41:6c:fc:3e:c2:3e:42:f5:bf:9f:3f:0d:c4: 83:1d:78:86:ed:ba:ed:45:d6:b7:2e:28:09:99:7d:15: dc:41:71:7f:85:0e:3e:1e:b3:7a:83:40:94:8f:00:22: d7:49:07:95:0a:49:de:75:89:26:35:7b:bc:da:14:0f: 6a:09:42:15:ab:a5:c1:4c:68:e7:67:df:2b:0a:a6:d1: 38:d5:4c:38:69:ce:9b:a3:82:56:ad:5f:5c:88:71:4f: 84:47:1a:24:fa:09:b7:ee:ff:71:a9:4e:69:1f:93:1c: df:ae:d3:45:3b:f9:8a:6b:dd:90:39:e0:77:03:39:7f: 39:71:d5:e2:63:db:8e:7c:9c:fb:91:4a:e2:0c:d4:24: 37:38:79:88:cb:67:4c:4e:89:68:bd:e4:79:8c:37:fa: 71:88:02:46:b5:f3:30:89:21:35:1c:2e:a0:24:8f:1d: de:97:ff:32:f6:52:6f:47:dc:74:22:aa:a5:2e:1b:42 Fingerprint (SHA-256): 9D:7C:52:B3:5F:DE:0E:80:64:BD:18:67:CC:50:D3:75:71:5A:91:A9:D3:06:0A:56:76:05:ED:25:EB:03:6D:18 Fingerprint (SHA1): C7:3A:E6:60:9E:E8:88:B6:07:43:D6:04:77:26:BA:B8:4E:E7:DD:C5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #7084: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122790 (0x1e67db26) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:31:21 2017 Not After : Tue May 10 12:31:21 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:91:aa:09:88:b7:ff:23:2b:8b:b1:b8:f7:ae:ad:b5: 67:17:20:35:9a:08:33:bb:47:95:63:99:1a:11:82:f4: ad:31:26:10:15:21:74:33:20:64:29:c7:50:79:df:0d: 4b:08:71:e3:7f:bb:f8:bd:30:01:9e:a0:ee:25:0a:92: 04:ac:87:4e:bc:62:ff:34:7c:b7:e6:1b:04:67:a4:e2: 57:1e:0e:0f:e7:83:f8:66:72:ca:02:d5:08:9e:94:d8: 5e:99:f5:6f:a8:d1:6c:5b:aa:6a:fb:69:5d:de:26:c4: b4:7e:fe:f0:b4:a0:6d:7d:e0:63:93:02:c9:38:d8:b3: 70:a3:60:81:d0:ad:8b:a4:3b:41:80:47:60:10:2e:dd: 42:19:b8:b7:7d:ac:d1:be:0f:88:70:5b:82:c6:ef:89: 2a:6e:2e:07:19:0e:6d:cc:c3:33:24:96:b1:e6:be:c6: c1:2f:2b:25:4a:3e:37:d4:ac:35:33:cf:bd:69:c1:b0: 31:b3:c7:80:9e:8b:95:77:2c:a7:ca:f8:5a:19:76:a6: 22:cb:90:b4:57:eb:90:10:92:83:94:a7:ba:b0:d6:63: 80:a3:d7:0b:34:8c:0f:f6:8b:18:43:10:aa:3f:21:6b: b2:6d:ae:ea:a5:52:6e:ba:ab:28:b4:cd:f8:46:0e:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:42:8a:0b:9a:71:11:e1:5c:e6:2b:bb:c7:a8:4f:4f: fc:07:56:a4:19:5a:8b:1b:ed:2c:46:02:e3:c0:c6:8c: 47:b4:2c:02:50:e3:a2:8d:58:4c:78:de:7f:12:df:74: 5f:5a:95:41:5a:59:12:97:86:53:72:48:4d:ed:ee:05: a6:3f:f8:41:6c:fc:3e:c2:3e:42:f5:bf:9f:3f:0d:c4: 83:1d:78:86:ed:ba:ed:45:d6:b7:2e:28:09:99:7d:15: dc:41:71:7f:85:0e:3e:1e:b3:7a:83:40:94:8f:00:22: d7:49:07:95:0a:49:de:75:89:26:35:7b:bc:da:14:0f: 6a:09:42:15:ab:a5:c1:4c:68:e7:67:df:2b:0a:a6:d1: 38:d5:4c:38:69:ce:9b:a3:82:56:ad:5f:5c:88:71:4f: 84:47:1a:24:fa:09:b7:ee:ff:71:a9:4e:69:1f:93:1c: df:ae:d3:45:3b:f9:8a:6b:dd:90:39:e0:77:03:39:7f: 39:71:d5:e2:63:db:8e:7c:9c:fb:91:4a:e2:0c:d4:24: 37:38:79:88:cb:67:4c:4e:89:68:bd:e4:79:8c:37:fa: 71:88:02:46:b5:f3:30:89:21:35:1c:2e:a0:24:8f:1d: de:97:ff:32:f6:52:6f:47:dc:74:22:aa:a5:2e:1b:42 Fingerprint (SHA-256): 9D:7C:52:B3:5F:DE:0E:80:64:BD:18:67:CC:50:D3:75:71:5A:91:A9:D3:06:0A:56:76:05:ED:25:EB:03:6D:18 Fingerprint (SHA1): C7:3A:E6:60:9E:E8:88:B6:07:43:D6:04:77:26:BA:B8:4E:E7:DD:C5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #7085: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #7086: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122793 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7087: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #7088: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7089: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7090: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 510122794 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7091: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7092: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7093: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7094: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510122795 --extCP --extIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #7095: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7096: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #7097: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7098: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 510122796 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7099: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7100: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #7101: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7102: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 510122797 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7103: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7104: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #7105: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7106: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 510122798 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7107: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7108: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #7109: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7110: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 510122799 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7111: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7112: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7113: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #7114: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #7115: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #7116: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #7117: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122793 (0x1e67db29) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:31:28 2017 Not After : Tue May 10 12:31:28 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:01:37:65:ec:ec:b9:a3:75:27:c4:8c:19:0f:ad:13: fb:5f:e9:99:d5:31:60:b6:44:d5:93:c8:c6:75:0f:55: 4e:dc:77:cf:e5:1d:95:73:3b:38:6c:91:97:d1:31:15: a3:13:cc:1d:d0:07:f1:8f:d5:21:d8:c6:0b:dc:33:28: 5f:18:cb:e6:aa:88:55:a4:7c:1a:f9:9a:0a:1d:c4:f1: 1a:4e:3c:31:5d:de:1a:94:22:1a:43:de:32:45:1b:c3: b0:e7:df:48:8a:68:72:9c:33:f5:fa:6d:79:9d:33:fc: 9a:bd:5f:89:bf:a3:55:12:f6:3c:95:7b:59:9c:5c:fa: 77:a2:aa:f6:b4:ac:7a:36:3e:d6:72:84:d6:82:87:d8: d3:e9:ed:2e:d9:2f:58:ac:42:5e:4e:d9:e0:d8:27:95: a5:53:97:9a:40:b3:58:d3:d0:b8:97:c7:4e:c9:ad:ba: c2:1e:b0:fe:f0:89:6f:aa:a0:a1:a0:f2:56:4a:40:e7: af:25:07:bc:af:cf:2a:7c:ea:4b:0a:4a:48:ef:30:3a: 03:85:fa:8f:c8:ff:0c:bc:31:a2:6d:37:d5:b6:fa:71: 3a:f7:49:ea:a6:73:d6:b1:7f:86:a9:ab:6c:28:4b:dc: fd:8b:e8:3c:8a:a8:15:b4:90:d9:dc:ca:71:94:90:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:d2:b4:e9:bc:da:36:f5:ef:24:6c:e0:34:fb:d1:11: df:08:46:2f:8f:32:1b:40:ea:08:02:b5:d2:1b:98:01: da:87:63:2d:f7:f1:8c:dd:ee:97:cb:87:96:f8:33:f2: 42:a6:76:37:a4:4c:50:99:81:da:f2:d5:59:50:8b:26: ae:3e:fa:42:80:be:9f:96:ba:49:fb:9c:30:19:24:a7: a6:5a:d3:e2:fc:67:77:41:1c:0a:b4:62:a0:58:34:7a: 59:c4:76:f6:ce:43:79:6d:8e:4f:b7:88:86:9e:ee:ee: 52:59:1c:51:5f:b1:6c:09:15:c1:4a:ea:3a:b7:b3:54: 85:b5:09:e0:4b:8a:8f:50:b0:d3:a9:0e:a0:72:4e:7f: 6d:d3:b2:cf:0f:87:25:c8:2f:b4:1b:fd:76:83:5f:4f: 0a:00:0e:ae:a1:49:2f:ea:cd:41:55:db:7c:2a:b3:17: e3:a4:48:31:1d:b7:4c:01:88:27:18:42:16:2e:36:3a: f1:bb:6e:79:5d:6e:14:51:9c:b4:cb:6e:19:3f:7c:03: 9b:4d:b8:74:1c:db:27:ae:14:04:5e:cb:5f:6d:1b:0d: f3:fc:6d:5d:4c:d9:5a:ed:a2:ac:d3:3d:0e:3a:f0:72: 3a:b0:cb:f8:1f:8f:5d:4c:fb:e4:19:d1:89:16:f0:ea Fingerprint (SHA-256): 6D:BD:CD:B0:30:33:E8:5F:F9:DE:3F:73:C5:BC:A6:71:13:A4:1F:2B:EF:2C:52:F8:AE:0D:7F:67:83:52:59:F6 Fingerprint (SHA1): A4:FC:AD:EB:4E:8B:A3:CA:38:3B:74:00:06:E6:35:C2:6B:23:4B:4F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7118: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7119: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7120: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7121: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122793 (0x1e67db29) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:31:28 2017 Not After : Tue May 10 12:31:28 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:01:37:65:ec:ec:b9:a3:75:27:c4:8c:19:0f:ad:13: fb:5f:e9:99:d5:31:60:b6:44:d5:93:c8:c6:75:0f:55: 4e:dc:77:cf:e5:1d:95:73:3b:38:6c:91:97:d1:31:15: a3:13:cc:1d:d0:07:f1:8f:d5:21:d8:c6:0b:dc:33:28: 5f:18:cb:e6:aa:88:55:a4:7c:1a:f9:9a:0a:1d:c4:f1: 1a:4e:3c:31:5d:de:1a:94:22:1a:43:de:32:45:1b:c3: b0:e7:df:48:8a:68:72:9c:33:f5:fa:6d:79:9d:33:fc: 9a:bd:5f:89:bf:a3:55:12:f6:3c:95:7b:59:9c:5c:fa: 77:a2:aa:f6:b4:ac:7a:36:3e:d6:72:84:d6:82:87:d8: d3:e9:ed:2e:d9:2f:58:ac:42:5e:4e:d9:e0:d8:27:95: a5:53:97:9a:40:b3:58:d3:d0:b8:97:c7:4e:c9:ad:ba: c2:1e:b0:fe:f0:89:6f:aa:a0:a1:a0:f2:56:4a:40:e7: af:25:07:bc:af:cf:2a:7c:ea:4b:0a:4a:48:ef:30:3a: 03:85:fa:8f:c8:ff:0c:bc:31:a2:6d:37:d5:b6:fa:71: 3a:f7:49:ea:a6:73:d6:b1:7f:86:a9:ab:6c:28:4b:dc: fd:8b:e8:3c:8a:a8:15:b4:90:d9:dc:ca:71:94:90:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:d2:b4:e9:bc:da:36:f5:ef:24:6c:e0:34:fb:d1:11: df:08:46:2f:8f:32:1b:40:ea:08:02:b5:d2:1b:98:01: da:87:63:2d:f7:f1:8c:dd:ee:97:cb:87:96:f8:33:f2: 42:a6:76:37:a4:4c:50:99:81:da:f2:d5:59:50:8b:26: ae:3e:fa:42:80:be:9f:96:ba:49:fb:9c:30:19:24:a7: a6:5a:d3:e2:fc:67:77:41:1c:0a:b4:62:a0:58:34:7a: 59:c4:76:f6:ce:43:79:6d:8e:4f:b7:88:86:9e:ee:ee: 52:59:1c:51:5f:b1:6c:09:15:c1:4a:ea:3a:b7:b3:54: 85:b5:09:e0:4b:8a:8f:50:b0:d3:a9:0e:a0:72:4e:7f: 6d:d3:b2:cf:0f:87:25:c8:2f:b4:1b:fd:76:83:5f:4f: 0a:00:0e:ae:a1:49:2f:ea:cd:41:55:db:7c:2a:b3:17: e3:a4:48:31:1d:b7:4c:01:88:27:18:42:16:2e:36:3a: f1:bb:6e:79:5d:6e:14:51:9c:b4:cb:6e:19:3f:7c:03: 9b:4d:b8:74:1c:db:27:ae:14:04:5e:cb:5f:6d:1b:0d: f3:fc:6d:5d:4c:d9:5a:ed:a2:ac:d3:3d:0e:3a:f0:72: 3a:b0:cb:f8:1f:8f:5d:4c:fb:e4:19:d1:89:16:f0:ea Fingerprint (SHA-256): 6D:BD:CD:B0:30:33:E8:5F:F9:DE:3F:73:C5:BC:A6:71:13:A4:1F:2B:EF:2C:52:F8:AE:0D:7F:67:83:52:59:F6 Fingerprint (SHA1): A4:FC:AD:EB:4E:8B:A3:CA:38:3B:74:00:06:E6:35:C2:6B:23:4B:4F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7122: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7123: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #7124: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122800 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7125: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #7126: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7127: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7128: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 510122801 --extCP --extIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #7129: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7130: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #7131: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7132: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 510122802 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7133: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7134: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #7135: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7136: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 510122803 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7137: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7138: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #7139: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7140: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 510122804 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7141: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7142: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #7143: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7144: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 510122805 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7145: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7146: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #7147: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7148: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 510122806 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7149: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7150: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #7151: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7152: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 510122807 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7153: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7154: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #7155: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7156: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 510122808 --extCP --extIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #7157: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7158: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #7159: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7160: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 510122809 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7161: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7162: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #7163: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7164: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 510122810 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7165: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7166: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #7167: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7168: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 510122811 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7169: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7170: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #7171: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7172: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 510122812 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7173: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7174: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #7175: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7176: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 510122813 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7177: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7178: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #7179: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7180: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 510122814 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7181: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7182: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #7183: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7184: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 510122815 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7185: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7186: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #7187: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7188: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 510122816 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7189: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7190: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #7191: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7192: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 510122817 --extCP --extIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #7193: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7194: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #7195: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7196: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 510122818 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7197: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7198: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #7199: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7200: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 510122819 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7201: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7202: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #7203: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7204: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 510122820 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7205: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7206: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #7207: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7208: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 510122821 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7209: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7210: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #7211: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7212: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 510122822 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7213: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7214: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #7215: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7216: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 510122823 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7217: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7218: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #7219: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7220: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 510122824 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7221: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7222: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #7223: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7224: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 510122825 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7225: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7226: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #7227: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7228: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 510122826 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7229: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7230: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #7231: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7232: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 510122827 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7233: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7234: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #7235: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7236: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 510122828 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7237: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7238: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #7239: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7240: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 510122829 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7241: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7242: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7243: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122800 (0x1e67db30) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:31:37 2017 Not After : Tue May 10 12:31:37 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:cf:c2:93:e9:ba:e5:3a:7b:b0:57:a5:0e:e5:ba:bb: fb:7f:73:b1:b6:64:50:93:3f:d0:4b:2b:9d:1f:30:30: 2a:4b:31:b3:de:de:24:f4:c9:f6:b9:55:30:bd:3f:80: 64:28:9c:98:92:c0:a2:7d:7c:66:b7:a7:38:5e:99:91: 74:f4:f7:21:de:a9:c7:e3:74:7f:f0:13:70:68:a7:b4: 1c:11:f1:37:f6:a1:49:3e:6b:c7:cc:3c:e4:dc:38:bb: 72:a5:12:3b:6f:10:6e:8b:7f:89:ea:fd:61:1d:ee:d8: a0:ef:c7:45:7e:b3:77:1f:e0:20:10:bd:15:ea:21:99: f5:36:b5:1d:4a:7b:70:f9:af:10:6f:ac:3c:7e:22:10: 3c:fd:d4:e3:3e:d8:0c:5d:bc:4e:7a:88:cd:0e:36:c7: 31:42:cf:ab:d3:48:fe:76:2e:ca:cc:d3:77:dc:b9:f0: f0:b7:c0:e1:28:4a:a8:48:66:5c:a3:64:8e:83:86:fb: b0:b5:8c:ef:0d:f2:25:47:f5:35:83:ed:cd:e9:65:86: 7b:47:68:b2:0a:78:5a:56:ed:45:93:97:5e:8b:75:c4: 2e:07:ef:bc:73:5e:2a:d0:23:49:62:b5:05:2b:e7:50: 08:47:3d:86:e7:07:9e:f7:91:af:3f:6a:a8:87:36:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:de:a7:6c:7f:3f:3a:99:ab:6a:05:83:51:43:df:66: 60:e4:37:e8:f9:1f:e2:a4:82:32:19:0c:51:cb:10:78: a2:8f:a7:a4:44:9d:eb:ff:ea:01:b2:c5:3d:9b:7c:b4: d9:b3:69:39:13:b5:fd:73:08:4c:0b:6e:05:25:50:91: 15:2e:8f:11:6d:e6:a4:4a:eb:b3:59:67:81:99:a3:0a: 24:cb:03:81:4a:ed:31:d1:84:fd:59:8c:94:49:d8:4b: 98:81:40:65:5b:d6:5c:78:40:dc:e1:05:80:85:6c:dd: 27:f9:2e:b0:e8:87:42:b6:d8:c2:15:1d:2d:18:de:ee: f0:db:f3:d8:5d:4f:2b:cd:ac:28:97:c7:33:79:66:f4: b8:6a:bf:5c:de:1b:7e:18:c4:d9:83:6a:03:08:cc:35: 53:30:f1:fa:4a:1e:5c:b8:29:32:89:27:ea:fa:3c:e6: ac:3a:3e:24:1f:a8:b1:50:02:73:61:e2:13:49:fb:27: 7f:db:3e:77:23:54:fa:8f:d2:0d:e0:a8:eb:6c:ce:da: 78:e5:a9:6f:b2:a8:57:48:23:45:c7:14:a6:43:c1:e8: 99:48:fb:99:b8:12:b6:ae:01:fd:08:18:4b:27:ff:03: e1:53:22:e5:be:e1:e6:d5:86:aa:eb:ed:a5:ef:e7:ce Fingerprint (SHA-256): 29:F6:B9:29:EB:23:C1:07:95:DF:DC:D2:6F:E1:8D:CE:A0:05:16:C7:E3:18:06:CD:BD:C0:C3:12:F9:41:BC:C8 Fingerprint (SHA1): 74:D7:6A:F7:04:E5:93:34:17:8F:77:3A:F6:D4:19:1A:C6:A4:49:08 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7244: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7245: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122800 (0x1e67db30) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:31:37 2017 Not After : Tue May 10 12:31:37 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:cf:c2:93:e9:ba:e5:3a:7b:b0:57:a5:0e:e5:ba:bb: fb:7f:73:b1:b6:64:50:93:3f:d0:4b:2b:9d:1f:30:30: 2a:4b:31:b3:de:de:24:f4:c9:f6:b9:55:30:bd:3f:80: 64:28:9c:98:92:c0:a2:7d:7c:66:b7:a7:38:5e:99:91: 74:f4:f7:21:de:a9:c7:e3:74:7f:f0:13:70:68:a7:b4: 1c:11:f1:37:f6:a1:49:3e:6b:c7:cc:3c:e4:dc:38:bb: 72:a5:12:3b:6f:10:6e:8b:7f:89:ea:fd:61:1d:ee:d8: a0:ef:c7:45:7e:b3:77:1f:e0:20:10:bd:15:ea:21:99: f5:36:b5:1d:4a:7b:70:f9:af:10:6f:ac:3c:7e:22:10: 3c:fd:d4:e3:3e:d8:0c:5d:bc:4e:7a:88:cd:0e:36:c7: 31:42:cf:ab:d3:48:fe:76:2e:ca:cc:d3:77:dc:b9:f0: f0:b7:c0:e1:28:4a:a8:48:66:5c:a3:64:8e:83:86:fb: b0:b5:8c:ef:0d:f2:25:47:f5:35:83:ed:cd:e9:65:86: 7b:47:68:b2:0a:78:5a:56:ed:45:93:97:5e:8b:75:c4: 2e:07:ef:bc:73:5e:2a:d0:23:49:62:b5:05:2b:e7:50: 08:47:3d:86:e7:07:9e:f7:91:af:3f:6a:a8:87:36:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:de:a7:6c:7f:3f:3a:99:ab:6a:05:83:51:43:df:66: 60:e4:37:e8:f9:1f:e2:a4:82:32:19:0c:51:cb:10:78: a2:8f:a7:a4:44:9d:eb:ff:ea:01:b2:c5:3d:9b:7c:b4: d9:b3:69:39:13:b5:fd:73:08:4c:0b:6e:05:25:50:91: 15:2e:8f:11:6d:e6:a4:4a:eb:b3:59:67:81:99:a3:0a: 24:cb:03:81:4a:ed:31:d1:84:fd:59:8c:94:49:d8:4b: 98:81:40:65:5b:d6:5c:78:40:dc:e1:05:80:85:6c:dd: 27:f9:2e:b0:e8:87:42:b6:d8:c2:15:1d:2d:18:de:ee: f0:db:f3:d8:5d:4f:2b:cd:ac:28:97:c7:33:79:66:f4: b8:6a:bf:5c:de:1b:7e:18:c4:d9:83:6a:03:08:cc:35: 53:30:f1:fa:4a:1e:5c:b8:29:32:89:27:ea:fa:3c:e6: ac:3a:3e:24:1f:a8:b1:50:02:73:61:e2:13:49:fb:27: 7f:db:3e:77:23:54:fa:8f:d2:0d:e0:a8:eb:6c:ce:da: 78:e5:a9:6f:b2:a8:57:48:23:45:c7:14:a6:43:c1:e8: 99:48:fb:99:b8:12:b6:ae:01:fd:08:18:4b:27:ff:03: e1:53:22:e5:be:e1:e6:d5:86:aa:eb:ed:a5:ef:e7:ce Fingerprint (SHA-256): 29:F6:B9:29:EB:23:C1:07:95:DF:DC:D2:6F:E1:8D:CE:A0:05:16:C7:E3:18:06:CD:BD:C0:C3:12:F9:41:BC:C8 Fingerprint (SHA1): 74:D7:6A:F7:04:E5:93:34:17:8F:77:3A:F6:D4:19:1A:C6:A4:49:08 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7246: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7247: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7248: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7249: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122800 (0x1e67db30) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:31:37 2017 Not After : Tue May 10 12:31:37 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:cf:c2:93:e9:ba:e5:3a:7b:b0:57:a5:0e:e5:ba:bb: fb:7f:73:b1:b6:64:50:93:3f:d0:4b:2b:9d:1f:30:30: 2a:4b:31:b3:de:de:24:f4:c9:f6:b9:55:30:bd:3f:80: 64:28:9c:98:92:c0:a2:7d:7c:66:b7:a7:38:5e:99:91: 74:f4:f7:21:de:a9:c7:e3:74:7f:f0:13:70:68:a7:b4: 1c:11:f1:37:f6:a1:49:3e:6b:c7:cc:3c:e4:dc:38:bb: 72:a5:12:3b:6f:10:6e:8b:7f:89:ea:fd:61:1d:ee:d8: a0:ef:c7:45:7e:b3:77:1f:e0:20:10:bd:15:ea:21:99: f5:36:b5:1d:4a:7b:70:f9:af:10:6f:ac:3c:7e:22:10: 3c:fd:d4:e3:3e:d8:0c:5d:bc:4e:7a:88:cd:0e:36:c7: 31:42:cf:ab:d3:48:fe:76:2e:ca:cc:d3:77:dc:b9:f0: f0:b7:c0:e1:28:4a:a8:48:66:5c:a3:64:8e:83:86:fb: b0:b5:8c:ef:0d:f2:25:47:f5:35:83:ed:cd:e9:65:86: 7b:47:68:b2:0a:78:5a:56:ed:45:93:97:5e:8b:75:c4: 2e:07:ef:bc:73:5e:2a:d0:23:49:62:b5:05:2b:e7:50: 08:47:3d:86:e7:07:9e:f7:91:af:3f:6a:a8:87:36:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:de:a7:6c:7f:3f:3a:99:ab:6a:05:83:51:43:df:66: 60:e4:37:e8:f9:1f:e2:a4:82:32:19:0c:51:cb:10:78: a2:8f:a7:a4:44:9d:eb:ff:ea:01:b2:c5:3d:9b:7c:b4: d9:b3:69:39:13:b5:fd:73:08:4c:0b:6e:05:25:50:91: 15:2e:8f:11:6d:e6:a4:4a:eb:b3:59:67:81:99:a3:0a: 24:cb:03:81:4a:ed:31:d1:84:fd:59:8c:94:49:d8:4b: 98:81:40:65:5b:d6:5c:78:40:dc:e1:05:80:85:6c:dd: 27:f9:2e:b0:e8:87:42:b6:d8:c2:15:1d:2d:18:de:ee: f0:db:f3:d8:5d:4f:2b:cd:ac:28:97:c7:33:79:66:f4: b8:6a:bf:5c:de:1b:7e:18:c4:d9:83:6a:03:08:cc:35: 53:30:f1:fa:4a:1e:5c:b8:29:32:89:27:ea:fa:3c:e6: ac:3a:3e:24:1f:a8:b1:50:02:73:61:e2:13:49:fb:27: 7f:db:3e:77:23:54:fa:8f:d2:0d:e0:a8:eb:6c:ce:da: 78:e5:a9:6f:b2:a8:57:48:23:45:c7:14:a6:43:c1:e8: 99:48:fb:99:b8:12:b6:ae:01:fd:08:18:4b:27:ff:03: e1:53:22:e5:be:e1:e6:d5:86:aa:eb:ed:a5:ef:e7:ce Fingerprint (SHA-256): 29:F6:B9:29:EB:23:C1:07:95:DF:DC:D2:6F:E1:8D:CE:A0:05:16:C7:E3:18:06:CD:BD:C0:C3:12:F9:41:BC:C8 Fingerprint (SHA1): 74:D7:6A:F7:04:E5:93:34:17:8F:77:3A:F6:D4:19:1A:C6:A4:49:08 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7250: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7251: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7252: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7253: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122800 (0x1e67db30) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:31:37 2017 Not After : Tue May 10 12:31:37 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:cf:c2:93:e9:ba:e5:3a:7b:b0:57:a5:0e:e5:ba:bb: fb:7f:73:b1:b6:64:50:93:3f:d0:4b:2b:9d:1f:30:30: 2a:4b:31:b3:de:de:24:f4:c9:f6:b9:55:30:bd:3f:80: 64:28:9c:98:92:c0:a2:7d:7c:66:b7:a7:38:5e:99:91: 74:f4:f7:21:de:a9:c7:e3:74:7f:f0:13:70:68:a7:b4: 1c:11:f1:37:f6:a1:49:3e:6b:c7:cc:3c:e4:dc:38:bb: 72:a5:12:3b:6f:10:6e:8b:7f:89:ea:fd:61:1d:ee:d8: a0:ef:c7:45:7e:b3:77:1f:e0:20:10:bd:15:ea:21:99: f5:36:b5:1d:4a:7b:70:f9:af:10:6f:ac:3c:7e:22:10: 3c:fd:d4:e3:3e:d8:0c:5d:bc:4e:7a:88:cd:0e:36:c7: 31:42:cf:ab:d3:48:fe:76:2e:ca:cc:d3:77:dc:b9:f0: f0:b7:c0:e1:28:4a:a8:48:66:5c:a3:64:8e:83:86:fb: b0:b5:8c:ef:0d:f2:25:47:f5:35:83:ed:cd:e9:65:86: 7b:47:68:b2:0a:78:5a:56:ed:45:93:97:5e:8b:75:c4: 2e:07:ef:bc:73:5e:2a:d0:23:49:62:b5:05:2b:e7:50: 08:47:3d:86:e7:07:9e:f7:91:af:3f:6a:a8:87:36:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:de:a7:6c:7f:3f:3a:99:ab:6a:05:83:51:43:df:66: 60:e4:37:e8:f9:1f:e2:a4:82:32:19:0c:51:cb:10:78: a2:8f:a7:a4:44:9d:eb:ff:ea:01:b2:c5:3d:9b:7c:b4: d9:b3:69:39:13:b5:fd:73:08:4c:0b:6e:05:25:50:91: 15:2e:8f:11:6d:e6:a4:4a:eb:b3:59:67:81:99:a3:0a: 24:cb:03:81:4a:ed:31:d1:84:fd:59:8c:94:49:d8:4b: 98:81:40:65:5b:d6:5c:78:40:dc:e1:05:80:85:6c:dd: 27:f9:2e:b0:e8:87:42:b6:d8:c2:15:1d:2d:18:de:ee: f0:db:f3:d8:5d:4f:2b:cd:ac:28:97:c7:33:79:66:f4: b8:6a:bf:5c:de:1b:7e:18:c4:d9:83:6a:03:08:cc:35: 53:30:f1:fa:4a:1e:5c:b8:29:32:89:27:ea:fa:3c:e6: ac:3a:3e:24:1f:a8:b1:50:02:73:61:e2:13:49:fb:27: 7f:db:3e:77:23:54:fa:8f:d2:0d:e0:a8:eb:6c:ce:da: 78:e5:a9:6f:b2:a8:57:48:23:45:c7:14:a6:43:c1:e8: 99:48:fb:99:b8:12:b6:ae:01:fd:08:18:4b:27:ff:03: e1:53:22:e5:be:e1:e6:d5:86:aa:eb:ed:a5:ef:e7:ce Fingerprint (SHA-256): 29:F6:B9:29:EB:23:C1:07:95:DF:DC:D2:6F:E1:8D:CE:A0:05:16:C7:E3:18:06:CD:BD:C0:C3:12:F9:41:BC:C8 Fingerprint (SHA1): 74:D7:6A:F7:04:E5:93:34:17:8F:77:3A:F6:D4:19:1A:C6:A4:49:08 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7254: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122800 (0x1e67db30) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:31:37 2017 Not After : Tue May 10 12:31:37 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:cf:c2:93:e9:ba:e5:3a:7b:b0:57:a5:0e:e5:ba:bb: fb:7f:73:b1:b6:64:50:93:3f:d0:4b:2b:9d:1f:30:30: 2a:4b:31:b3:de:de:24:f4:c9:f6:b9:55:30:bd:3f:80: 64:28:9c:98:92:c0:a2:7d:7c:66:b7:a7:38:5e:99:91: 74:f4:f7:21:de:a9:c7:e3:74:7f:f0:13:70:68:a7:b4: 1c:11:f1:37:f6:a1:49:3e:6b:c7:cc:3c:e4:dc:38:bb: 72:a5:12:3b:6f:10:6e:8b:7f:89:ea:fd:61:1d:ee:d8: a0:ef:c7:45:7e:b3:77:1f:e0:20:10:bd:15:ea:21:99: f5:36:b5:1d:4a:7b:70:f9:af:10:6f:ac:3c:7e:22:10: 3c:fd:d4:e3:3e:d8:0c:5d:bc:4e:7a:88:cd:0e:36:c7: 31:42:cf:ab:d3:48:fe:76:2e:ca:cc:d3:77:dc:b9:f0: f0:b7:c0:e1:28:4a:a8:48:66:5c:a3:64:8e:83:86:fb: b0:b5:8c:ef:0d:f2:25:47:f5:35:83:ed:cd:e9:65:86: 7b:47:68:b2:0a:78:5a:56:ed:45:93:97:5e:8b:75:c4: 2e:07:ef:bc:73:5e:2a:d0:23:49:62:b5:05:2b:e7:50: 08:47:3d:86:e7:07:9e:f7:91:af:3f:6a:a8:87:36:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:de:a7:6c:7f:3f:3a:99:ab:6a:05:83:51:43:df:66: 60:e4:37:e8:f9:1f:e2:a4:82:32:19:0c:51:cb:10:78: a2:8f:a7:a4:44:9d:eb:ff:ea:01:b2:c5:3d:9b:7c:b4: d9:b3:69:39:13:b5:fd:73:08:4c:0b:6e:05:25:50:91: 15:2e:8f:11:6d:e6:a4:4a:eb:b3:59:67:81:99:a3:0a: 24:cb:03:81:4a:ed:31:d1:84:fd:59:8c:94:49:d8:4b: 98:81:40:65:5b:d6:5c:78:40:dc:e1:05:80:85:6c:dd: 27:f9:2e:b0:e8:87:42:b6:d8:c2:15:1d:2d:18:de:ee: f0:db:f3:d8:5d:4f:2b:cd:ac:28:97:c7:33:79:66:f4: b8:6a:bf:5c:de:1b:7e:18:c4:d9:83:6a:03:08:cc:35: 53:30:f1:fa:4a:1e:5c:b8:29:32:89:27:ea:fa:3c:e6: ac:3a:3e:24:1f:a8:b1:50:02:73:61:e2:13:49:fb:27: 7f:db:3e:77:23:54:fa:8f:d2:0d:e0:a8:eb:6c:ce:da: 78:e5:a9:6f:b2:a8:57:48:23:45:c7:14:a6:43:c1:e8: 99:48:fb:99:b8:12:b6:ae:01:fd:08:18:4b:27:ff:03: e1:53:22:e5:be:e1:e6:d5:86:aa:eb:ed:a5:ef:e7:ce Fingerprint (SHA-256): 29:F6:B9:29:EB:23:C1:07:95:DF:DC:D2:6F:E1:8D:CE:A0:05:16:C7:E3:18:06:CD:BD:C0:C3:12:F9:41:BC:C8 Fingerprint (SHA1): 74:D7:6A:F7:04:E5:93:34:17:8F:77:3A:F6:D4:19:1A:C6:A4:49:08 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7255: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7256: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122800 (0x1e67db30) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:31:37 2017 Not After : Tue May 10 12:31:37 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:cf:c2:93:e9:ba:e5:3a:7b:b0:57:a5:0e:e5:ba:bb: fb:7f:73:b1:b6:64:50:93:3f:d0:4b:2b:9d:1f:30:30: 2a:4b:31:b3:de:de:24:f4:c9:f6:b9:55:30:bd:3f:80: 64:28:9c:98:92:c0:a2:7d:7c:66:b7:a7:38:5e:99:91: 74:f4:f7:21:de:a9:c7:e3:74:7f:f0:13:70:68:a7:b4: 1c:11:f1:37:f6:a1:49:3e:6b:c7:cc:3c:e4:dc:38:bb: 72:a5:12:3b:6f:10:6e:8b:7f:89:ea:fd:61:1d:ee:d8: a0:ef:c7:45:7e:b3:77:1f:e0:20:10:bd:15:ea:21:99: f5:36:b5:1d:4a:7b:70:f9:af:10:6f:ac:3c:7e:22:10: 3c:fd:d4:e3:3e:d8:0c:5d:bc:4e:7a:88:cd:0e:36:c7: 31:42:cf:ab:d3:48:fe:76:2e:ca:cc:d3:77:dc:b9:f0: f0:b7:c0:e1:28:4a:a8:48:66:5c:a3:64:8e:83:86:fb: b0:b5:8c:ef:0d:f2:25:47:f5:35:83:ed:cd:e9:65:86: 7b:47:68:b2:0a:78:5a:56:ed:45:93:97:5e:8b:75:c4: 2e:07:ef:bc:73:5e:2a:d0:23:49:62:b5:05:2b:e7:50: 08:47:3d:86:e7:07:9e:f7:91:af:3f:6a:a8:87:36:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:de:a7:6c:7f:3f:3a:99:ab:6a:05:83:51:43:df:66: 60:e4:37:e8:f9:1f:e2:a4:82:32:19:0c:51:cb:10:78: a2:8f:a7:a4:44:9d:eb:ff:ea:01:b2:c5:3d:9b:7c:b4: d9:b3:69:39:13:b5:fd:73:08:4c:0b:6e:05:25:50:91: 15:2e:8f:11:6d:e6:a4:4a:eb:b3:59:67:81:99:a3:0a: 24:cb:03:81:4a:ed:31:d1:84:fd:59:8c:94:49:d8:4b: 98:81:40:65:5b:d6:5c:78:40:dc:e1:05:80:85:6c:dd: 27:f9:2e:b0:e8:87:42:b6:d8:c2:15:1d:2d:18:de:ee: f0:db:f3:d8:5d:4f:2b:cd:ac:28:97:c7:33:79:66:f4: b8:6a:bf:5c:de:1b:7e:18:c4:d9:83:6a:03:08:cc:35: 53:30:f1:fa:4a:1e:5c:b8:29:32:89:27:ea:fa:3c:e6: ac:3a:3e:24:1f:a8:b1:50:02:73:61:e2:13:49:fb:27: 7f:db:3e:77:23:54:fa:8f:d2:0d:e0:a8:eb:6c:ce:da: 78:e5:a9:6f:b2:a8:57:48:23:45:c7:14:a6:43:c1:e8: 99:48:fb:99:b8:12:b6:ae:01:fd:08:18:4b:27:ff:03: e1:53:22:e5:be:e1:e6:d5:86:aa:eb:ed:a5:ef:e7:ce Fingerprint (SHA-256): 29:F6:B9:29:EB:23:C1:07:95:DF:DC:D2:6F:E1:8D:CE:A0:05:16:C7:E3:18:06:CD:BD:C0:C3:12:F9:41:BC:C8 Fingerprint (SHA1): 74:D7:6A:F7:04:E5:93:34:17:8F:77:3A:F6:D4:19:1A:C6:A4:49:08 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7257: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7258: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7259: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7260: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122800 (0x1e67db30) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:31:37 2017 Not After : Tue May 10 12:31:37 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:cf:c2:93:e9:ba:e5:3a:7b:b0:57:a5:0e:e5:ba:bb: fb:7f:73:b1:b6:64:50:93:3f:d0:4b:2b:9d:1f:30:30: 2a:4b:31:b3:de:de:24:f4:c9:f6:b9:55:30:bd:3f:80: 64:28:9c:98:92:c0:a2:7d:7c:66:b7:a7:38:5e:99:91: 74:f4:f7:21:de:a9:c7:e3:74:7f:f0:13:70:68:a7:b4: 1c:11:f1:37:f6:a1:49:3e:6b:c7:cc:3c:e4:dc:38:bb: 72:a5:12:3b:6f:10:6e:8b:7f:89:ea:fd:61:1d:ee:d8: a0:ef:c7:45:7e:b3:77:1f:e0:20:10:bd:15:ea:21:99: f5:36:b5:1d:4a:7b:70:f9:af:10:6f:ac:3c:7e:22:10: 3c:fd:d4:e3:3e:d8:0c:5d:bc:4e:7a:88:cd:0e:36:c7: 31:42:cf:ab:d3:48:fe:76:2e:ca:cc:d3:77:dc:b9:f0: f0:b7:c0:e1:28:4a:a8:48:66:5c:a3:64:8e:83:86:fb: b0:b5:8c:ef:0d:f2:25:47:f5:35:83:ed:cd:e9:65:86: 7b:47:68:b2:0a:78:5a:56:ed:45:93:97:5e:8b:75:c4: 2e:07:ef:bc:73:5e:2a:d0:23:49:62:b5:05:2b:e7:50: 08:47:3d:86:e7:07:9e:f7:91:af:3f:6a:a8:87:36:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:de:a7:6c:7f:3f:3a:99:ab:6a:05:83:51:43:df:66: 60:e4:37:e8:f9:1f:e2:a4:82:32:19:0c:51:cb:10:78: a2:8f:a7:a4:44:9d:eb:ff:ea:01:b2:c5:3d:9b:7c:b4: d9:b3:69:39:13:b5:fd:73:08:4c:0b:6e:05:25:50:91: 15:2e:8f:11:6d:e6:a4:4a:eb:b3:59:67:81:99:a3:0a: 24:cb:03:81:4a:ed:31:d1:84:fd:59:8c:94:49:d8:4b: 98:81:40:65:5b:d6:5c:78:40:dc:e1:05:80:85:6c:dd: 27:f9:2e:b0:e8:87:42:b6:d8:c2:15:1d:2d:18:de:ee: f0:db:f3:d8:5d:4f:2b:cd:ac:28:97:c7:33:79:66:f4: b8:6a:bf:5c:de:1b:7e:18:c4:d9:83:6a:03:08:cc:35: 53:30:f1:fa:4a:1e:5c:b8:29:32:89:27:ea:fa:3c:e6: ac:3a:3e:24:1f:a8:b1:50:02:73:61:e2:13:49:fb:27: 7f:db:3e:77:23:54:fa:8f:d2:0d:e0:a8:eb:6c:ce:da: 78:e5:a9:6f:b2:a8:57:48:23:45:c7:14:a6:43:c1:e8: 99:48:fb:99:b8:12:b6:ae:01:fd:08:18:4b:27:ff:03: e1:53:22:e5:be:e1:e6:d5:86:aa:eb:ed:a5:ef:e7:ce Fingerprint (SHA-256): 29:F6:B9:29:EB:23:C1:07:95:DF:DC:D2:6F:E1:8D:CE:A0:05:16:C7:E3:18:06:CD:BD:C0:C3:12:F9:41:BC:C8 Fingerprint (SHA1): 74:D7:6A:F7:04:E5:93:34:17:8F:77:3A:F6:D4:19:1A:C6:A4:49:08 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7261: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122800 (0x1e67db30) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:31:37 2017 Not After : Tue May 10 12:31:37 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:cf:c2:93:e9:ba:e5:3a:7b:b0:57:a5:0e:e5:ba:bb: fb:7f:73:b1:b6:64:50:93:3f:d0:4b:2b:9d:1f:30:30: 2a:4b:31:b3:de:de:24:f4:c9:f6:b9:55:30:bd:3f:80: 64:28:9c:98:92:c0:a2:7d:7c:66:b7:a7:38:5e:99:91: 74:f4:f7:21:de:a9:c7:e3:74:7f:f0:13:70:68:a7:b4: 1c:11:f1:37:f6:a1:49:3e:6b:c7:cc:3c:e4:dc:38:bb: 72:a5:12:3b:6f:10:6e:8b:7f:89:ea:fd:61:1d:ee:d8: a0:ef:c7:45:7e:b3:77:1f:e0:20:10:bd:15:ea:21:99: f5:36:b5:1d:4a:7b:70:f9:af:10:6f:ac:3c:7e:22:10: 3c:fd:d4:e3:3e:d8:0c:5d:bc:4e:7a:88:cd:0e:36:c7: 31:42:cf:ab:d3:48:fe:76:2e:ca:cc:d3:77:dc:b9:f0: f0:b7:c0:e1:28:4a:a8:48:66:5c:a3:64:8e:83:86:fb: b0:b5:8c:ef:0d:f2:25:47:f5:35:83:ed:cd:e9:65:86: 7b:47:68:b2:0a:78:5a:56:ed:45:93:97:5e:8b:75:c4: 2e:07:ef:bc:73:5e:2a:d0:23:49:62:b5:05:2b:e7:50: 08:47:3d:86:e7:07:9e:f7:91:af:3f:6a:a8:87:36:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:de:a7:6c:7f:3f:3a:99:ab:6a:05:83:51:43:df:66: 60:e4:37:e8:f9:1f:e2:a4:82:32:19:0c:51:cb:10:78: a2:8f:a7:a4:44:9d:eb:ff:ea:01:b2:c5:3d:9b:7c:b4: d9:b3:69:39:13:b5:fd:73:08:4c:0b:6e:05:25:50:91: 15:2e:8f:11:6d:e6:a4:4a:eb:b3:59:67:81:99:a3:0a: 24:cb:03:81:4a:ed:31:d1:84:fd:59:8c:94:49:d8:4b: 98:81:40:65:5b:d6:5c:78:40:dc:e1:05:80:85:6c:dd: 27:f9:2e:b0:e8:87:42:b6:d8:c2:15:1d:2d:18:de:ee: f0:db:f3:d8:5d:4f:2b:cd:ac:28:97:c7:33:79:66:f4: b8:6a:bf:5c:de:1b:7e:18:c4:d9:83:6a:03:08:cc:35: 53:30:f1:fa:4a:1e:5c:b8:29:32:89:27:ea:fa:3c:e6: ac:3a:3e:24:1f:a8:b1:50:02:73:61:e2:13:49:fb:27: 7f:db:3e:77:23:54:fa:8f:d2:0d:e0:a8:eb:6c:ce:da: 78:e5:a9:6f:b2:a8:57:48:23:45:c7:14:a6:43:c1:e8: 99:48:fb:99:b8:12:b6:ae:01:fd:08:18:4b:27:ff:03: e1:53:22:e5:be:e1:e6:d5:86:aa:eb:ed:a5:ef:e7:ce Fingerprint (SHA-256): 29:F6:B9:29:EB:23:C1:07:95:DF:DC:D2:6F:E1:8D:CE:A0:05:16:C7:E3:18:06:CD:BD:C0:C3:12:F9:41:BC:C8 Fingerprint (SHA1): 74:D7:6A:F7:04:E5:93:34:17:8F:77:3A:F6:D4:19:1A:C6:A4:49:08 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #7262: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122800 (0x1e67db30) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:31:37 2017 Not After : Tue May 10 12:31:37 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:cf:c2:93:e9:ba:e5:3a:7b:b0:57:a5:0e:e5:ba:bb: fb:7f:73:b1:b6:64:50:93:3f:d0:4b:2b:9d:1f:30:30: 2a:4b:31:b3:de:de:24:f4:c9:f6:b9:55:30:bd:3f:80: 64:28:9c:98:92:c0:a2:7d:7c:66:b7:a7:38:5e:99:91: 74:f4:f7:21:de:a9:c7:e3:74:7f:f0:13:70:68:a7:b4: 1c:11:f1:37:f6:a1:49:3e:6b:c7:cc:3c:e4:dc:38:bb: 72:a5:12:3b:6f:10:6e:8b:7f:89:ea:fd:61:1d:ee:d8: a0:ef:c7:45:7e:b3:77:1f:e0:20:10:bd:15:ea:21:99: f5:36:b5:1d:4a:7b:70:f9:af:10:6f:ac:3c:7e:22:10: 3c:fd:d4:e3:3e:d8:0c:5d:bc:4e:7a:88:cd:0e:36:c7: 31:42:cf:ab:d3:48:fe:76:2e:ca:cc:d3:77:dc:b9:f0: f0:b7:c0:e1:28:4a:a8:48:66:5c:a3:64:8e:83:86:fb: b0:b5:8c:ef:0d:f2:25:47:f5:35:83:ed:cd:e9:65:86: 7b:47:68:b2:0a:78:5a:56:ed:45:93:97:5e:8b:75:c4: 2e:07:ef:bc:73:5e:2a:d0:23:49:62:b5:05:2b:e7:50: 08:47:3d:86:e7:07:9e:f7:91:af:3f:6a:a8:87:36:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:de:a7:6c:7f:3f:3a:99:ab:6a:05:83:51:43:df:66: 60:e4:37:e8:f9:1f:e2:a4:82:32:19:0c:51:cb:10:78: a2:8f:a7:a4:44:9d:eb:ff:ea:01:b2:c5:3d:9b:7c:b4: d9:b3:69:39:13:b5:fd:73:08:4c:0b:6e:05:25:50:91: 15:2e:8f:11:6d:e6:a4:4a:eb:b3:59:67:81:99:a3:0a: 24:cb:03:81:4a:ed:31:d1:84:fd:59:8c:94:49:d8:4b: 98:81:40:65:5b:d6:5c:78:40:dc:e1:05:80:85:6c:dd: 27:f9:2e:b0:e8:87:42:b6:d8:c2:15:1d:2d:18:de:ee: f0:db:f3:d8:5d:4f:2b:cd:ac:28:97:c7:33:79:66:f4: b8:6a:bf:5c:de:1b:7e:18:c4:d9:83:6a:03:08:cc:35: 53:30:f1:fa:4a:1e:5c:b8:29:32:89:27:ea:fa:3c:e6: ac:3a:3e:24:1f:a8:b1:50:02:73:61:e2:13:49:fb:27: 7f:db:3e:77:23:54:fa:8f:d2:0d:e0:a8:eb:6c:ce:da: 78:e5:a9:6f:b2:a8:57:48:23:45:c7:14:a6:43:c1:e8: 99:48:fb:99:b8:12:b6:ae:01:fd:08:18:4b:27:ff:03: e1:53:22:e5:be:e1:e6:d5:86:aa:eb:ed:a5:ef:e7:ce Fingerprint (SHA-256): 29:F6:B9:29:EB:23:C1:07:95:DF:DC:D2:6F:E1:8D:CE:A0:05:16:C7:E3:18:06:CD:BD:C0:C3:12:F9:41:BC:C8 Fingerprint (SHA1): 74:D7:6A:F7:04:E5:93:34:17:8F:77:3A:F6:D4:19:1A:C6:A4:49:08 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #7263: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122800 (0x1e67db30) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:31:37 2017 Not After : Tue May 10 12:31:37 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:cf:c2:93:e9:ba:e5:3a:7b:b0:57:a5:0e:e5:ba:bb: fb:7f:73:b1:b6:64:50:93:3f:d0:4b:2b:9d:1f:30:30: 2a:4b:31:b3:de:de:24:f4:c9:f6:b9:55:30:bd:3f:80: 64:28:9c:98:92:c0:a2:7d:7c:66:b7:a7:38:5e:99:91: 74:f4:f7:21:de:a9:c7:e3:74:7f:f0:13:70:68:a7:b4: 1c:11:f1:37:f6:a1:49:3e:6b:c7:cc:3c:e4:dc:38:bb: 72:a5:12:3b:6f:10:6e:8b:7f:89:ea:fd:61:1d:ee:d8: a0:ef:c7:45:7e:b3:77:1f:e0:20:10:bd:15:ea:21:99: f5:36:b5:1d:4a:7b:70:f9:af:10:6f:ac:3c:7e:22:10: 3c:fd:d4:e3:3e:d8:0c:5d:bc:4e:7a:88:cd:0e:36:c7: 31:42:cf:ab:d3:48:fe:76:2e:ca:cc:d3:77:dc:b9:f0: f0:b7:c0:e1:28:4a:a8:48:66:5c:a3:64:8e:83:86:fb: b0:b5:8c:ef:0d:f2:25:47:f5:35:83:ed:cd:e9:65:86: 7b:47:68:b2:0a:78:5a:56:ed:45:93:97:5e:8b:75:c4: 2e:07:ef:bc:73:5e:2a:d0:23:49:62:b5:05:2b:e7:50: 08:47:3d:86:e7:07:9e:f7:91:af:3f:6a:a8:87:36:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:de:a7:6c:7f:3f:3a:99:ab:6a:05:83:51:43:df:66: 60:e4:37:e8:f9:1f:e2:a4:82:32:19:0c:51:cb:10:78: a2:8f:a7:a4:44:9d:eb:ff:ea:01:b2:c5:3d:9b:7c:b4: d9:b3:69:39:13:b5:fd:73:08:4c:0b:6e:05:25:50:91: 15:2e:8f:11:6d:e6:a4:4a:eb:b3:59:67:81:99:a3:0a: 24:cb:03:81:4a:ed:31:d1:84:fd:59:8c:94:49:d8:4b: 98:81:40:65:5b:d6:5c:78:40:dc:e1:05:80:85:6c:dd: 27:f9:2e:b0:e8:87:42:b6:d8:c2:15:1d:2d:18:de:ee: f0:db:f3:d8:5d:4f:2b:cd:ac:28:97:c7:33:79:66:f4: b8:6a:bf:5c:de:1b:7e:18:c4:d9:83:6a:03:08:cc:35: 53:30:f1:fa:4a:1e:5c:b8:29:32:89:27:ea:fa:3c:e6: ac:3a:3e:24:1f:a8:b1:50:02:73:61:e2:13:49:fb:27: 7f:db:3e:77:23:54:fa:8f:d2:0d:e0:a8:eb:6c:ce:da: 78:e5:a9:6f:b2:a8:57:48:23:45:c7:14:a6:43:c1:e8: 99:48:fb:99:b8:12:b6:ae:01:fd:08:18:4b:27:ff:03: e1:53:22:e5:be:e1:e6:d5:86:aa:eb:ed:a5:ef:e7:ce Fingerprint (SHA-256): 29:F6:B9:29:EB:23:C1:07:95:DF:DC:D2:6F:E1:8D:CE:A0:05:16:C7:E3:18:06:CD:BD:C0:C3:12:F9:41:BC:C8 Fingerprint (SHA1): 74:D7:6A:F7:04:E5:93:34:17:8F:77:3A:F6:D4:19:1A:C6:A4:49:08 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #7264: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122800 (0x1e67db30) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:31:37 2017 Not After : Tue May 10 12:31:37 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:cf:c2:93:e9:ba:e5:3a:7b:b0:57:a5:0e:e5:ba:bb: fb:7f:73:b1:b6:64:50:93:3f:d0:4b:2b:9d:1f:30:30: 2a:4b:31:b3:de:de:24:f4:c9:f6:b9:55:30:bd:3f:80: 64:28:9c:98:92:c0:a2:7d:7c:66:b7:a7:38:5e:99:91: 74:f4:f7:21:de:a9:c7:e3:74:7f:f0:13:70:68:a7:b4: 1c:11:f1:37:f6:a1:49:3e:6b:c7:cc:3c:e4:dc:38:bb: 72:a5:12:3b:6f:10:6e:8b:7f:89:ea:fd:61:1d:ee:d8: a0:ef:c7:45:7e:b3:77:1f:e0:20:10:bd:15:ea:21:99: f5:36:b5:1d:4a:7b:70:f9:af:10:6f:ac:3c:7e:22:10: 3c:fd:d4:e3:3e:d8:0c:5d:bc:4e:7a:88:cd:0e:36:c7: 31:42:cf:ab:d3:48:fe:76:2e:ca:cc:d3:77:dc:b9:f0: f0:b7:c0:e1:28:4a:a8:48:66:5c:a3:64:8e:83:86:fb: b0:b5:8c:ef:0d:f2:25:47:f5:35:83:ed:cd:e9:65:86: 7b:47:68:b2:0a:78:5a:56:ed:45:93:97:5e:8b:75:c4: 2e:07:ef:bc:73:5e:2a:d0:23:49:62:b5:05:2b:e7:50: 08:47:3d:86:e7:07:9e:f7:91:af:3f:6a:a8:87:36:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:de:a7:6c:7f:3f:3a:99:ab:6a:05:83:51:43:df:66: 60:e4:37:e8:f9:1f:e2:a4:82:32:19:0c:51:cb:10:78: a2:8f:a7:a4:44:9d:eb:ff:ea:01:b2:c5:3d:9b:7c:b4: d9:b3:69:39:13:b5:fd:73:08:4c:0b:6e:05:25:50:91: 15:2e:8f:11:6d:e6:a4:4a:eb:b3:59:67:81:99:a3:0a: 24:cb:03:81:4a:ed:31:d1:84:fd:59:8c:94:49:d8:4b: 98:81:40:65:5b:d6:5c:78:40:dc:e1:05:80:85:6c:dd: 27:f9:2e:b0:e8:87:42:b6:d8:c2:15:1d:2d:18:de:ee: f0:db:f3:d8:5d:4f:2b:cd:ac:28:97:c7:33:79:66:f4: b8:6a:bf:5c:de:1b:7e:18:c4:d9:83:6a:03:08:cc:35: 53:30:f1:fa:4a:1e:5c:b8:29:32:89:27:ea:fa:3c:e6: ac:3a:3e:24:1f:a8:b1:50:02:73:61:e2:13:49:fb:27: 7f:db:3e:77:23:54:fa:8f:d2:0d:e0:a8:eb:6c:ce:da: 78:e5:a9:6f:b2:a8:57:48:23:45:c7:14:a6:43:c1:e8: 99:48:fb:99:b8:12:b6:ae:01:fd:08:18:4b:27:ff:03: e1:53:22:e5:be:e1:e6:d5:86:aa:eb:ed:a5:ef:e7:ce Fingerprint (SHA-256): 29:F6:B9:29:EB:23:C1:07:95:DF:DC:D2:6F:E1:8D:CE:A0:05:16:C7:E3:18:06:CD:BD:C0:C3:12:F9:41:BC:C8 Fingerprint (SHA1): 74:D7:6A:F7:04:E5:93:34:17:8F:77:3A:F6:D4:19:1A:C6:A4:49:08 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #7265: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122800 (0x1e67db30) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:31:37 2017 Not After : Tue May 10 12:31:37 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:cf:c2:93:e9:ba:e5:3a:7b:b0:57:a5:0e:e5:ba:bb: fb:7f:73:b1:b6:64:50:93:3f:d0:4b:2b:9d:1f:30:30: 2a:4b:31:b3:de:de:24:f4:c9:f6:b9:55:30:bd:3f:80: 64:28:9c:98:92:c0:a2:7d:7c:66:b7:a7:38:5e:99:91: 74:f4:f7:21:de:a9:c7:e3:74:7f:f0:13:70:68:a7:b4: 1c:11:f1:37:f6:a1:49:3e:6b:c7:cc:3c:e4:dc:38:bb: 72:a5:12:3b:6f:10:6e:8b:7f:89:ea:fd:61:1d:ee:d8: a0:ef:c7:45:7e:b3:77:1f:e0:20:10:bd:15:ea:21:99: f5:36:b5:1d:4a:7b:70:f9:af:10:6f:ac:3c:7e:22:10: 3c:fd:d4:e3:3e:d8:0c:5d:bc:4e:7a:88:cd:0e:36:c7: 31:42:cf:ab:d3:48:fe:76:2e:ca:cc:d3:77:dc:b9:f0: f0:b7:c0:e1:28:4a:a8:48:66:5c:a3:64:8e:83:86:fb: b0:b5:8c:ef:0d:f2:25:47:f5:35:83:ed:cd:e9:65:86: 7b:47:68:b2:0a:78:5a:56:ed:45:93:97:5e:8b:75:c4: 2e:07:ef:bc:73:5e:2a:d0:23:49:62:b5:05:2b:e7:50: 08:47:3d:86:e7:07:9e:f7:91:af:3f:6a:a8:87:36:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:de:a7:6c:7f:3f:3a:99:ab:6a:05:83:51:43:df:66: 60:e4:37:e8:f9:1f:e2:a4:82:32:19:0c:51:cb:10:78: a2:8f:a7:a4:44:9d:eb:ff:ea:01:b2:c5:3d:9b:7c:b4: d9:b3:69:39:13:b5:fd:73:08:4c:0b:6e:05:25:50:91: 15:2e:8f:11:6d:e6:a4:4a:eb:b3:59:67:81:99:a3:0a: 24:cb:03:81:4a:ed:31:d1:84:fd:59:8c:94:49:d8:4b: 98:81:40:65:5b:d6:5c:78:40:dc:e1:05:80:85:6c:dd: 27:f9:2e:b0:e8:87:42:b6:d8:c2:15:1d:2d:18:de:ee: f0:db:f3:d8:5d:4f:2b:cd:ac:28:97:c7:33:79:66:f4: b8:6a:bf:5c:de:1b:7e:18:c4:d9:83:6a:03:08:cc:35: 53:30:f1:fa:4a:1e:5c:b8:29:32:89:27:ea:fa:3c:e6: ac:3a:3e:24:1f:a8:b1:50:02:73:61:e2:13:49:fb:27: 7f:db:3e:77:23:54:fa:8f:d2:0d:e0:a8:eb:6c:ce:da: 78:e5:a9:6f:b2:a8:57:48:23:45:c7:14:a6:43:c1:e8: 99:48:fb:99:b8:12:b6:ae:01:fd:08:18:4b:27:ff:03: e1:53:22:e5:be:e1:e6:d5:86:aa:eb:ed:a5:ef:e7:ce Fingerprint (SHA-256): 29:F6:B9:29:EB:23:C1:07:95:DF:DC:D2:6F:E1:8D:CE:A0:05:16:C7:E3:18:06:CD:BD:C0:C3:12:F9:41:BC:C8 Fingerprint (SHA1): 74:D7:6A:F7:04:E5:93:34:17:8F:77:3A:F6:D4:19:1A:C6:A4:49:08 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #7266: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7267: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #7268: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122830 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7269: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #7270: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #7271: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7272: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 510122831 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7273: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7274: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #7275: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7276: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 510122832 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7277: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7278: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #7279: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7280: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 510122833 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7281: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7282: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #7283: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7284: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 510122834 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7285: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7286: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #7287: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7288: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 510122835 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7289: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7290: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #7291: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7292: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 510122836 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7293: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7294: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7295: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122830 (0x1e67db4e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:32:31 2017 Not After : Tue May 10 12:32:31 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:89:16:e9:97:f1:e8:5c:12:c6:d9:5b:f2:da:9e:df: 6a:ed:b1:10:76:df:ca:73:89:33:98:ce:ab:54:7a:97: 65:4a:32:70:1d:62:0d:76:09:9e:77:09:59:54:28:f1: 97:d5:d7:82:0d:86:44:30:10:25:2b:62:8a:db:63:26: 8b:ab:18:06:a7:e3:ad:d4:79:12:ee:10:cc:56:53:8f: 3a:47:37:4c:40:14:ce:4f:b9:56:8e:8d:00:2a:97:33: c6:69:cb:e0:7c:85:22:35:c6:ab:e1:30:58:91:d6:02: 39:29:74:8f:1d:74:7a:a3:d6:5e:38:3e:39:b4:4b:28: 2d:ae:b5:b0:d6:38:34:ac:c8:7b:48:4c:44:73:ec:b1: cc:73:c0:fb:ac:1d:8e:46:8e:98:4e:d2:c6:0e:2e:e2: 4d:3b:89:d2:b9:5c:bf:ab:6c:4c:7c:d2:42:c6:9d:68: f6:e1:08:25:94:a1:cb:cc:f8:ef:05:00:ec:95:86:e1: c8:36:ac:b7:cf:78:b1:b6:26:43:61:7d:43:a8:59:90: f3:11:b3:08:83:d4:4f:55:2e:b6:43:f5:75:10:16:7d: dd:1d:c1:18:2d:5a:d2:3c:7c:0a:40:01:c7:1f:ed:ec: 48:31:e3:a9:81:f1:1f:75:17:07:34:6a:7d:25:40:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:7b:c8:af:aa:0f:1c:a4:2e:5a:b4:bb:36:41:e2:fd: 77:88:7a:6a:42:e2:44:f2:b0:fa:8a:53:45:67:fb:dd: 72:9c:61:73:64:31:8e:51:93:88:80:76:69:f4:ee:ca: 09:47:30:8c:74:98:5e:c4:6f:e2:0e:f4:32:3b:6c:e3: 27:80:82:25:e5:7d:1d:f2:2e:33:16:f9:fe:aa:86:f7: 60:87:91:2d:74:11:ab:15:99:7d:04:95:63:07:b3:a2: 63:6d:b0:66:ce:b0:95:cf:2f:3f:ef:e3:7c:4b:ce:c4: 54:67:c9:da:30:e0:78:15:a2:94:32:c2:37:46:1e:d7: 9c:d4:f4:28:a9:fb:54:09:27:53:ff:a2:e4:56:50:b8: fe:2f:db:f5:ec:35:19:dc:70:e5:56:7a:a3:51:31:61: a5:fd:31:57:b2:e1:fd:eb:02:3e:5c:a4:1b:91:6b:ab: b5:19:cd:ba:63:25:13:f1:c0:d3:14:8c:b4:0a:da:a5: 1b:9f:8a:51:a4:e4:1c:dd:d0:e4:bb:f1:63:af:e8:d3: 0a:3e:03:2a:73:11:8d:a5:f9:01:d0:8e:b1:62:db:f7: 1f:34:9c:af:45:72:87:3a:13:c0:be:51:0e:44:a6:cc: de:50:d0:88:30:f5:1d:1b:1b:35:7c:95:15:14:80:99 Fingerprint (SHA-256): B8:1C:0D:D3:E4:F6:50:5D:90:CB:61:90:A1:63:F9:1C:D5:87:A7:5D:40:B9:87:9E:21:2A:B6:DC:CE:24:15:CF Fingerprint (SHA1): EA:09:7D:A9:BA:B0:7C:65:9D:11:2F:96:74:A6:8C:D2:76:23:25:40 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #7296: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7297: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7298: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #7299: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122830 (0x1e67db4e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:32:31 2017 Not After : Tue May 10 12:32:31 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:89:16:e9:97:f1:e8:5c:12:c6:d9:5b:f2:da:9e:df: 6a:ed:b1:10:76:df:ca:73:89:33:98:ce:ab:54:7a:97: 65:4a:32:70:1d:62:0d:76:09:9e:77:09:59:54:28:f1: 97:d5:d7:82:0d:86:44:30:10:25:2b:62:8a:db:63:26: 8b:ab:18:06:a7:e3:ad:d4:79:12:ee:10:cc:56:53:8f: 3a:47:37:4c:40:14:ce:4f:b9:56:8e:8d:00:2a:97:33: c6:69:cb:e0:7c:85:22:35:c6:ab:e1:30:58:91:d6:02: 39:29:74:8f:1d:74:7a:a3:d6:5e:38:3e:39:b4:4b:28: 2d:ae:b5:b0:d6:38:34:ac:c8:7b:48:4c:44:73:ec:b1: cc:73:c0:fb:ac:1d:8e:46:8e:98:4e:d2:c6:0e:2e:e2: 4d:3b:89:d2:b9:5c:bf:ab:6c:4c:7c:d2:42:c6:9d:68: f6:e1:08:25:94:a1:cb:cc:f8:ef:05:00:ec:95:86:e1: c8:36:ac:b7:cf:78:b1:b6:26:43:61:7d:43:a8:59:90: f3:11:b3:08:83:d4:4f:55:2e:b6:43:f5:75:10:16:7d: dd:1d:c1:18:2d:5a:d2:3c:7c:0a:40:01:c7:1f:ed:ec: 48:31:e3:a9:81:f1:1f:75:17:07:34:6a:7d:25:40:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:7b:c8:af:aa:0f:1c:a4:2e:5a:b4:bb:36:41:e2:fd: 77:88:7a:6a:42:e2:44:f2:b0:fa:8a:53:45:67:fb:dd: 72:9c:61:73:64:31:8e:51:93:88:80:76:69:f4:ee:ca: 09:47:30:8c:74:98:5e:c4:6f:e2:0e:f4:32:3b:6c:e3: 27:80:82:25:e5:7d:1d:f2:2e:33:16:f9:fe:aa:86:f7: 60:87:91:2d:74:11:ab:15:99:7d:04:95:63:07:b3:a2: 63:6d:b0:66:ce:b0:95:cf:2f:3f:ef:e3:7c:4b:ce:c4: 54:67:c9:da:30:e0:78:15:a2:94:32:c2:37:46:1e:d7: 9c:d4:f4:28:a9:fb:54:09:27:53:ff:a2:e4:56:50:b8: fe:2f:db:f5:ec:35:19:dc:70:e5:56:7a:a3:51:31:61: a5:fd:31:57:b2:e1:fd:eb:02:3e:5c:a4:1b:91:6b:ab: b5:19:cd:ba:63:25:13:f1:c0:d3:14:8c:b4:0a:da:a5: 1b:9f:8a:51:a4:e4:1c:dd:d0:e4:bb:f1:63:af:e8:d3: 0a:3e:03:2a:73:11:8d:a5:f9:01:d0:8e:b1:62:db:f7: 1f:34:9c:af:45:72:87:3a:13:c0:be:51:0e:44:a6:cc: de:50:d0:88:30:f5:1d:1b:1b:35:7c:95:15:14:80:99 Fingerprint (SHA-256): B8:1C:0D:D3:E4:F6:50:5D:90:CB:61:90:A1:63:F9:1C:D5:87:A7:5D:40:B9:87:9E:21:2A:B6:DC:CE:24:15:CF Fingerprint (SHA1): EA:09:7D:A9:BA:B0:7C:65:9D:11:2F:96:74:A6:8C:D2:76:23:25:40 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #7300: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7301: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7302: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #7303: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122837 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7304: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #7305: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7306: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7307: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510122838 --extCP --extPM < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #7308: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7309: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7310: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7311: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510122839 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7312: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7313: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #7314: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7315: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 510122840 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7316: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7317: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7318: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #7319: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #7320: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #7321: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122837 (0x1e67db55) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:32:41 2017 Not After : Tue May 10 12:32:41 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:ca:5d:b5:3a:e2:fc:a8:4d:87:cb:b4:ba:47:b4:34: bb:c5:2c:6e:96:69:2f:a1:e7:da:cc:ef:e5:db:0c:24: 1c:09:b7:ed:5a:ac:12:7c:30:f0:0b:0e:7f:e3:d7:21: 22:4d:a2:c7:0d:c9:8a:a4:fb:36:0a:e1:b3:a7:5e:60: de:d2:14:08:66:ba:20:9c:8b:da:2d:a3:e6:e4:96:ea: ce:5c:11:69:f2:5a:62:77:8f:12:8d:ce:c5:fc:7f:3f: 80:9d:b0:b2:2a:86:ba:9d:9c:e7:53:4c:07:02:77:68: ac:3a:ab:90:81:85:fb:6e:98:d3:61:e9:4c:27:75:4c: c3:4f:b8:89:bc:ac:df:f3:8f:9e:84:df:8e:fc:48:85: 47:26:f1:57:80:63:35:6f:d9:b0:3e:ff:1c:38:b6:91: 3d:aa:ca:e4:8a:33:c3:d5:f4:5d:d5:e4:aa:33:e2:f0: a8:a9:5b:52:dd:d0:11:44:0e:f9:4d:23:fd:cf:1d:f6: 87:77:99:2c:52:30:c9:79:a6:6d:86:9f:b9:9c:22:f6: 17:78:52:ce:4c:8c:45:ef:09:f6:4e:94:bd:b0:9e:8a: f8:ff:9b:a1:9d:07:04:ac:9f:0a:e2:45:10:06:22:1d: c0:3d:ac:4b:fd:4f:35:2e:3c:63:7b:fd:a8:5e:f9:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:17:8c:af:99:6b:75:76:0c:7b:9b:49:43:77:c5:f7: 46:bd:75:37:fb:e9:42:14:33:18:98:fd:09:8e:3d:6d: 59:bf:e8:72:60:a9:78:ec:0a:72:83:02:e3:0a:86:bf: 4a:df:c1:06:02:4b:04:53:6d:7e:38:4f:0d:ae:2a:10: 82:79:5d:ef:f6:a1:cf:51:92:e3:c4:37:20:a6:fb:b8: b3:65:3a:c4:aa:db:33:12:26:ce:d0:b2:c1:1a:06:f5: 28:50:c7:aa:4e:22:bf:0b:2b:73:fe:53:ae:40:6b:98: e9:b1:14:ab:ea:c2:36:73:dc:8f:c5:df:18:00:f0:5c: 61:88:0d:29:60:cc:ad:09:bb:e4:ec:ea:85:8d:c8:7d: 3c:a3:b3:7f:29:ff:14:a2:c9:87:6a:8b:5a:98:b2:6b: b2:2e:cf:97:59:73:b9:b5:f0:bb:86:ff:4e:86:4a:4a: 7f:83:d6:34:fd:35:7f:0b:b2:5e:0f:77:e2:12:d7:be: 1c:9a:06:f1:4f:b1:a6:59:79:d0:7e:76:53:70:12:a9: b1:ac:81:b2:63:b0:4e:29:c1:f4:32:87:a5:c4:8f:5f: 2a:fc:5a:85:60:75:95:f6:89:62:1c:fe:a5:11:ce:a1: fe:d5:ed:b5:76:03:1a:51:67:80:0b:64:3c:46:90:d9 Fingerprint (SHA-256): 96:CA:14:E5:27:3A:57:21:31:38:F6:E2:47:D1:B5:4E:31:43:07:79:BD:C2:1A:A6:B2:10:F0:E6:10:10:AD:F8 Fingerprint (SHA1): 41:62:AD:D1:02:58:CB:15:42:DD:AF:63:B3:C3:5F:7F:A4:25:BB:D0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7322: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7323: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7324: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122838 (0x1e67db56) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:32:43 2017 Not After : Tue May 10 12:32:43 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:69:be:40:43:d8:b7:4d:7d:a2:f5:56:d7:f9:6f:62: 50:48:f3:8a:4d:e3:4f:d3:40:68:5e:d2:14:bc:9b:9f: 77:3f:18:2b:7a:fc:26:38:94:dc:a3:b7:b9:78:a0:c3: 33:6f:2f:40:bf:f5:b2:34:8c:c4:ee:fe:d1:24:ae:22: dc:21:40:14:2b:45:d6:31:a5:f6:18:30:e6:1e:62:d0: c2:44:12:63:e3:c2:dc:95:a1:f1:60:f7:25:20:2c:b5: e1:3d:fa:84:8a:f8:a0:e1:df:84:80:68:59:7b:b5:46: 68:a8:7c:fc:7a:9f:1d:6d:0c:51:de:52:ee:04:f9:12: 5a:32:f8:10:8b:3c:87:f2:ac:a3:c5:b7:88:f2:f2:2e: ff:70:db:f3:2d:57:36:c5:eb:25:01:74:94:00:d8:c4: 6a:63:ab:a5:61:f2:4d:86:b7:fc:e5:27:ee:27:d7:ae: f8:79:26:6d:01:ae:d5:a0:9e:3f:df:a8:9a:04:b7:7c: 30:a1:16:f7:03:21:9e:6b:65:e3:1b:32:ad:43:1e:ec: a7:42:af:f2:c5:c3:53:b9:2d:0c:70:ed:6f:6e:4e:ce: 91:fc:ef:c7:be:70:20:1f:d3:25:ac:ef:62:41:e0:4e: 49:85:b7:fd:7c:36:cf:a2:db:24:31:c6:3e:2c:ef:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:4d:08:cb:a7:0b:eb:5c:84:e8:0f:b0:c2:2e:ef:06: be:9f:c1:68:63:f3:ae:c4:36:60:d8:81:76:66:98:3f: 4d:04:80:a4:b6:46:ca:77:a3:cc:6c:11:88:e3:38:bc: 63:5d:14:ef:04:44:d1:59:b5:f5:13:74:3a:fc:57:36: 56:14:da:68:d9:c0:bd:e9:40:88:97:df:85:6e:0e:70: b5:87:4e:21:57:87:ba:df:5f:85:6a:4b:f0:09:b5:77: 08:76:b5:e7:8e:b1:f2:97:e0:89:ab:a1:7e:fa:7f:e4: 50:86:0e:cf:8e:90:d8:48:4b:f5:d0:04:2f:7f:28:d8: 61:57:43:2d:0c:36:f8:6b:88:aa:98:82:bd:51:59:4c: 08:25:3a:4d:f5:47:fb:98:0f:77:74:37:e2:13:4e:bf: 7b:8e:cc:6b:57:be:85:41:3e:c6:1c:75:57:a1:88:14: 82:7d:45:22:72:ac:7a:03:28:05:4e:16:74:57:6e:15: 75:6e:4e:40:95:84:a5:7a:a2:3e:06:04:7d:37:fb:53: 07:f9:f1:52:74:86:fe:ac:b2:e0:10:b8:64:a1:34:53: 1a:3b:2b:bb:52:31:72:5c:bb:da:4c:be:7a:c1:c3:11: 60:08:e2:c8:9e:5d:1d:99:ec:1d:82:21:5b:4e:e4:79 Fingerprint (SHA-256): 09:06:E5:B4:AB:DD:29:E7:E6:E1:03:DC:8C:31:E4:1B:0C:B1:90:EE:A5:04:93:0F:A8:4B:0D:43:4C:31:3B:86 Fingerprint (SHA1): C3:71:C7:C7:A5:E9:15:0C:6E:1A:EE:7A:72:84:E4:14:21:B6:8B:A2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #7325: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7326: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122839 (0x1e67db57) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:32:44 2017 Not After : Tue May 10 12:32:44 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:03:61:ec:96:e4:bb:db:7e:b5:2d:dd:0a:b7:01:a8: 6d:bc:4f:47:52:10:b1:75:a5:55:31:fd:55:93:e2:06: d9:85:10:a3:7e:36:87:d7:d0:68:c8:e9:da:47:33:1d: 07:1d:63:b5:d5:ad:83:30:37:23:4e:50:4e:04:9d:e6: 26:74:1d:81:72:7f:eb:a8:1c:3d:d1:c1:6b:f5:5f:4a: f6:33:59:ea:54:00:0d:b1:d9:ca:b3:2a:60:30:4b:bf: 97:d1:75:5c:6d:b4:6f:ce:d2:69:fd:2a:af:83:d8:1a: f9:14:9c:9d:17:57:f2:22:bf:ae:30:c8:45:fa:5b:3f: 70:7d:b7:17:78:50:88:0c:6c:db:78:4f:86:48:bc:45: 9d:bc:94:83:30:ff:87:a3:7d:5b:fd:27:e8:ef:38:87: 97:86:92:ff:7e:49:1e:d7:9d:77:ef:3e:73:39:26:6b: 97:8b:40:bb:e1:13:2f:32:ef:d6:ab:c6:69:d2:75:89: c3:29:b8:95:2c:54:7f:ff:18:46:68:a0:38:8f:75:ca: 3c:41:85:34:b4:6b:ed:45:41:7d:e9:89:68:74:3a:5f: 32:bd:c3:3b:dc:21:38:ca:4c:8c:03:67:0d:11:6f:1b: 52:af:62:ac:9e:ff:3b:81:4c:b2:cf:44:6a:9d:9d:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:9f:46:5f:c3:1c:81:d7:80:38:3f:c7:2d:2c:4e:09: 90:2a:0d:97:fb:3d:f0:3d:8f:aa:de:62:8e:86:60:56: 10:e6:21:ee:ed:1a:61:91:a2:a4:0a:7c:ee:62:c9:9c: b2:ab:9b:b5:73:d7:fb:35:4c:05:ea:9c:00:f0:fd:7e: 95:52:1f:87:06:d3:7e:ed:fe:3f:37:95:dc:ce:8d:cc: 9e:6a:20:6d:30:70:6b:0e:61:c7:f8:b3:e0:17:c6:56: d3:18:c4:4a:73:a3:51:d5:91:3f:a0:b9:f6:3a:10:26: 9c:59:5d:65:42:a4:0f:2c:d4:05:ca:8d:91:e9:27:9a: e9:17:70:46:fc:9d:a8:8f:08:c6:c5:63:5e:39:5f:3a: ae:03:3b:38:69:90:f6:e1:9d:34:f1:51:28:03:1f:ab: 67:a0:ac:39:d0:8d:af:e3:01:9b:a8:cb:9a:a9:d9:b0: 02:d2:88:2c:ba:d7:a7:83:5a:c7:ea:16:ae:d8:96:12: f5:36:b2:22:0d:b5:ae:aa:9b:02:c3:4f:53:9f:24:dc: 9c:14:14:9f:c8:9c:e3:6b:f8:93:06:27:b8:e2:3c:f8: 29:fb:51:53:bc:86:d7:ae:ce:cd:57:54:22:88:f3:d1: 9c:cf:7b:e2:d5:69:80:d3:7a:a1:6a:5d:ee:e8:92:14 Fingerprint (SHA-256): 69:7A:11:94:5A:B1:AA:64:43:56:3D:08:31:56:77:8A:60:F8:76:40:68:5D:A5:14:55:B2:E5:4D:17:DD:B0:C9 Fingerprint (SHA1): 52:97:6C:A9:96:05:65:AD:86:32:A8:B1:DA:A8:C4:8D:8C:C2:05:2B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #7327: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #7328: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122841 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7329: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #7330: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7331: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7332: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510122842 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7333: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7334: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7335: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7336: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510122843 --extCP --extPM < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #7337: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7338: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #7339: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7340: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 510122844 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7341: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7342: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #7343: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7344: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 510122845 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7345: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7346: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7347: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #7348: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #7349: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #7350: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #7351: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122841 (0x1e67db59) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:32:47 2017 Not After : Tue May 10 12:32:47 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:be:b9:ee:7a:db:21:36:60:17:ce:56:7d:8d:9f:a1: 32:9c:66:25:40:dc:3c:ec:54:04:70:43:67:e3:b4:b0: 63:f5:00:f8:a3:c4:03:93:1d:6b:31:af:b2:7d:b8:32: c3:70:0f:df:93:d7:c3:0f:b4:c0:75:8a:84:61:0a:8c: 1e:bf:2e:ce:fe:e4:5e:b6:b2:06:1c:fb:27:63:44:bf: 4c:a5:41:1f:3c:44:dd:6a:00:01:66:9f:c3:44:63:de: a1:32:41:be:70:a9:e9:35:20:93:29:62:ee:71:6e:1d: 8c:29:4f:5e:f6:32:c9:0b:0e:d9:af:a5:6c:32:4b:ab: ec:3e:b9:34:1d:a7:88:37:7e:12:17:0b:6a:c5:f9:ce: 28:27:89:68:21:99:c7:52:34:83:10:e4:9d:4e:e1:f3: 5b:13:64:81:91:46:74:47:83:12:e8:17:1d:54:8f:85: c6:76:5c:7b:1f:f8:e2:e6:95:14:b6:71:7e:db:b4:ce: 9c:df:69:b4:4d:e6:49:02:4f:8d:db:5c:21:e9:11:f3: e8:aa:02:19:14:2b:f6:ed:9e:38:32:18:48:46:ae:b4: ea:c5:37:35:d8:41:4d:34:93:67:d6:c9:42:71:ce:88: 3c:9c:4e:ca:cc:16:89:cf:c8:9a:28:e2:6e:24:b3:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 13:b8:86:ba:50:1d:4d:ec:4c:0a:bf:c8:08:26:d8:b2: 52:ac:b0:78:57:22:ee:fc:c8:8c:b3:90:09:cb:a0:ff: a8:70:75:35:9e:e6:e7:5d:1e:e8:a0:0f:8c:1a:ba:f3: a1:aa:07:a4:96:b0:dc:bf:f3:86:26:79:94:25:e3:c6: 0c:37:30:e3:39:cd:cc:cb:ac:95:4f:5a:5c:7b:91:93: 03:7a:ed:c8:f6:f8:06:35:1a:89:f3:30:a0:1c:d5:8e: bc:b4:90:ee:d0:42:f1:98:49:26:3d:61:23:62:7f:33: 71:64:95:02:2b:b6:78:40:1f:92:e0:ec:f9:27:8f:ae: 85:4c:18:91:63:db:66:f4:ea:42:72:2e:37:77:5b:da: ee:5a:96:27:be:36:89:2e:52:14:7a:2e:5a:ce:c5:18: e2:cd:e4:50:19:51:48:18:7c:24:bd:d7:b5:62:85:d3: 84:98:f3:8a:f5:b7:97:7b:5a:60:da:c2:cc:68:58:7a: 76:91:ca:99:50:af:20:aa:ff:44:2c:d5:43:80:4f:3d: d1:61:04:a6:34:0f:21:fa:c7:9d:c3:d8:ab:6a:d7:12: 8b:1e:04:c6:03:1a:57:b5:d8:f1:d7:0d:85:f5:41:b2: a3:44:1f:7e:47:aa:5e:10:6e:e9:b0:7b:21:07:67:bb Fingerprint (SHA-256): E1:F6:27:C7:0E:96:E4:CE:36:EE:ED:FE:35:F2:A1:E0:E1:AE:C4:55:EA:50:38:12:C0:B9:B0:DE:67:C8:95:05 Fingerprint (SHA1): 3D:F8:C2:F9:FD:D4:BB:77:2C:2B:87:E0:1F:F4:0C:F4:AA:A1:F1:42 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7352: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7353: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122842 (0x1e67db5a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:32:48 2017 Not After : Tue May 10 12:32:48 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:4f:2a:3a:67:36:e4:b3:c1:dc:09:98:ce:0b:f5:4c: 7d:95:a2:f6:c5:5c:36:fd:34:28:2d:1c:7f:aa:3f:40: d2:7b:48:93:d1:ee:dd:ff:79:a5:fd:bb:52:68:d0:6f: d0:e1:94:59:3a:65:4b:fa:35:2e:dd:17:8c:bd:fb:1e: 05:6f:c5:e9:3f:02:23:bb:16:89:43:65:a4:dc:d9:37: 8f:dc:b4:cc:ce:65:45:80:cb:35:d5:8d:bb:61:9c:05: 92:79:68:c4:99:86:50:3b:53:c5:f6:52:b4:14:a8:99: 0e:75:21:2f:93:fc:69:42:04:92:c3:d1:78:d2:35:44: 11:6b:53:3f:aa:79:d4:4e:b6:d5:54:be:72:d5:11:32: 6b:d4:70:c1:fa:36:db:ab:73:d2:b9:fb:57:c8:13:70: 78:9e:f9:62:e8:f1:86:51:e7:6d:70:4c:6c:2f:23:d9: 51:21:30:4e:9a:b4:bc:a9:4b:8d:e6:cd:bc:72:7d:5d: ff:2f:5b:53:94:32:40:74:01:b5:11:28:1e:95:21:c9: b4:f1:cf:3b:02:6d:86:76:f7:d9:8f:8a:71:d9:43:51: 7d:48:8d:96:84:ae:a4:61:f7:69:1f:e5:b5:46:aa:2f: 4f:5a:08:ff:95:eb:c7:89:27:7c:8d:75:1e:43:15:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:24:77:90:13:76:83:fb:6f:3a:6e:fb:f5:f7:ec:8d: 8d:6d:6d:4c:13:2a:57:6e:0e:5e:4a:74:15:53:71:ff: 07:88:21:44:fc:8d:80:e1:35:32:04:fa:aa:ef:79:18: b5:1b:5f:a6:85:aa:d9:e8:f5:30:a4:36:5f:5f:3c:81: 73:ee:c8:d1:07:f1:f0:19:34:ac:b0:10:0b:ed:57:43: eb:37:c3:e1:38:28:c6:77:c1:86:31:04:1e:e0:b5:4d: e9:05:4a:b8:6c:af:61:7f:f2:ff:d7:87:85:0f:9b:c6: 5c:df:a2:c2:e2:a8:cc:fe:54:e4:f8:25:4e:5c:3f:77: 5a:b2:17:8e:3e:fc:50:70:53:79:38:26:01:b8:dd:4f: 56:9a:44:bf:9d:6f:a7:9e:ad:f8:f2:5d:79:8b:a1:8b: 74:b2:c1:a1:c8:2c:f8:57:fc:55:3a:78:11:bd:9e:bb: 28:27:00:f3:d7:e0:b6:f8:04:10:e7:4b:63:a7:83:2f: ea:74:99:e3:49:fe:1e:ea:ad:a8:7f:71:a6:c6:90:49: d9:62:07:1a:d3:da:2c:df:31:12:7a:3a:c5:7a:55:ff: 0f:03:35:79:37:e3:58:b4:68:79:d1:31:93:22:ca:24: a8:47:da:41:7e:61:ae:40:83:a6:ab:22:0c:75:4d:bb Fingerprint (SHA-256): 83:A1:50:57:9B:C8:5A:BC:2A:DF:BE:37:AC:D6:B7:31:6A:E9:12:E6:5E:F0:D2:A7:97:5F:19:A8:B7:E2:DA:2C Fingerprint (SHA1): 08:95:8D:A1:CB:AE:71:EC:6A:FD:0D:E0:E6:E1:61:05:A7:65:13:38 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #7354: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7355: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7356: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122843 (0x1e67db5b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:32:50 2017 Not After : Tue May 10 12:32:50 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:7c:31:56:57:4f:30:30:d2:c2:bd:66:42:dc:46:f9: 83:7b:f3:c5:c3:f0:6b:ea:5c:83:db:72:c3:d3:c7:24: 38:be:56:8b:85:6e:30:95:f0:3a:5b:06:09:05:dd:75: 8c:5b:a8:a9:ef:2c:a4:ca:25:9a:6b:74:8d:60:87:fd: a8:49:87:1a:48:de:4b:9f:d4:63:25:7f:11:ef:7e:28: 4c:60:72:8f:34:69:44:e7:ba:a6:b1:b1:13:b8:b5:74: c1:96:68:1e:0d:17:fd:2a:99:05:27:4a:29:5c:17:a6: 22:e4:65:c7:ae:76:fc:a3:a8:68:78:b7:50:8b:fd:7b: bc:6f:66:bb:5f:83:1b:ef:7a:e3:ee:09:1a:4e:60:3e: 51:74:68:11:b6:f1:e2:de:d5:e7:0a:16:dc:96:f2:3c: 3c:8c:f9:ad:8a:52:dc:e8:a2:f8:87:e7:53:b6:17:71: 27:5c:38:ff:a2:86:03:5a:ef:a6:e3:98:f0:bd:e7:c9: 55:3a:c5:e6:bf:28:72:26:2e:de:ac:d4:11:15:32:c7: 22:32:5b:7e:42:2f:89:8a:db:7b:56:73:d9:b6:d8:de: 72:53:92:bb:a9:00:90:b2:c4:fa:21:64:19:fb:6e:d7: dc:d2:5f:f9:be:06:c9:9f:09:21:70:05:c3:0e:07:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:41:e9:64:ac:7e:34:e8:c7:ba:6d:8e:a4:96:0e:e9: f4:a6:d5:9f:c5:1d:d0:d3:72:bf:a5:7d:e4:95:f6:50: e9:c3:fe:f5:fa:b7:67:75:d0:a9:8a:13:fd:29:9c:63: 16:6f:2e:c9:6d:c9:02:cd:4d:79:63:aa:28:73:f9:e0: 6e:fd:d4:0d:7f:c6:fe:d2:ee:d9:fc:d6:1f:99:f1:14: c3:82:09:24:9b:33:b5:38:87:2f:e0:43:d6:7a:1d:27: 66:d8:a8:17:00:ce:74:50:ab:fd:51:93:6a:7c:2e:77: 76:1a:98:a2:e8:d1:de:9d:e0:25:36:6b:a3:2b:da:33: 53:88:0a:3a:63:d8:4f:12:5f:b2:8f:de:c8:f4:09:93: 89:b9:78:34:a4:9b:ce:9c:fe:3c:fe:6d:66:77:57:e4: a9:7a:57:5c:e3:4a:8b:65:8c:af:27:b2:f0:1f:4b:41: 1c:35:78:de:dd:99:10:ed:63:de:17:74:27:e5:50:6b: 10:f4:7d:33:25:66:61:69:a5:c4:0f:b1:b1:39:d8:08: b2:d9:5f:77:dc:26:cd:97:05:d2:87:c0:d2:c4:14:c4: b4:ec:f4:b8:25:1f:36:a2:f3:a8:40:69:55:c2:38:aa: 7c:0b:12:83:05:52:46:b9:d9:f4:09:ef:2a:18:12:d0 Fingerprint (SHA-256): 42:79:26:1C:29:51:B7:91:9D:89:7A:20:1D:A6:91:1A:65:FB:44:3E:A8:85:CF:7D:14:91:6F:EA:39:25:E3:7A Fingerprint (SHA1): 8F:3B:10:70:D8:F3:09:0B:25:63:6B:C2:26:F0:99:60:B0:15:55:A0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #7357: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #7358: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122846 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7359: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #7360: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7361: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7362: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510122847 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7363: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7364: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7365: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7366: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510122848 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA1Root-510122625.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7367: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7368: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #7369: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7370: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 510122849 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7371: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7372: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #7373: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122846 (0x1e67db5e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:32:55 2017 Not After : Tue May 10 12:32:55 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:25:bf:7d:d7:b3:6c:e3:1c:ae:17:3d:c4:0b:84:3c: 57:2a:12:91:de:ae:35:d4:c6:51:10:98:26:7e:20:58: de:f4:4a:fa:93:b2:50:2b:09:29:d6:92:0c:87:1f:7d: 45:ad:af:06:dc:d2:95:65:9a:8a:d5:16:7d:46:d9:07: 3f:2e:76:a6:29:18:0a:8d:89:c2:6d:3c:7a:d6:15:e3: a6:9c:2c:fe:7a:48:2a:ad:35:a9:1f:26:83:dd:39:90: 6b:c6:f3:c8:7e:af:e9:a1:1b:9a:7b:b3:57:32:50:d8: 95:3d:5d:c8:27:68:d1:39:99:49:32:95:a3:3c:af:1a: 80:7c:02:3c:42:9b:d3:e6:7a:fe:ef:b1:cf:b5:c8:90: 72:c5:6c:be:bf:6a:44:b0:6a:a8:ec:91:b8:df:10:3b: 2c:a1:51:d3:6b:18:7e:56:a7:5e:47:81:3c:8d:f0:fa: f7:63:ae:d8:4e:63:5d:22:82:a7:9e:89:97:63:07:c9: d4:80:30:e8:36:4b:c7:43:e5:c5:67:2a:34:74:6d:f8: 71:94:b4:85:f0:75:aa:62:44:6e:b7:b9:7c:08:e6:b9: e9:b1:98:1d:83:48:25:bc:0c:7f:04:36:9d:ba:25:48: 6f:99:c6:2f:29:83:02:90:65:37:1f:79:9e:40:e3:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:33:b2:9c:1e:7f:08:2f:b7:9d:ac:f9:a7:19:57:01: 2e:8a:b3:3f:44:c1:b9:ca:be:0b:b7:25:09:50:d9:7f: a9:e1:b0:c8:3c:5e:7e:0a:44:f8:bf:ed:9f:b8:67:68: 83:b0:28:f0:fb:8e:d4:d4:c6:e7:9c:d2:78:7a:dd:1e: f4:62:4b:b3:75:cd:78:84:3a:70:f3:ff:2c:a6:29:69: 68:e9:1d:bb:59:68:57:ae:19:07:08:55:83:ea:e7:2c: 58:01:47:89:3a:78:98:eb:9f:97:ac:ee:43:1c:c2:1e: 84:a7:88:49:ae:2a:b0:92:ec:cb:ab:30:3f:86:81:e9: 81:3d:09:33:00:9e:06:e7:f2:5b:ef:bc:2e:76:32:34: bb:f0:fe:49:4e:41:f3:1d:8b:38:5b:9b:8f:45:24:c9: 1d:05:9e:55:e3:5a:31:23:2c:4f:bc:ca:3f:09:fa:b9: 4a:d4:cb:ec:15:05:8c:95:f6:97:75:85:c1:66:8d:55: fd:86:ca:c2:ef:ae:9b:da:97:71:ca:6c:3a:28:f9:e4: 67:aa:f4:7a:20:ee:3b:c5:cb:e2:b9:ca:fe:70:a8:13: 9c:d0:fc:a8:88:0b:47:dc:44:c3:98:69:1b:56:c5:9d: 10:4b:a9:5f:a6:d0:d2:62:74:92:de:c3:64:33:0d:8b Fingerprint (SHA-256): A5:49:0E:30:0E:E8:F0:87:C8:AF:1B:F6:39:E0:1E:56:F1:24:47:F3:F0:AA:DD:1E:18:D7:45:CF:39:91:9F:AB Fingerprint (SHA1): 48:F9:D8:93:AC:84:C1:07:FF:D7:F5:25:35:0A:A9:E8:09:7F:4C:3F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7374: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #7375: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122850 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7376: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #7377: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #7378: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122851 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7379: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #7380: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #7381: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7382: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 510122852 -7 Bridge@Army < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7383: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7384: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 510122853 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7385: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7386: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #7387: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7388: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7389: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 510122854 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-Bridge-510122626.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7390: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7391: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #7392: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7393: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510122855 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7394: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7395: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #7396: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #7397: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122851 (0x1e67db63) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:33:02 2017 Not After : Tue May 10 12:33:02 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:05:7d:b1:45:71:79:c9:5c:ce:7e:02:4a:a8:bf:e3: 59:83:7f:5b:40:9b:3d:6e:24:e4:a3:71:dc:d1:24:82: a1:8c:43:cf:85:53:1f:f5:aa:81:5f:9d:89:34:3e:62: a1:d6:b4:1c:1f:ec:a9:8c:a9:0f:29:a5:24:c9:21:87: 0f:f5:4e:ae:25:3f:bc:93:78:20:a9:cb:82:35:c7:6f: 53:0d:57:42:13:a5:b8:3b:6c:96:d2:5e:5c:81:20:a3: 8b:b1:39:4f:4d:88:5d:3f:b4:2c:79:38:cd:11:ac:7d: 7f:0f:2c:b7:71:4f:d8:9c:89:56:3c:65:4b:59:d5:39: 62:1f:61:21:91:c0:b6:ae:24:0d:1d:f8:21:97:bb:8f: 7e:60:08:c3:ef:72:7c:50:84:d7:d9:29:fa:44:68:f6: 0a:25:99:64:1d:95:56:e4:62:cf:10:07:1d:ce:aa:46: 29:fa:d9:b5:ce:13:bf:a5:0f:60:df:41:90:d4:2d:00: c6:b1:f4:3e:68:3c:fd:a6:3b:0a:10:8b:2d:13:2e:8e: 12:f3:b6:cb:c9:ac:4e:51:c9:23:62:3a:c1:4a:a8:db: 4d:f4:71:b4:c1:ea:f7:af:82:12:c6:fb:3c:53:aa:20: 89:e4:0a:88:84:6d:f0:e1:db:90:d7:d0:28:0b:75:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:c2:46:00:04:18:6e:fb:d6:f2:70:c5:3f:a4:b4:99: 4f:23:90:91:58:30:a2:40:74:30:4b:ec:71:f9:ca:e8: f0:7c:6d:cf:40:0e:01:67:c2:c9:5d:b2:eb:37:97:54: db:6f:15:7f:57:26:07:87:a2:d9:4c:16:41:49:b6:11: 49:8d:54:fd:8e:73:07:e8:a0:17:8e:dc:cf:84:c1:e2: 45:85:b9:92:2f:10:15:7b:0a:63:04:70:2e:0a:40:8c: 11:7f:da:ca:02:d5:d7:9d:80:b3:c2:7b:9e:23:c3:9a: bd:56:ab:2b:2f:95:06:dd:ef:9c:8b:d9:e1:16:dd:c2: 20:c0:64:25:f2:be:65:3d:48:45:4c:76:61:a7:07:6c: ac:b3:37:02:cb:2b:45:41:10:c1:4b:0a:f7:55:bc:2b: 9f:51:49:5a:e2:13:24:32:91:9f:ce:17:ad:37:73:b6: ba:5a:84:3a:fe:46:27:83:55:26:40:dd:aa:52:d4:32: b4:e2:a6:7b:9a:9d:de:0e:67:3b:c6:8f:c5:75:33:52: 98:0e:9d:7a:a1:35:be:92:e4:e1:eb:15:54:04:93:03: 26:02:86:19:ac:d6:75:a2:84:fe:27:0a:28:1b:38:3e: e5:cc:d5:8f:62:21:eb:53:8a:03:a8:79:a9:0b:60:f2 Fingerprint (SHA-256): 20:9F:07:C2:59:A0:5D:A2:20:D0:52:62:9A:01:83:B6:B6:05:FF:D0:D7:3F:E8:22:7C:A9:72:52:D0:54:A6:B7 Fingerprint (SHA1): 87:34:FC:4A:AB:A1:09:59:0D:FD:E5:62:F0:56:54:E5:03:3A:28:CA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7398: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122851 (0x1e67db63) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:33:02 2017 Not After : Tue May 10 12:33:02 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:05:7d:b1:45:71:79:c9:5c:ce:7e:02:4a:a8:bf:e3: 59:83:7f:5b:40:9b:3d:6e:24:e4:a3:71:dc:d1:24:82: a1:8c:43:cf:85:53:1f:f5:aa:81:5f:9d:89:34:3e:62: a1:d6:b4:1c:1f:ec:a9:8c:a9:0f:29:a5:24:c9:21:87: 0f:f5:4e:ae:25:3f:bc:93:78:20:a9:cb:82:35:c7:6f: 53:0d:57:42:13:a5:b8:3b:6c:96:d2:5e:5c:81:20:a3: 8b:b1:39:4f:4d:88:5d:3f:b4:2c:79:38:cd:11:ac:7d: 7f:0f:2c:b7:71:4f:d8:9c:89:56:3c:65:4b:59:d5:39: 62:1f:61:21:91:c0:b6:ae:24:0d:1d:f8:21:97:bb:8f: 7e:60:08:c3:ef:72:7c:50:84:d7:d9:29:fa:44:68:f6: 0a:25:99:64:1d:95:56:e4:62:cf:10:07:1d:ce:aa:46: 29:fa:d9:b5:ce:13:bf:a5:0f:60:df:41:90:d4:2d:00: c6:b1:f4:3e:68:3c:fd:a6:3b:0a:10:8b:2d:13:2e:8e: 12:f3:b6:cb:c9:ac:4e:51:c9:23:62:3a:c1:4a:a8:db: 4d:f4:71:b4:c1:ea:f7:af:82:12:c6:fb:3c:53:aa:20: 89:e4:0a:88:84:6d:f0:e1:db:90:d7:d0:28:0b:75:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:c2:46:00:04:18:6e:fb:d6:f2:70:c5:3f:a4:b4:99: 4f:23:90:91:58:30:a2:40:74:30:4b:ec:71:f9:ca:e8: f0:7c:6d:cf:40:0e:01:67:c2:c9:5d:b2:eb:37:97:54: db:6f:15:7f:57:26:07:87:a2:d9:4c:16:41:49:b6:11: 49:8d:54:fd:8e:73:07:e8:a0:17:8e:dc:cf:84:c1:e2: 45:85:b9:92:2f:10:15:7b:0a:63:04:70:2e:0a:40:8c: 11:7f:da:ca:02:d5:d7:9d:80:b3:c2:7b:9e:23:c3:9a: bd:56:ab:2b:2f:95:06:dd:ef:9c:8b:d9:e1:16:dd:c2: 20:c0:64:25:f2:be:65:3d:48:45:4c:76:61:a7:07:6c: ac:b3:37:02:cb:2b:45:41:10:c1:4b:0a:f7:55:bc:2b: 9f:51:49:5a:e2:13:24:32:91:9f:ce:17:ad:37:73:b6: ba:5a:84:3a:fe:46:27:83:55:26:40:dd:aa:52:d4:32: b4:e2:a6:7b:9a:9d:de:0e:67:3b:c6:8f:c5:75:33:52: 98:0e:9d:7a:a1:35:be:92:e4:e1:eb:15:54:04:93:03: 26:02:86:19:ac:d6:75:a2:84:fe:27:0a:28:1b:38:3e: e5:cc:d5:8f:62:21:eb:53:8a:03:a8:79:a9:0b:60:f2 Fingerprint (SHA-256): 20:9F:07:C2:59:A0:5D:A2:20:D0:52:62:9A:01:83:B6:B6:05:FF:D0:D7:3F:E8:22:7C:A9:72:52:D0:54:A6:B7 Fingerprint (SHA1): 87:34:FC:4A:AB:A1:09:59:0D:FD:E5:62:F0:56:54:E5:03:3A:28:CA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7399: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #7400: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122856 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7401: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #7402: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #7403: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122857 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7404: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #7405: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #7406: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7407: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 510122858 -7 Bridge@Army < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7408: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7409: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 510122859 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7410: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7411: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #7412: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7413: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7414: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 510122860 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-Bridge-510122627.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7415: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7416: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #7417: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7418: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510122861 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7419: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7420: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7421: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7422: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 510122862 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-BridgeNavy-510122628.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7423: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7424: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #7425: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7426: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 510122863 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7427: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7428: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #7429: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #7430: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122857 (0x1e67db69) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:33:10 2017 Not After : Tue May 10 12:33:10 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:d5:75:4c:19:e2:7d:c3:e7:d3:c0:bd:4b:36:87:f2: af:a0:08:0a:58:3f:09:bd:64:2a:39:8e:3d:b0:ef:e6: 6b:0e:29:08:49:0d:0b:80:8f:4c:9a:87:10:cd:02:ed: 42:bb:3a:de:b8:82:a2:19:69:e4:c4:74:7c:a2:f7:4e: 16:7c:16:dc:f7:9b:f0:b2:5b:13:7f:fb:06:e1:6b:2b: de:c6:e9:d0:53:89:2a:45:f6:c6:aa:6d:b2:55:0e:82: e5:8a:45:43:d9:f7:a7:a9:37:38:c2:03:1e:01:ba:2d: f9:7b:72:d7:95:a1:f2:74:2d:40:5c:6c:f1:1e:40:4f: 7d:06:f1:82:1e:f3:45:3b:82:c6:75:ba:1a:f8:0f:dd: e9:e7:7b:78:48:41:d9:52:67:8c:e1:3d:e8:3a:13:19: 81:4d:02:df:fb:53:92:ce:8b:f7:2e:6c:83:99:21:13: 6a:9d:73:d6:d2:da:d5:39:b6:11:74:89:33:c4:ca:c1: 67:71:ec:a0:0a:db:ca:c8:2b:ea:15:d8:08:d4:71:e0: f3:c6:da:6b:0f:ea:3d:72:b4:04:4d:0c:78:f1:3a:c0: 45:66:45:ba:3e:2e:d5:4c:38:21:23:67:26:0c:6a:cc: e2:9d:66:f9:59:98:c3:19:97:01:7a:15:85:73:09:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:1c:b5:2e:98:ef:97:00:01:91:c5:82:b2:95:e9:0b: 52:3d:2c:7a:aa:9a:8e:12:bb:94:df:94:81:db:2b:18: 77:68:f0:23:13:2e:f4:21:7c:11:3e:da:23:4c:85:27: 9b:fc:fd:92:12:7e:a4:17:68:d1:b2:92:47:57:3d:e7: 9a:d5:42:6d:e6:a4:49:ee:6a:b9:cc:c1:aa:7d:d1:85: eb:98:83:ea:e0:30:03:8d:1a:02:cf:44:16:2e:89:54: 38:76:df:a3:66:76:6f:0c:6f:b9:1e:e7:c3:b3:08:66: dd:d6:87:d6:22:e5:54:06:dd:68:2c:2e:dc:cf:40:e8: e3:1c:58:5e:a9:fb:c4:c5:f5:6a:4b:fe:ea:2a:ec:67: f0:a7:f3:18:5d:9a:f7:af:c4:a0:99:46:1f:9c:7a:19: 03:cd:1a:d4:b9:e1:99:ca:ed:75:b2:23:38:a9:46:79: 20:69:a0:c2:a4:cf:45:90:08:c7:6c:78:38:a2:d0:43: 04:1a:18:ec:59:14:00:00:7b:1d:34:69:bf:17:38:03: 95:39:b2:43:23:d7:b2:11:dc:bc:18:f7:08:8d:b7:01: 8a:b4:54:f1:2e:53:04:58:ca:74:04:7e:86:e2:a3:af: 39:d1:18:79:30:2e:5b:b4:46:f8:7f:7f:b0:44:b4:35 Fingerprint (SHA-256): 95:C0:FB:0E:8B:2F:CA:A1:28:EA:6D:C0:A4:84:6F:2C:5A:0D:70:24:52:D1:5C:D2:BA:9C:BA:A1:5D:17:67:9E Fingerprint (SHA1): E9:3F:A3:6C:9D:64:91:69:5E:E4:7C:29:1F:E1:B5:76:F3:19:9F:A0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7431: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122857 (0x1e67db69) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:33:10 2017 Not After : Tue May 10 12:33:10 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:d5:75:4c:19:e2:7d:c3:e7:d3:c0:bd:4b:36:87:f2: af:a0:08:0a:58:3f:09:bd:64:2a:39:8e:3d:b0:ef:e6: 6b:0e:29:08:49:0d:0b:80:8f:4c:9a:87:10:cd:02:ed: 42:bb:3a:de:b8:82:a2:19:69:e4:c4:74:7c:a2:f7:4e: 16:7c:16:dc:f7:9b:f0:b2:5b:13:7f:fb:06:e1:6b:2b: de:c6:e9:d0:53:89:2a:45:f6:c6:aa:6d:b2:55:0e:82: e5:8a:45:43:d9:f7:a7:a9:37:38:c2:03:1e:01:ba:2d: f9:7b:72:d7:95:a1:f2:74:2d:40:5c:6c:f1:1e:40:4f: 7d:06:f1:82:1e:f3:45:3b:82:c6:75:ba:1a:f8:0f:dd: e9:e7:7b:78:48:41:d9:52:67:8c:e1:3d:e8:3a:13:19: 81:4d:02:df:fb:53:92:ce:8b:f7:2e:6c:83:99:21:13: 6a:9d:73:d6:d2:da:d5:39:b6:11:74:89:33:c4:ca:c1: 67:71:ec:a0:0a:db:ca:c8:2b:ea:15:d8:08:d4:71:e0: f3:c6:da:6b:0f:ea:3d:72:b4:04:4d:0c:78:f1:3a:c0: 45:66:45:ba:3e:2e:d5:4c:38:21:23:67:26:0c:6a:cc: e2:9d:66:f9:59:98:c3:19:97:01:7a:15:85:73:09:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:1c:b5:2e:98:ef:97:00:01:91:c5:82:b2:95:e9:0b: 52:3d:2c:7a:aa:9a:8e:12:bb:94:df:94:81:db:2b:18: 77:68:f0:23:13:2e:f4:21:7c:11:3e:da:23:4c:85:27: 9b:fc:fd:92:12:7e:a4:17:68:d1:b2:92:47:57:3d:e7: 9a:d5:42:6d:e6:a4:49:ee:6a:b9:cc:c1:aa:7d:d1:85: eb:98:83:ea:e0:30:03:8d:1a:02:cf:44:16:2e:89:54: 38:76:df:a3:66:76:6f:0c:6f:b9:1e:e7:c3:b3:08:66: dd:d6:87:d6:22:e5:54:06:dd:68:2c:2e:dc:cf:40:e8: e3:1c:58:5e:a9:fb:c4:c5:f5:6a:4b:fe:ea:2a:ec:67: f0:a7:f3:18:5d:9a:f7:af:c4:a0:99:46:1f:9c:7a:19: 03:cd:1a:d4:b9:e1:99:ca:ed:75:b2:23:38:a9:46:79: 20:69:a0:c2:a4:cf:45:90:08:c7:6c:78:38:a2:d0:43: 04:1a:18:ec:59:14:00:00:7b:1d:34:69:bf:17:38:03: 95:39:b2:43:23:d7:b2:11:dc:bc:18:f7:08:8d:b7:01: 8a:b4:54:f1:2e:53:04:58:ca:74:04:7e:86:e2:a3:af: 39:d1:18:79:30:2e:5b:b4:46:f8:7f:7f:b0:44:b4:35 Fingerprint (SHA-256): 95:C0:FB:0E:8B:2F:CA:A1:28:EA:6D:C0:A4:84:6F:2C:5A:0D:70:24:52:D1:5C:D2:BA:9C:BA:A1:5D:17:67:9E Fingerprint (SHA1): E9:3F:A3:6C:9D:64:91:69:5E:E4:7C:29:1F:E1:B5:76:F3:19:9F:A0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7432: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #7433: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122856 (0x1e67db68) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 12:33:09 2017 Not After : Tue May 10 12:33:09 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:6e:f8:c1:f0:c8:a1:86:d3:b8:dc:71:d3:29:22:d1: ce:65:cb:b1:e2:f5:a5:5c:43:2b:c9:7c:76:71:bb:30: 85:8d:b7:9f:18:71:c0:b2:87:51:69:2b:7e:34:d6:06: f2:0c:9d:bf:6a:11:f4:cc:91:af:df:10:37:d1:7d:1b: 0c:2b:85:a1:fa:04:45:fa:3e:d4:2f:f5:f7:73:af:d8: 9d:93:86:10:a3:a2:8f:30:ec:00:20:5c:f2:e5:35:c7: 5c:ab:d9:75:31:dc:e1:95:ee:c6:56:bc:ed:23:6d:4f: 4c:75:36:32:7e:ac:a9:35:be:22:76:36:c7:65:5f:53: 1d:f3:98:42:6c:36:53:2e:59:ba:50:1a:90:71:aa:82: f6:21:c5:2b:15:43:08:8e:d8:2f:5b:25:91:56:fa:b9: 0b:dc:4b:60:35:7b:48:8e:f8:ac:70:09:4a:78:d5:6d: 37:5d:7d:cd:cb:6f:b3:d7:e9:8f:f1:66:b6:46:e7:93: 93:41:d0:ea:10:9a:9a:55:bd:7b:f5:1b:33:90:40:5f: 0a:9c:93:2f:8e:42:72:97:7d:69:63:04:3e:da:54:1b: 7d:45:ce:1c:8a:ef:7f:c8:c0:45:15:f9:27:0b:67:22: 18:e4:6c:b8:0a:4e:90:57:cc:e0:35:1a:3b:05:18:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:d6:39:f0:3f:77:41:0a:4b:27:ee:25:49:d6:49:91: 89:56:c3:d9:9d:4f:58:22:c4:ef:78:16:89:66:d5:f7: f0:94:1a:ea:88:27:b8:64:9f:f6:4d:5c:3d:c4:4a:3d: 6f:54:f2:75:be:44:1a:27:20:94:e2:c2:28:65:16:34: 56:a3:73:56:8e:6b:fd:54:13:01:9b:0e:b7:c6:b8:f8: e7:cd:ed:ac:43:0d:d7:ff:ff:ae:c0:8d:42:39:1b:5f: ed:1b:ac:01:f9:2e:bf:6f:13:d5:9e:78:c1:a6:51:d8: 76:ea:c8:ce:50:bd:b9:db:6a:85:f8:b9:dc:d1:37:4b: 28:6f:c4:da:c5:f1:d1:fa:12:36:aa:44:9c:f2:3a:29: 30:9f:6a:f0:b3:d6:21:af:c7:f2:0c:d1:6e:a1:2a:65: 24:1f:bb:e4:27:45:a9:44:78:d3:6b:32:38:a6:a5:24: 04:c2:23:9b:69:59:ba:95:7d:85:7c:4d:4c:3f:79:7a: 89:c4:0f:14:11:84:8a:3c:50:c7:41:88:88:6f:a6:d6: 75:cb:b4:19:1c:03:a8:c2:e9:e4:e6:00:1e:95:2b:1d: 2a:f5:75:4f:49:4d:85:73:1a:6d:ae:eb:54:80:ac:1a: 27:1d:e6:df:a5:49:95:d5:d8:8f:55:8d:ae:e1:93:97 Fingerprint (SHA-256): B3:E2:57:9A:21:CB:1D:11:8D:E5:48:C5:AA:EE:DC:FC:37:B1:5D:C8:4D:79:7C:AD:B8:F8:8B:F7:E6:55:9F:D2 Fingerprint (SHA1): 58:CD:DD:78:06:63:F2:AA:41:DF:F7:F3:A9:BC:55:9C:EE:3D:30:D0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7434: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122857 (0x1e67db69) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:33:10 2017 Not After : Tue May 10 12:33:10 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:d5:75:4c:19:e2:7d:c3:e7:d3:c0:bd:4b:36:87:f2: af:a0:08:0a:58:3f:09:bd:64:2a:39:8e:3d:b0:ef:e6: 6b:0e:29:08:49:0d:0b:80:8f:4c:9a:87:10:cd:02:ed: 42:bb:3a:de:b8:82:a2:19:69:e4:c4:74:7c:a2:f7:4e: 16:7c:16:dc:f7:9b:f0:b2:5b:13:7f:fb:06:e1:6b:2b: de:c6:e9:d0:53:89:2a:45:f6:c6:aa:6d:b2:55:0e:82: e5:8a:45:43:d9:f7:a7:a9:37:38:c2:03:1e:01:ba:2d: f9:7b:72:d7:95:a1:f2:74:2d:40:5c:6c:f1:1e:40:4f: 7d:06:f1:82:1e:f3:45:3b:82:c6:75:ba:1a:f8:0f:dd: e9:e7:7b:78:48:41:d9:52:67:8c:e1:3d:e8:3a:13:19: 81:4d:02:df:fb:53:92:ce:8b:f7:2e:6c:83:99:21:13: 6a:9d:73:d6:d2:da:d5:39:b6:11:74:89:33:c4:ca:c1: 67:71:ec:a0:0a:db:ca:c8:2b:ea:15:d8:08:d4:71:e0: f3:c6:da:6b:0f:ea:3d:72:b4:04:4d:0c:78:f1:3a:c0: 45:66:45:ba:3e:2e:d5:4c:38:21:23:67:26:0c:6a:cc: e2:9d:66:f9:59:98:c3:19:97:01:7a:15:85:73:09:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:1c:b5:2e:98:ef:97:00:01:91:c5:82:b2:95:e9:0b: 52:3d:2c:7a:aa:9a:8e:12:bb:94:df:94:81:db:2b:18: 77:68:f0:23:13:2e:f4:21:7c:11:3e:da:23:4c:85:27: 9b:fc:fd:92:12:7e:a4:17:68:d1:b2:92:47:57:3d:e7: 9a:d5:42:6d:e6:a4:49:ee:6a:b9:cc:c1:aa:7d:d1:85: eb:98:83:ea:e0:30:03:8d:1a:02:cf:44:16:2e:89:54: 38:76:df:a3:66:76:6f:0c:6f:b9:1e:e7:c3:b3:08:66: dd:d6:87:d6:22:e5:54:06:dd:68:2c:2e:dc:cf:40:e8: e3:1c:58:5e:a9:fb:c4:c5:f5:6a:4b:fe:ea:2a:ec:67: f0:a7:f3:18:5d:9a:f7:af:c4:a0:99:46:1f:9c:7a:19: 03:cd:1a:d4:b9:e1:99:ca:ed:75:b2:23:38:a9:46:79: 20:69:a0:c2:a4:cf:45:90:08:c7:6c:78:38:a2:d0:43: 04:1a:18:ec:59:14:00:00:7b:1d:34:69:bf:17:38:03: 95:39:b2:43:23:d7:b2:11:dc:bc:18:f7:08:8d:b7:01: 8a:b4:54:f1:2e:53:04:58:ca:74:04:7e:86:e2:a3:af: 39:d1:18:79:30:2e:5b:b4:46:f8:7f:7f:b0:44:b4:35 Fingerprint (SHA-256): 95:C0:FB:0E:8B:2F:CA:A1:28:EA:6D:C0:A4:84:6F:2C:5A:0D:70:24:52:D1:5C:D2:BA:9C:BA:A1:5D:17:67:9E Fingerprint (SHA1): E9:3F:A3:6C:9D:64:91:69:5E:E4:7C:29:1F:E1:B5:76:F3:19:9F:A0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7435: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122857 (0x1e67db69) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:33:10 2017 Not After : Tue May 10 12:33:10 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:d5:75:4c:19:e2:7d:c3:e7:d3:c0:bd:4b:36:87:f2: af:a0:08:0a:58:3f:09:bd:64:2a:39:8e:3d:b0:ef:e6: 6b:0e:29:08:49:0d:0b:80:8f:4c:9a:87:10:cd:02:ed: 42:bb:3a:de:b8:82:a2:19:69:e4:c4:74:7c:a2:f7:4e: 16:7c:16:dc:f7:9b:f0:b2:5b:13:7f:fb:06:e1:6b:2b: de:c6:e9:d0:53:89:2a:45:f6:c6:aa:6d:b2:55:0e:82: e5:8a:45:43:d9:f7:a7:a9:37:38:c2:03:1e:01:ba:2d: f9:7b:72:d7:95:a1:f2:74:2d:40:5c:6c:f1:1e:40:4f: 7d:06:f1:82:1e:f3:45:3b:82:c6:75:ba:1a:f8:0f:dd: e9:e7:7b:78:48:41:d9:52:67:8c:e1:3d:e8:3a:13:19: 81:4d:02:df:fb:53:92:ce:8b:f7:2e:6c:83:99:21:13: 6a:9d:73:d6:d2:da:d5:39:b6:11:74:89:33:c4:ca:c1: 67:71:ec:a0:0a:db:ca:c8:2b:ea:15:d8:08:d4:71:e0: f3:c6:da:6b:0f:ea:3d:72:b4:04:4d:0c:78:f1:3a:c0: 45:66:45:ba:3e:2e:d5:4c:38:21:23:67:26:0c:6a:cc: e2:9d:66:f9:59:98:c3:19:97:01:7a:15:85:73:09:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:1c:b5:2e:98:ef:97:00:01:91:c5:82:b2:95:e9:0b: 52:3d:2c:7a:aa:9a:8e:12:bb:94:df:94:81:db:2b:18: 77:68:f0:23:13:2e:f4:21:7c:11:3e:da:23:4c:85:27: 9b:fc:fd:92:12:7e:a4:17:68:d1:b2:92:47:57:3d:e7: 9a:d5:42:6d:e6:a4:49:ee:6a:b9:cc:c1:aa:7d:d1:85: eb:98:83:ea:e0:30:03:8d:1a:02:cf:44:16:2e:89:54: 38:76:df:a3:66:76:6f:0c:6f:b9:1e:e7:c3:b3:08:66: dd:d6:87:d6:22:e5:54:06:dd:68:2c:2e:dc:cf:40:e8: e3:1c:58:5e:a9:fb:c4:c5:f5:6a:4b:fe:ea:2a:ec:67: f0:a7:f3:18:5d:9a:f7:af:c4:a0:99:46:1f:9c:7a:19: 03:cd:1a:d4:b9:e1:99:ca:ed:75:b2:23:38:a9:46:79: 20:69:a0:c2:a4:cf:45:90:08:c7:6c:78:38:a2:d0:43: 04:1a:18:ec:59:14:00:00:7b:1d:34:69:bf:17:38:03: 95:39:b2:43:23:d7:b2:11:dc:bc:18:f7:08:8d:b7:01: 8a:b4:54:f1:2e:53:04:58:ca:74:04:7e:86:e2:a3:af: 39:d1:18:79:30:2e:5b:b4:46:f8:7f:7f:b0:44:b4:35 Fingerprint (SHA-256): 95:C0:FB:0E:8B:2F:CA:A1:28:EA:6D:C0:A4:84:6F:2C:5A:0D:70:24:52:D1:5C:D2:BA:9C:BA:A1:5D:17:67:9E Fingerprint (SHA1): E9:3F:A3:6C:9D:64:91:69:5E:E4:7C:29:1F:E1:B5:76:F3:19:9F:A0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7436: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #7437: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122864 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7438: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #7439: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #7440: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122865 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7441: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #7442: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #7443: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7444: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 510122866 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7445: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7446: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #7447: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7448: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 510122867 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7449: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7450: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #7451: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7452: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 510122868 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #7453: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7454: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 510122869 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #7455: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7456: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #7457: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7458: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7459: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 510122870 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7460: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7461: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7462: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7463: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 510122871 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7464: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7465: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #7466: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7467: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510122872 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7468: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7469: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #7470: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7471: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 510122873 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7472: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7473: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7474: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122864 (0x1e67db70) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 12:33:19 2017 Not After : Tue May 10 12:33:19 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:e2:36:ca:70:44:a1:f2:d1:fb:33:7d:d4:ff:ec:ca: 98:92:c1:e5:b7:ce:68:0f:d4:3f:31:46:b4:aa:23:63: ee:5f:21:ce:1e:2b:21:f8:16:ed:b6:83:04:a0:81:0e: e6:f5:27:e7:75:f8:96:6d:da:04:32:e4:79:7e:d0:f6: f8:c5:91:91:b2:49:38:1c:06:df:25:9f:bc:a9:6f:1c: 5d:74:04:93:89:4b:79:f1:16:89:22:3b:b0:68:cb:a5: 0e:b7:15:41:e1:17:6f:f0:c5:9f:60:e7:c9:ca:13:e2: 11:30:0a:10:41:51:1b:b2:49:ce:e0:ef:c0:42:58:72: 1d:3c:ce:b7:f1:74:a7:f7:aa:96:e8:f6:c8:59:8c:3e: a6:af:9f:c6:33:7a:42:bb:55:49:3d:8d:27:16:3e:a2: 8a:5f:27:01:02:ae:30:7c:40:d7:be:c7:c6:b7:5c:02: db:00:60:54:15:2c:96:46:b0:d8:cc:c9:33:df:5e:ab: 7b:85:93:a1:ee:36:40:17:48:90:e0:17:5b:de:be:ff: 11:72:f0:fd:0b:cb:b8:3e:4c:f0:c4:d1:62:44:bb:16: b5:e7:b8:a9:ee:88:cb:35:8f:64:f7:d1:c4:f3:4e:dd: c2:db:8b:54:83:1a:a8:44:3b:2f:b2:b7:f3:c3:f6:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:0c:4e:b0:2d:8e:7d:d7:61:59:6a:b8:2b:a9:cf:e5: b7:64:d5:d6:ca:fc:82:1f:67:80:40:3f:16:ce:d1:55: 2a:82:ea:fa:cb:3d:50:06:f5:c3:ff:b4:9b:ea:1e:c9: 8a:e3:13:97:0a:c9:21:c4:f2:8d:56:03:45:30:42:35: 60:62:e9:f0:7f:fa:69:0c:f6:92:d4:94:31:0c:0d:f9: 87:03:be:c5:2a:15:cc:db:4b:0a:46:cb:a3:24:fc:79: f7:ab:d4:f1:ee:eb:05:d3:88:01:3f:94:59:22:4d:0c: 6e:28:31:18:80:8f:47:b8:14:ef:78:6e:a5:2b:99:a6: 81:80:45:68:f7:39:56:27:cf:1e:23:d4:27:8e:6a:68: a8:6c:d3:19:0f:dc:a6:cd:44:ba:b3:ce:3d:a0:03:6c: d9:02:73:ef:a8:28:f8:e3:21:1f:6a:4b:03:8b:c4:a2: f1:bf:a3:bc:48:11:96:c2:0d:fa:62:a6:3e:fb:35:c5: f2:3e:5a:84:39:d5:8b:c7:39:27:4d:ad:95:05:eb:dc: 81:c2:a3:1a:f4:c7:95:c8:32:6e:f7:66:7e:08:78:2d: d7:ed:5f:6b:0c:ab:7d:c6:29:4f:3e:3a:12:a1:03:d5: 4f:28:41:4c:77:e3:12:6c:38:eb:99:a8:e0:22:f1:c6 Fingerprint (SHA-256): 6B:E6:DE:2C:77:4C:E8:B5:A9:73:52:DE:5F:B8:6D:70:0F:35:D3:D3:EE:82:D0:F6:FE:36:B3:91:E8:84:8D:4C Fingerprint (SHA1): DE:06:5F:0C:6F:38:14:D7:47:7F:23:A5:CD:DE:28:95:AA:FD:98:8A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #7475: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7476: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7477: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7478: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7479: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7480: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7481: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7482: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7483: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122865 (0x1e67db71) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:33:20 2017 Not After : Tue May 10 12:33:20 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:93:8b:cd:7f:e7:09:18:45:a7:ee:14:5a:81:8d:39: 37:9e:de:05:39:ec:b2:6b:96:8f:13:82:51:2b:00:06: 6a:e0:d2:dd:06:e0:82:39:d3:f5:b5:23:b4:3e:63:10: 8d:f9:c1:53:73:1e:41:8d:10:e8:14:d1:54:40:00:8e: 93:e6:29:44:c8:69:89:0f:c7:21:14:38:c2:68:df:9f: 1e:86:6b:ab:a3:23:75:df:fe:ac:40:e0:bc:d5:a7:df: 20:d2:51:c1:cc:66:30:95:ce:99:92:57:28:d1:ce:ea: ef:04:64:bc:d3:f5:61:1f:ca:ce:cf:71:c9:5d:a3:c4: f7:3d:f0:fc:4b:b4:4c:65:7c:91:cf:b7:f3:72:bf:49: aa:f1:f2:0c:63:f7:de:80:2e:7d:50:30:85:02:18:6f: 31:95:88:7d:01:db:e2:de:6a:ba:dc:af:f6:fb:14:3d: d4:61:59:b9:05:b3:55:0a:e4:87:75:d8:ef:9a:15:db: 93:52:b6:bb:b2:34:59:0a:e6:25:be:d4:7c:b8:be:6a: 19:a9:95:50:83:cb:9c:de:f7:1e:f0:64:ab:30:7b:9c: c4:be:03:00:2c:2e:21:b2:be:8e:15:57:c1:62:4c:f4: 95:2b:a0:7d:9b:7d:86:e6:00:f5:24:a8:17:18:38:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9b:a2:48:4c:bd:1f:da:05:51:3a:a5:3b:27:14:44:62: 1a:4e:e6:75:5a:c3:eb:ff:f6:44:bc:c1:62:e4:ae:a1: 59:5b:42:df:c1:d8:12:d8:64:39:9b:17:f2:1f:8e:61: ed:d6:ae:3e:e2:09:b4:8b:f7:68:32:2d:25:23:4a:00: e2:ab:1c:e8:75:19:30:49:38:16:c5:f2:4e:6d:00:f5: 97:08:7b:43:4a:e5:70:72:24:dd:17:d9:9c:85:89:78: 37:53:87:94:be:53:b7:a5:70:f8:db:db:78:70:ee:36: 75:9c:da:5f:05:61:36:16:53:5d:1e:10:54:c7:f7:42: 00:76:52:57:97:fa:fb:4e:f1:69:71:52:86:f3:dc:b6: 1c:bb:ce:50:e6:e1:68:15:e6:08:5a:fd:16:17:89:3c: 5b:01:5f:f9:6b:69:17:38:ea:5b:12:12:b1:fc:b3:85: ef:48:af:53:fa:a3:15:d4:39:a5:ac:4c:01:c1:6c:7f: 30:f3:12:c5:00:e2:ec:51:d6:8e:5b:30:97:4a:ab:43: 97:62:80:0e:36:1b:46:41:95:b8:5b:fa:bc:94:ad:41: c0:16:3c:95:18:89:f3:a1:93:3d:ee:22:04:d0:86:58: 2b:c4:29:03:b6:a1:5f:ed:3a:1b:0a:79:c3:4e:0a:e2 Fingerprint (SHA-256): 9E:F7:56:13:47:5C:D2:55:F5:23:93:1C:62:56:2B:02:DD:42:4A:EA:A9:EC:16:AD:6D:A0:E7:8E:22:D4:C2:D9 Fingerprint (SHA1): 03:DF:C0:AF:F7:D3:56:81:65:9E:C9:3A:5B:D4:24:0F:9B:B1:FA:57 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #7484: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7485: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7486: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7487: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7488: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7489: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7490: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #7491: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #7492: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #7493: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #7494: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #7495: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #7496: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #7497: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #7498: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #7499: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #7500: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #7501: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #7502: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122874 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7503: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #7504: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7505: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7506: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510122875 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7507: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7508: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #7509: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7510: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510122876 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7511: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7512: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7513: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7514: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 510122877 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7515: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7516: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #7517: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7518: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 510122878 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7519: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7520: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #7521: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7522: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 510122879 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7523: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7524: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #7525: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7526: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 510122880 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7527: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7528: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #7529: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7530: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 510122881 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7531: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7532: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #7533: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7534: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 510122882 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7535: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7536: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7537: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122874 (0x1e67db7a) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:33:34 2017 Not After : Tue May 10 12:33:34 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 7a:49:ac:bf:07:1e:26:7e:bc:3e:85:ef:e7:2f:a1:f0: 08:cb:bf:2e:f8:33:e2:84:16:9e:65:66:6d:48:93:51: 30:ac:0b:60:f6:ee:27:53:8a:4e:cd:8b:54:ab:0f:90: a0:90:5a:5c:42:e4:2c:81:59:70:0c:3b:0d:45:de:43: ae:1a:18:b4:01:e7:91:af:fd:87:e0:01:3d:ae:1f:c7: 9b:49:cb:93:ad:4d:2f:e1:0c:25:71:34:dd:d8:8c:d6: b2:af:5f:1b:4b:94:ad:8c:48:e4:46:e5:96:13:38:15: c3:78:d4:53:53:76:f9:60:c5:d7:f0:5d:78:47:46:da: 9c:05:35:88:1e:8c:48:c4:02:40:49:d2:06:06:2d:a0: 4f:93:b3:14:84:81:98:ab:55:bb:fd:72:dd:63:4f:18: 08:f6:fb:d4:5b:1b:4a:13:27:2f:4a:99:04:ed:7d:d9: 92:29:73:4f:14:f8:e9:24:dc:8f:27:e1:c2:d7:62:2f: a5:ec:0b:67:e2:aa:e4:27:a3:d8:41:5c:a7:76:5e:c9: 75:15:52:a1:65:07:c4:39:3b:33:90:af:07:44:d8:9e: 09:e8:dd:6d:76:42:43:a3:88:2c:aa:a6:a6:c1:11:70: 6a:23:53:9e:06:c9:f9:3a:7a:9f:1f:be:03:3c:76:bb Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:22:a0:fa:03:2d:e9:db:91:37:8d:7b:3f: 60:8d:ba:33:34:d2:be:e8:37:1f:c4:f3:60:79:ee:aa: 02:1c:14:ab:9e:7f:85:3e:fd:8a:da:a8:c7:5f:91:dd: a1:4a:5f:a6:04:fe:03:d4:f0:ff:f0:06:d6:7f Fingerprint (SHA-256): 18:85:65:84:EF:F4:E6:35:E7:E9:46:52:A0:D5:B2:A3:BB:AC:9F:68:8F:6E:BE:A1:A3:D5:E9:EA:44:66:8A:81 Fingerprint (SHA1): 40:94:B0:00:00:FF:17:5E:0F:40:68:4F:65:3B:5A:42:33:7D:C0:7E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7538: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122874 (0x1e67db7a) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:33:34 2017 Not After : Tue May 10 12:33:34 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 7a:49:ac:bf:07:1e:26:7e:bc:3e:85:ef:e7:2f:a1:f0: 08:cb:bf:2e:f8:33:e2:84:16:9e:65:66:6d:48:93:51: 30:ac:0b:60:f6:ee:27:53:8a:4e:cd:8b:54:ab:0f:90: a0:90:5a:5c:42:e4:2c:81:59:70:0c:3b:0d:45:de:43: ae:1a:18:b4:01:e7:91:af:fd:87:e0:01:3d:ae:1f:c7: 9b:49:cb:93:ad:4d:2f:e1:0c:25:71:34:dd:d8:8c:d6: b2:af:5f:1b:4b:94:ad:8c:48:e4:46:e5:96:13:38:15: c3:78:d4:53:53:76:f9:60:c5:d7:f0:5d:78:47:46:da: 9c:05:35:88:1e:8c:48:c4:02:40:49:d2:06:06:2d:a0: 4f:93:b3:14:84:81:98:ab:55:bb:fd:72:dd:63:4f:18: 08:f6:fb:d4:5b:1b:4a:13:27:2f:4a:99:04:ed:7d:d9: 92:29:73:4f:14:f8:e9:24:dc:8f:27:e1:c2:d7:62:2f: a5:ec:0b:67:e2:aa:e4:27:a3:d8:41:5c:a7:76:5e:c9: 75:15:52:a1:65:07:c4:39:3b:33:90:af:07:44:d8:9e: 09:e8:dd:6d:76:42:43:a3:88:2c:aa:a6:a6:c1:11:70: 6a:23:53:9e:06:c9:f9:3a:7a:9f:1f:be:03:3c:76:bb Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:22:a0:fa:03:2d:e9:db:91:37:8d:7b:3f: 60:8d:ba:33:34:d2:be:e8:37:1f:c4:f3:60:79:ee:aa: 02:1c:14:ab:9e:7f:85:3e:fd:8a:da:a8:c7:5f:91:dd: a1:4a:5f:a6:04:fe:03:d4:f0:ff:f0:06:d6:7f Fingerprint (SHA-256): 18:85:65:84:EF:F4:E6:35:E7:E9:46:52:A0:D5:B2:A3:BB:AC:9F:68:8F:6E:BE:A1:A3:D5:E9:EA:44:66:8A:81 Fingerprint (SHA1): 40:94:B0:00:00:FF:17:5E:0F:40:68:4F:65:3B:5A:42:33:7D:C0:7E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #7539: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122874 (0x1e67db7a) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:33:34 2017 Not After : Tue May 10 12:33:34 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 7a:49:ac:bf:07:1e:26:7e:bc:3e:85:ef:e7:2f:a1:f0: 08:cb:bf:2e:f8:33:e2:84:16:9e:65:66:6d:48:93:51: 30:ac:0b:60:f6:ee:27:53:8a:4e:cd:8b:54:ab:0f:90: a0:90:5a:5c:42:e4:2c:81:59:70:0c:3b:0d:45:de:43: ae:1a:18:b4:01:e7:91:af:fd:87:e0:01:3d:ae:1f:c7: 9b:49:cb:93:ad:4d:2f:e1:0c:25:71:34:dd:d8:8c:d6: b2:af:5f:1b:4b:94:ad:8c:48:e4:46:e5:96:13:38:15: c3:78:d4:53:53:76:f9:60:c5:d7:f0:5d:78:47:46:da: 9c:05:35:88:1e:8c:48:c4:02:40:49:d2:06:06:2d:a0: 4f:93:b3:14:84:81:98:ab:55:bb:fd:72:dd:63:4f:18: 08:f6:fb:d4:5b:1b:4a:13:27:2f:4a:99:04:ed:7d:d9: 92:29:73:4f:14:f8:e9:24:dc:8f:27:e1:c2:d7:62:2f: a5:ec:0b:67:e2:aa:e4:27:a3:d8:41:5c:a7:76:5e:c9: 75:15:52:a1:65:07:c4:39:3b:33:90:af:07:44:d8:9e: 09:e8:dd:6d:76:42:43:a3:88:2c:aa:a6:a6:c1:11:70: 6a:23:53:9e:06:c9:f9:3a:7a:9f:1f:be:03:3c:76:bb Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:22:a0:fa:03:2d:e9:db:91:37:8d:7b:3f: 60:8d:ba:33:34:d2:be:e8:37:1f:c4:f3:60:79:ee:aa: 02:1c:14:ab:9e:7f:85:3e:fd:8a:da:a8:c7:5f:91:dd: a1:4a:5f:a6:04:fe:03:d4:f0:ff:f0:06:d6:7f Fingerprint (SHA-256): 18:85:65:84:EF:F4:E6:35:E7:E9:46:52:A0:D5:B2:A3:BB:AC:9F:68:8F:6E:BE:A1:A3:D5:E9:EA:44:66:8A:81 Fingerprint (SHA1): 40:94:B0:00:00:FF:17:5E:0F:40:68:4F:65:3B:5A:42:33:7D:C0:7E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #7540: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122874 (0x1e67db7a) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:33:34 2017 Not After : Tue May 10 12:33:34 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 7a:49:ac:bf:07:1e:26:7e:bc:3e:85:ef:e7:2f:a1:f0: 08:cb:bf:2e:f8:33:e2:84:16:9e:65:66:6d:48:93:51: 30:ac:0b:60:f6:ee:27:53:8a:4e:cd:8b:54:ab:0f:90: a0:90:5a:5c:42:e4:2c:81:59:70:0c:3b:0d:45:de:43: ae:1a:18:b4:01:e7:91:af:fd:87:e0:01:3d:ae:1f:c7: 9b:49:cb:93:ad:4d:2f:e1:0c:25:71:34:dd:d8:8c:d6: b2:af:5f:1b:4b:94:ad:8c:48:e4:46:e5:96:13:38:15: c3:78:d4:53:53:76:f9:60:c5:d7:f0:5d:78:47:46:da: 9c:05:35:88:1e:8c:48:c4:02:40:49:d2:06:06:2d:a0: 4f:93:b3:14:84:81:98:ab:55:bb:fd:72:dd:63:4f:18: 08:f6:fb:d4:5b:1b:4a:13:27:2f:4a:99:04:ed:7d:d9: 92:29:73:4f:14:f8:e9:24:dc:8f:27:e1:c2:d7:62:2f: a5:ec:0b:67:e2:aa:e4:27:a3:d8:41:5c:a7:76:5e:c9: 75:15:52:a1:65:07:c4:39:3b:33:90:af:07:44:d8:9e: 09:e8:dd:6d:76:42:43:a3:88:2c:aa:a6:a6:c1:11:70: 6a:23:53:9e:06:c9:f9:3a:7a:9f:1f:be:03:3c:76:bb Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:22:a0:fa:03:2d:e9:db:91:37:8d:7b:3f: 60:8d:ba:33:34:d2:be:e8:37:1f:c4:f3:60:79:ee:aa: 02:1c:14:ab:9e:7f:85:3e:fd:8a:da:a8:c7:5f:91:dd: a1:4a:5f:a6:04:fe:03:d4:f0:ff:f0:06:d6:7f Fingerprint (SHA-256): 18:85:65:84:EF:F4:E6:35:E7:E9:46:52:A0:D5:B2:A3:BB:AC:9F:68:8F:6E:BE:A1:A3:D5:E9:EA:44:66:8A:81 Fingerprint (SHA1): 40:94:B0:00:00:FF:17:5E:0F:40:68:4F:65:3B:5A:42:33:7D:C0:7E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #7541: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #7542: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 10 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7543: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #7544: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #7545: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7546: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7547: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7548: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7549: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7550: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7551: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7552: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #7553: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7554: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7555: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7556: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #7557: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7558: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7559: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7560: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7561: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7562: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7563: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7564: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #7565: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7566: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7567: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7568: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20170510123351Z nextupdate=20180510123351Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed May 10 12:33:51 2017 Next Update: Thu May 10 12:33:51 2018 CRL Extensions: chains.sh: #7569: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510123351Z nextupdate=20180510123351Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 12:33:51 2017 Next Update: Thu May 10 12:33:51 2018 CRL Extensions: chains.sh: #7570: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170510123351Z nextupdate=20180510123351Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed May 10 12:33:51 2017 Next Update: Thu May 10 12:33:51 2018 CRL Extensions: chains.sh: #7571: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20170510123351Z nextupdate=20180510123351Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed May 10 12:33:51 2017 Next Update: Thu May 10 12:33:51 2018 CRL Extensions: chains.sh: #7572: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170510123353Z addcert 14 20170510123353Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed May 10 12:33:53 2017 Next Update: Thu May 10 12:33:51 2018 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Wed May 10 12:33:53 2017 CRL Extensions: chains.sh: #7573: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510123354Z addcert 15 20170510123354Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 12:33:54 2017 Next Update: Thu May 10 12:33:51 2018 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Wed May 10 12:33:54 2017 CRL Extensions: chains.sh: #7574: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7575: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7576: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #7577: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #7578: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #7579: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #7580: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #7581: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #7582: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #7583: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:33:42 2017 Not After : Tue May 10 12:33:42 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:e0:8b:11:23:da:99:bb:8e:f7:70:12:89:51:24:a3: ed:d1:18:8c:bb:c6:f6:31:9b:9f:33:ea:66:71:41:ef: 2e:93:da:9d:43:7f:5b:80:6a:b5:73:28:1a:68:9d:b0: 3c:ce:3c:c3:72:d7:ab:01:c6:1c:ab:3a:62:b7:1f:7b: 5c:f6:ff:09:cd:b2:3a:e4:56:c6:d9:92:fd:2f:a5:92: 1b:41:e2:2b:d6:d9:9f:16:e8:9d:9c:14:c0:31:2b:86: 64:48:f2:26:8c:f0:4d:96:98:5d:a7:dd:e3:97:1e:7b: 25:32:35:a9:8b:ba:58:e5:21:e9:6a:fd:4b:ff:b2:94: 14:64:59:19:d1:f9:74:64:93:eb:e9:89:90:fc:1d:86: 49:9c:39:62:71:94:68:a6:79:ff:f4:4e:60:2d:0b:d5: 12:69:81:ce:a1:96:41:a0:b0:8d:22:3b:66:f1:a9:d7: f5:10:ca:95:0c:d3:82:99:03:6b:8b:e9:da:fa:64:16: cc:97:bf:ea:b9:14:9d:2a:48:61:00:75:bf:c4:4a:33: cd:3b:fe:3e:28:e4:68:25:43:9c:4f:98:08:2b:29:44: 19:9a:26:b5:c7:37:f3:bb:ee:ac:67:6c:f3:82:94:74: 3f:05:55:df:b3:03:fc:02:43:9d:41:40:75:f0:ed:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:a8:9a:d7:46:95:26:38:51:8a:c9:d0:5f:59:0b:ec: 83:75:ae:f1:15:be:c9:a5:e8:93:3b:10:11:ab:25:f6: f3:48:86:35:2d:c5:91:64:ef:c5:88:97:52:33:cc:46: f1:c6:8b:77:88:4f:70:52:b4:74:8a:47:b6:61:8a:bd: 50:e9:56:d9:5e:ff:6e:2a:1f:92:24:ee:81:7b:ad:2e: 6f:71:be:39:13:ce:f2:e6:cc:7e:c3:96:a9:38:84:b6: 75:de:73:70:21:f1:ed:71:4a:20:5d:e4:7a:00:9c:e9: a3:b2:81:eb:c7:6a:b3:75:5f:00:ab:15:d0:25:c7:fc: cc:03:6f:90:7f:7f:9e:1e:7e:02:34:24:2a:c4:e1:3d: 55:e7:0d:4b:9d:78:c6:6c:4a:b0:ae:5f:e8:74:57:0d: 99:54:8e:cf:99:b6:6d:e5:6b:ae:ad:4e:7a:34:84:b6: 74:c9:21:38:2f:aa:bc:8c:06:3e:ac:0e:d6:cb:3e:ed: cc:0e:ad:c2:df:6b:4a:e1:e7:fe:0c:3e:97:17:cf:f4: a4:d9:93:17:fb:3e:bc:ac:ec:49:47:f0:9c:f3:df:98: 25:64:08:00:7c:31:b3:6c:c3:8b:d2:a3:25:e9:67:9f: d5:f5:59:ae:26:14:23:4b:64:7b:23:5c:d4:ae:c2:61 Fingerprint (SHA-256): 94:0E:CC:76:A3:0C:02:0A:92:52:F9:DB:F0:51:37:DA:A6:0C:93:95:FE:A3:E0:FC:F8:69:26:73:57:12:24:75 Fingerprint (SHA1): EA:96:06:8E:B1:89:13:A3:41:FA:0F:79:05:39:44:02:6C:25:F8:3A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #7584: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #7585: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:33:42 2017 Not After : Tue May 10 12:33:42 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:e0:8b:11:23:da:99:bb:8e:f7:70:12:89:51:24:a3: ed:d1:18:8c:bb:c6:f6:31:9b:9f:33:ea:66:71:41:ef: 2e:93:da:9d:43:7f:5b:80:6a:b5:73:28:1a:68:9d:b0: 3c:ce:3c:c3:72:d7:ab:01:c6:1c:ab:3a:62:b7:1f:7b: 5c:f6:ff:09:cd:b2:3a:e4:56:c6:d9:92:fd:2f:a5:92: 1b:41:e2:2b:d6:d9:9f:16:e8:9d:9c:14:c0:31:2b:86: 64:48:f2:26:8c:f0:4d:96:98:5d:a7:dd:e3:97:1e:7b: 25:32:35:a9:8b:ba:58:e5:21:e9:6a:fd:4b:ff:b2:94: 14:64:59:19:d1:f9:74:64:93:eb:e9:89:90:fc:1d:86: 49:9c:39:62:71:94:68:a6:79:ff:f4:4e:60:2d:0b:d5: 12:69:81:ce:a1:96:41:a0:b0:8d:22:3b:66:f1:a9:d7: f5:10:ca:95:0c:d3:82:99:03:6b:8b:e9:da:fa:64:16: cc:97:bf:ea:b9:14:9d:2a:48:61:00:75:bf:c4:4a:33: cd:3b:fe:3e:28:e4:68:25:43:9c:4f:98:08:2b:29:44: 19:9a:26:b5:c7:37:f3:bb:ee:ac:67:6c:f3:82:94:74: 3f:05:55:df:b3:03:fc:02:43:9d:41:40:75:f0:ed:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:a8:9a:d7:46:95:26:38:51:8a:c9:d0:5f:59:0b:ec: 83:75:ae:f1:15:be:c9:a5:e8:93:3b:10:11:ab:25:f6: f3:48:86:35:2d:c5:91:64:ef:c5:88:97:52:33:cc:46: f1:c6:8b:77:88:4f:70:52:b4:74:8a:47:b6:61:8a:bd: 50:e9:56:d9:5e:ff:6e:2a:1f:92:24:ee:81:7b:ad:2e: 6f:71:be:39:13:ce:f2:e6:cc:7e:c3:96:a9:38:84:b6: 75:de:73:70:21:f1:ed:71:4a:20:5d:e4:7a:00:9c:e9: a3:b2:81:eb:c7:6a:b3:75:5f:00:ab:15:d0:25:c7:fc: cc:03:6f:90:7f:7f:9e:1e:7e:02:34:24:2a:c4:e1:3d: 55:e7:0d:4b:9d:78:c6:6c:4a:b0:ae:5f:e8:74:57:0d: 99:54:8e:cf:99:b6:6d:e5:6b:ae:ad:4e:7a:34:84:b6: 74:c9:21:38:2f:aa:bc:8c:06:3e:ac:0e:d6:cb:3e:ed: cc:0e:ad:c2:df:6b:4a:e1:e7:fe:0c:3e:97:17:cf:f4: a4:d9:93:17:fb:3e:bc:ac:ec:49:47:f0:9c:f3:df:98: 25:64:08:00:7c:31:b3:6c:c3:8b:d2:a3:25:e9:67:9f: d5:f5:59:ae:26:14:23:4b:64:7b:23:5c:d4:ae:c2:61 Fingerprint (SHA-256): 94:0E:CC:76:A3:0C:02:0A:92:52:F9:DB:F0:51:37:DA:A6:0C:93:95:FE:A3:E0:FC:F8:69:26:73:57:12:24:75 Fingerprint (SHA1): EA:96:06:8E:B1:89:13:A3:41:FA:0F:79:05:39:44:02:6C:25:F8:3A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #7586: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #7587: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #7588: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122883 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7589: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #7590: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #7591: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7592: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 510122884 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7593: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7594: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7595: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510122655.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #7596: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0Root-510122629.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7597: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7598: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #7599: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510122655.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #7600: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 510122885 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7601: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7602: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7603: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510122655.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #7604: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0Root-510122630.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7605: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7606: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #7607: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7608: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 510122886 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7609: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7610: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #7611: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510122655.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #7612: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0Root-510122631.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7613: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7614: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #7615: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510122655.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #7616: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0Root-510122632.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7617: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7618: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20170510123405Z nextupdate=20180510123405Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed May 10 12:34:05 2017 Next Update: Thu May 10 12:34:05 2018 CRL Extensions: chains.sh: #7619: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510123405Z nextupdate=20180510123405Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 12:34:05 2017 Next Update: Thu May 10 12:34:05 2018 CRL Extensions: chains.sh: #7620: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170510123405Z nextupdate=20180510123405Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed May 10 12:34:05 2017 Next Update: Thu May 10 12:34:05 2018 CRL Extensions: chains.sh: #7621: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20170510123405Z nextupdate=20180510123405Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed May 10 12:34:05 2017 Next Update: Thu May 10 12:34:05 2018 CRL Extensions: chains.sh: #7622: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510123406Z addcert 20 20170510123406Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 12:34:06 2017 Next Update: Thu May 10 12:34:05 2018 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed May 10 12:34:06 2017 CRL Extensions: chains.sh: #7623: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510123407Z addcert 40 20170510123407Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 12:34:07 2017 Next Update: Thu May 10 12:34:05 2018 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed May 10 12:34:06 2017 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Wed May 10 12:34:07 2017 CRL Extensions: chains.sh: #7624: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7625: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7626: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #7627: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122883 (0x1e67db83) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:33:56 2017 Not After : Tue May 10 12:33:56 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:b8:d9:cf:e0:6c:bb:67:29:c5:e5:bd:4b:6f:f4:fc: 48:91:a4:d0:7d:54:57:d8:52:75:3a:54:73:40:2a:74: 82:ce:55:e7:6d:f0:b3:55:39:0b:95:22:a7:95:4d:c8: 99:5c:cd:f0:50:ce:9e:17:0b:19:a6:19:3f:ac:ad:54: ea:01:20:e6:2e:a1:e7:d3:cb:65:7c:89:14:1d:30:c5: d8:22:8f:dc:cd:58:3b:11:e0:8b:0d:8a:b8:20:4a:60: 35:06:01:28:08:b0:4d:a9:cf:8b:a7:cc:98:9e:62:40: da:ec:78:ec:d5:4c:df:6e:d0:41:df:e4:c3:66:a2:dd: de:8e:4c:30:9d:84:f4:61:03:a6:98:69:79:0e:3e:b6: 12:85:02:c1:15:9d:8e:89:65:95:3f:9f:4f:83:33:c2: 62:a1:3e:aa:10:f2:4e:e9:ae:67:10:fa:c2:e9:1f:41: 38:e4:bb:65:2a:41:cb:91:8e:dc:a7:6c:e2:74:61:d8: 86:ff:d1:4b:d8:73:de:cb:ef:46:eb:dc:2d:8f:df:17: 21:8b:b8:57:d5:f5:df:b1:f3:54:6d:1c:70:1f:49:e6: eb:3a:ec:38:8c:d5:e1:9c:39:a8:3a:3a:11:b9:24:28: 3f:c8:3b:f9:c5:f0:fa:46:ae:f0:d0:6e:bc:1f:91:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:11:b8:6f:fa:30:91:13:43:6b:d5:8b:3b:f1:c4:fe: 39:3e:bf:8e:4c:14:46:b4:31:e2:ae:fd:3f:6e:43:09: e3:ac:ca:a1:a0:59:b9:fa:89:dd:42:f3:44:70:6d:75: d0:24:5d:5b:81:1a:94:bb:f0:5a:62:9a:9f:24:23:16: 44:be:00:76:3e:2a:7d:46:85:b0:50:21:26:ed:ed:a5: 4c:95:95:88:a6:24:0b:53:64:5f:bc:a4:57:8a:c5:72: 65:4f:7a:8f:3c:1c:69:3f:5d:68:d5:fc:38:35:b7:97: 28:b2:e1:6d:58:ae:fd:9b:2b:e1:a0:2c:19:c2:6b:40: 53:0c:76:90:69:66:86:50:37:1a:2b:4f:75:7c:95:7d: da:67:86:2f:e7:1a:07:e6:b8:63:a8:ad:f7:b4:8f:31: c8:e5:5a:17:7c:ba:55:9f:83:27:19:d9:14:9c:d5:81: 07:f0:7d:d0:44:66:e7:7f:f7:2b:41:c6:43:f4:46:34: e2:3c:c7:05:f3:19:6c:6d:4f:33:79:c3:98:3f:ca:99: d1:93:af:b1:b7:34:f8:98:fd:9a:f2:5b:77:57:fe:d2: 32:51:32:ae:ef:7d:f8:ab:89:77:99:67:c0:5d:77:5a: 37:41:94:c6:fa:1c:12:e8:53:46:68:80:4e:ae:18:3a Fingerprint (SHA-256): 0B:9E:DC:F6:E1:2B:C2:5C:1D:3D:1D:49:29:2E:54:82:A6:0B:16:7C:F0:75:BB:2E:9F:2E:31:26:BB:7A:B1:E5 Fingerprint (SHA1): 12:BA:46:E4:84:66:CD:18:27:E6:D3:96:BB:B3:06:A4:B1:7C:21:5D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #7628: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #7629: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122883 (0x1e67db83) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:33:56 2017 Not After : Tue May 10 12:33:56 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:b8:d9:cf:e0:6c:bb:67:29:c5:e5:bd:4b:6f:f4:fc: 48:91:a4:d0:7d:54:57:d8:52:75:3a:54:73:40:2a:74: 82:ce:55:e7:6d:f0:b3:55:39:0b:95:22:a7:95:4d:c8: 99:5c:cd:f0:50:ce:9e:17:0b:19:a6:19:3f:ac:ad:54: ea:01:20:e6:2e:a1:e7:d3:cb:65:7c:89:14:1d:30:c5: d8:22:8f:dc:cd:58:3b:11:e0:8b:0d:8a:b8:20:4a:60: 35:06:01:28:08:b0:4d:a9:cf:8b:a7:cc:98:9e:62:40: da:ec:78:ec:d5:4c:df:6e:d0:41:df:e4:c3:66:a2:dd: de:8e:4c:30:9d:84:f4:61:03:a6:98:69:79:0e:3e:b6: 12:85:02:c1:15:9d:8e:89:65:95:3f:9f:4f:83:33:c2: 62:a1:3e:aa:10:f2:4e:e9:ae:67:10:fa:c2:e9:1f:41: 38:e4:bb:65:2a:41:cb:91:8e:dc:a7:6c:e2:74:61:d8: 86:ff:d1:4b:d8:73:de:cb:ef:46:eb:dc:2d:8f:df:17: 21:8b:b8:57:d5:f5:df:b1:f3:54:6d:1c:70:1f:49:e6: eb:3a:ec:38:8c:d5:e1:9c:39:a8:3a:3a:11:b9:24:28: 3f:c8:3b:f9:c5:f0:fa:46:ae:f0:d0:6e:bc:1f:91:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:11:b8:6f:fa:30:91:13:43:6b:d5:8b:3b:f1:c4:fe: 39:3e:bf:8e:4c:14:46:b4:31:e2:ae:fd:3f:6e:43:09: e3:ac:ca:a1:a0:59:b9:fa:89:dd:42:f3:44:70:6d:75: d0:24:5d:5b:81:1a:94:bb:f0:5a:62:9a:9f:24:23:16: 44:be:00:76:3e:2a:7d:46:85:b0:50:21:26:ed:ed:a5: 4c:95:95:88:a6:24:0b:53:64:5f:bc:a4:57:8a:c5:72: 65:4f:7a:8f:3c:1c:69:3f:5d:68:d5:fc:38:35:b7:97: 28:b2:e1:6d:58:ae:fd:9b:2b:e1:a0:2c:19:c2:6b:40: 53:0c:76:90:69:66:86:50:37:1a:2b:4f:75:7c:95:7d: da:67:86:2f:e7:1a:07:e6:b8:63:a8:ad:f7:b4:8f:31: c8:e5:5a:17:7c:ba:55:9f:83:27:19:d9:14:9c:d5:81: 07:f0:7d:d0:44:66:e7:7f:f7:2b:41:c6:43:f4:46:34: e2:3c:c7:05:f3:19:6c:6d:4f:33:79:c3:98:3f:ca:99: d1:93:af:b1:b7:34:f8:98:fd:9a:f2:5b:77:57:fe:d2: 32:51:32:ae:ef:7d:f8:ab:89:77:99:67:c0:5d:77:5a: 37:41:94:c6:fa:1c:12:e8:53:46:68:80:4e:ae:18:3a Fingerprint (SHA-256): 0B:9E:DC:F6:E1:2B:C2:5C:1D:3D:1D:49:29:2E:54:82:A6:0B:16:7C:F0:75:BB:2E:9F:2E:31:26:BB:7A:B1:E5 Fingerprint (SHA1): 12:BA:46:E4:84:66:CD:18:27:E6:D3:96:BB:B3:06:A4:B1:7C:21:5D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #7630: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #7631: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #7632: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122887 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7633: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #7634: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7635: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7636: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 510122888 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7637: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7638: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7639: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7640: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510122889 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7641: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7642: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #7643: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7644: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 510122890 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7645: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7646: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #7647: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -m 510122891 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7648: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #7649: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #7650: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7651: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 510122892 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7652: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7653: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #7654: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7655: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 510122893 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7656: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7657: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #7658: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #7659: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #7660: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122887 (0x1e67db87) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:34:09 2017 Not After : Tue May 10 12:34:09 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:83:4c:aa:60:b1:17:30:31:02:a3:72:aa:6b:ec:80: dc:95:97:2e:ba:22:51:a1:9f:2f:a1:c5:01:66:29:5e: da:93:4b:ec:d2:30:d1:e7:54:78:7c:41:c8:7c:32:59: 50:0d:85:f4:6e:05:a0:22:e7:9f:d4:4a:fc:49:89:f1: ba:cb:4f:ac:57:1e:74:44:e6:10:dc:a0:e2:d3:f2:2a: cf:7d:65:7a:35:d6:98:2e:41:a1:49:ea:5c:fe:3c:15: dd:92:62:bd:2d:78:e4:25:c4:ab:ac:e3:c6:e0:8d:bd: 25:c8:f8:60:14:91:cc:75:a1:f6:d1:31:44:1f:2d:2c: 79:ef:a2:09:a3:0a:a6:da:7c:dc:8e:fe:65:41:5e:84: 6d:46:3f:cc:7d:d1:db:71:b7:25:b1:2b:c1:71:60:68: 91:f2:bc:07:6d:54:09:56:d7:ec:5c:f3:f7:32:8b:d2: 31:44:4a:09:7a:5c:57:79:11:79:1b:6d:a7:27:5f:3b: 9b:73:4b:e2:78:4b:3a:af:cd:7d:da:a3:4f:2b:a4:85: 06:fe:d2:a5:10:95:a9:16:54:85:e9:d1:41:9e:52:cd: df:02:9f:cf:54:a9:49:d4:92:24:ea:16:77:95:d9:af: 87:38:74:c6:14:8c:27:d1:4e:0d:a7:2d:a6:59:9a:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:8f:81:2f:2b:e2:53:33:5c:3a:29:92:d4:54:47:4f: d7:09:2f:77:33:be:d3:71:b2:9e:44:c1:c4:f3:a8:43: cd:ad:60:84:4d:ad:cd:e9:78:23:f3:73:7e:02:a0:04: 16:34:86:f6:77:c1:6c:0b:bd:f1:9c:80:b8:f7:07:25: 10:31:04:5e:6f:5c:c9:a5:eb:c3:c1:fd:2a:3c:e0:45: 99:49:1d:51:5d:22:11:e3:44:e0:30:ce:60:c0:a3:4d: e5:ba:3c:01:9f:1e:20:2b:37:f0:ec:eb:88:50:45:c6: 11:72:66:44:29:d5:81:77:f9:3a:a5:d6:02:af:c3:fe: e9:0b:c5:3a:13:9f:c8:72:09:e0:af:4d:5b:a4:20:76: 7b:d2:cc:ae:76:3f:2a:c2:5a:1d:83:22:9a:d0:3a:ae: b7:b6:e4:7c:29:3d:1d:94:00:d8:60:bd:eb:91:20:d0: 19:48:93:d2:0f:d5:a7:20:fd:a6:87:56:bc:d1:fa:1e: 9e:0b:59:9b:82:0c:55:9e:18:b4:a9:28:c0:47:e6:e2: 52:85:38:91:13:79:8a:da:93:4c:13:3f:3b:e4:10:c0: a9:31:17:15:86:71:b0:34:d1:fd:9f:1e:04:c5:65:8f: 9c:e5:d7:f1:a5:bc:ef:73:5a:61:84:ca:8d:d8:4d:6c Fingerprint (SHA-256): 91:90:F1:FA:22:33:14:30:84:41:A8:FD:5B:91:92:89:A3:3A:2B:E3:4B:39:06:D6:F4:C4:21:FF:F6:4A:7A:4C Fingerprint (SHA1): E1:A2:4F:B6:2F:AC:5A:8F:0B:41:56:D3:6C:BD:8D:F3:72:16:A4:65 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7661: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122889 (0x1e67db89) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:34:12 2017 Not After : Tue May 10 12:34:12 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:ae:7e:36:a6:39:4c:5a:55:c6:ad:98:cc:de:c7:7e: 2a:08:a6:ca:6f:09:d7:4f:16:32:52:28:3a:b6:ea:c1: b5:02:71:7c:30:a4:65:53:bf:e4:62:6a:61:f2:c1:4d: d0:f9:f9:52:37:85:b6:f7:02:89:ac:d8:c5:2e:ce:a7: ea:b3:e0:d5:a7:e1:c5:af:29:9c:43:b0:1f:3d:ed:49: d6:09:09:3d:c3:9c:11:8f:ba:f7:84:e7:fb:00:4f:9c: c5:98:0f:c9:62:94:84:c6:b7:8e:33:5c:89:96:b4:bf: 71:9c:b9:86:96:5f:3c:23:23:20:1a:a2:00:77:a4:d4: ab:f5:19:11:d2:aa:91:ed:65:8a:13:aa:fe:e7:5b:83: ce:b2:a0:57:30:90:5e:eb:b9:66:0e:74:e0:29:35:fa: b4:8f:d0:3d:74:7e:a2:06:32:be:63:d7:32:a8:15:fe: af:39:5c:34:b5:5f:2b:59:15:9a:6e:aa:67:2c:d1:5c: 13:58:1d:1f:47:39:a7:b4:e9:c6:f1:37:f6:fb:03:84: 5b:d7:73:ab:21:0d:dd:fa:93:3a:cc:e3:e9:6e:63:5e: 29:c5:57:b4:b7:17:b0:61:b8:25:27:2a:7e:97:db:16: 3e:ba:33:fb:83:b7:4b:02:62:94:08:ee:c7:7e:2f:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:e6:f7:f4:b3:f5:15:ca:92:fb:44:94:b1:32:c1:25: 63:15:8c:04:42:0e:bd:fd:62:6d:2a:0e:3d:61:c3:00: 58:6b:b4:e5:90:72:30:82:bc:66:9e:e8:95:27:86:a7: b8:16:5a:40:bb:78:14:2a:e2:b5:e4:09:22:21:1e:f2: 4b:78:28:68:9b:36:11:c0:cb:c5:eb:06:c0:24:a9:54: 3a:63:81:e5:82:01:4f:fa:74:d6:3b:f8:c6:29:cb:9c: 67:41:d9:3c:50:bf:28:43:c8:17:73:31:b6:06:91:e8: 87:3d:eb:aa:b4:ac:5f:21:b5:5b:7f:b9:ea:30:4b:32: 73:02:6c:dc:4a:ba:89:27:39:a0:9a:78:bd:22:f8:a8: de:38:6f:c1:c5:e0:6d:54:f4:e4:bd:7e:fe:8e:c9:d7: ef:d8:75:8d:5e:5c:1c:cd:71:94:98:64:99:48:e3:97: d6:be:cf:a7:6d:26:05:10:4c:df:32:16:5b:86:6c:c1: df:89:56:cb:0a:26:02:a4:c0:05:2b:30:ea:96:cd:74: 06:18:73:87:9a:21:dc:1f:d4:3e:41:d6:80:c3:27:24: a7:6b:4b:83:a3:ca:59:2e:be:a6:96:6d:48:2b:d1:15: 26:72:81:42:92:d2:3a:e3:0c:3d:c0:2c:f8:63:c4:f7 Fingerprint (SHA-256): C9:D5:C5:1A:20:9E:9F:6A:B2:24:57:E6:9F:26:F9:2C:4F:DA:BD:EE:9B:D7:7E:B9:55:8F:BA:2C:2E:3B:C7:D9 Fingerprint (SHA1): DF:D3:20:F2:77:26:63:12:F6:75:69:07:A2:00:5B:E0:98:4F:58:98 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #7662: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122887 (0x1e67db87) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:34:09 2017 Not After : Tue May 10 12:34:09 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:83:4c:aa:60:b1:17:30:31:02:a3:72:aa:6b:ec:80: dc:95:97:2e:ba:22:51:a1:9f:2f:a1:c5:01:66:29:5e: da:93:4b:ec:d2:30:d1:e7:54:78:7c:41:c8:7c:32:59: 50:0d:85:f4:6e:05:a0:22:e7:9f:d4:4a:fc:49:89:f1: ba:cb:4f:ac:57:1e:74:44:e6:10:dc:a0:e2:d3:f2:2a: cf:7d:65:7a:35:d6:98:2e:41:a1:49:ea:5c:fe:3c:15: dd:92:62:bd:2d:78:e4:25:c4:ab:ac:e3:c6:e0:8d:bd: 25:c8:f8:60:14:91:cc:75:a1:f6:d1:31:44:1f:2d:2c: 79:ef:a2:09:a3:0a:a6:da:7c:dc:8e:fe:65:41:5e:84: 6d:46:3f:cc:7d:d1:db:71:b7:25:b1:2b:c1:71:60:68: 91:f2:bc:07:6d:54:09:56:d7:ec:5c:f3:f7:32:8b:d2: 31:44:4a:09:7a:5c:57:79:11:79:1b:6d:a7:27:5f:3b: 9b:73:4b:e2:78:4b:3a:af:cd:7d:da:a3:4f:2b:a4:85: 06:fe:d2:a5:10:95:a9:16:54:85:e9:d1:41:9e:52:cd: df:02:9f:cf:54:a9:49:d4:92:24:ea:16:77:95:d9:af: 87:38:74:c6:14:8c:27:d1:4e:0d:a7:2d:a6:59:9a:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:8f:81:2f:2b:e2:53:33:5c:3a:29:92:d4:54:47:4f: d7:09:2f:77:33:be:d3:71:b2:9e:44:c1:c4:f3:a8:43: cd:ad:60:84:4d:ad:cd:e9:78:23:f3:73:7e:02:a0:04: 16:34:86:f6:77:c1:6c:0b:bd:f1:9c:80:b8:f7:07:25: 10:31:04:5e:6f:5c:c9:a5:eb:c3:c1:fd:2a:3c:e0:45: 99:49:1d:51:5d:22:11:e3:44:e0:30:ce:60:c0:a3:4d: e5:ba:3c:01:9f:1e:20:2b:37:f0:ec:eb:88:50:45:c6: 11:72:66:44:29:d5:81:77:f9:3a:a5:d6:02:af:c3:fe: e9:0b:c5:3a:13:9f:c8:72:09:e0:af:4d:5b:a4:20:76: 7b:d2:cc:ae:76:3f:2a:c2:5a:1d:83:22:9a:d0:3a:ae: b7:b6:e4:7c:29:3d:1d:94:00:d8:60:bd:eb:91:20:d0: 19:48:93:d2:0f:d5:a7:20:fd:a6:87:56:bc:d1:fa:1e: 9e:0b:59:9b:82:0c:55:9e:18:b4:a9:28:c0:47:e6:e2: 52:85:38:91:13:79:8a:da:93:4c:13:3f:3b:e4:10:c0: a9:31:17:15:86:71:b0:34:d1:fd:9f:1e:04:c5:65:8f: 9c:e5:d7:f1:a5:bc:ef:73:5a:61:84:ca:8d:d8:4d:6c Fingerprint (SHA-256): 91:90:F1:FA:22:33:14:30:84:41:A8:FD:5B:91:92:89:A3:3A:2B:E3:4B:39:06:D6:F4:C4:21:FF:F6:4A:7A:4C Fingerprint (SHA1): E1:A2:4F:B6:2F:AC:5A:8F:0B:41:56:D3:6C:BD:8D:F3:72:16:A4:65 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7663: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #7664: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122887 (0x1e67db87) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:34:09 2017 Not After : Tue May 10 12:34:09 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:83:4c:aa:60:b1:17:30:31:02:a3:72:aa:6b:ec:80: dc:95:97:2e:ba:22:51:a1:9f:2f:a1:c5:01:66:29:5e: da:93:4b:ec:d2:30:d1:e7:54:78:7c:41:c8:7c:32:59: 50:0d:85:f4:6e:05:a0:22:e7:9f:d4:4a:fc:49:89:f1: ba:cb:4f:ac:57:1e:74:44:e6:10:dc:a0:e2:d3:f2:2a: cf:7d:65:7a:35:d6:98:2e:41:a1:49:ea:5c:fe:3c:15: dd:92:62:bd:2d:78:e4:25:c4:ab:ac:e3:c6:e0:8d:bd: 25:c8:f8:60:14:91:cc:75:a1:f6:d1:31:44:1f:2d:2c: 79:ef:a2:09:a3:0a:a6:da:7c:dc:8e:fe:65:41:5e:84: 6d:46:3f:cc:7d:d1:db:71:b7:25:b1:2b:c1:71:60:68: 91:f2:bc:07:6d:54:09:56:d7:ec:5c:f3:f7:32:8b:d2: 31:44:4a:09:7a:5c:57:79:11:79:1b:6d:a7:27:5f:3b: 9b:73:4b:e2:78:4b:3a:af:cd:7d:da:a3:4f:2b:a4:85: 06:fe:d2:a5:10:95:a9:16:54:85:e9:d1:41:9e:52:cd: df:02:9f:cf:54:a9:49:d4:92:24:ea:16:77:95:d9:af: 87:38:74:c6:14:8c:27:d1:4e:0d:a7:2d:a6:59:9a:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:8f:81:2f:2b:e2:53:33:5c:3a:29:92:d4:54:47:4f: d7:09:2f:77:33:be:d3:71:b2:9e:44:c1:c4:f3:a8:43: cd:ad:60:84:4d:ad:cd:e9:78:23:f3:73:7e:02:a0:04: 16:34:86:f6:77:c1:6c:0b:bd:f1:9c:80:b8:f7:07:25: 10:31:04:5e:6f:5c:c9:a5:eb:c3:c1:fd:2a:3c:e0:45: 99:49:1d:51:5d:22:11:e3:44:e0:30:ce:60:c0:a3:4d: e5:ba:3c:01:9f:1e:20:2b:37:f0:ec:eb:88:50:45:c6: 11:72:66:44:29:d5:81:77:f9:3a:a5:d6:02:af:c3:fe: e9:0b:c5:3a:13:9f:c8:72:09:e0:af:4d:5b:a4:20:76: 7b:d2:cc:ae:76:3f:2a:c2:5a:1d:83:22:9a:d0:3a:ae: b7:b6:e4:7c:29:3d:1d:94:00:d8:60:bd:eb:91:20:d0: 19:48:93:d2:0f:d5:a7:20:fd:a6:87:56:bc:d1:fa:1e: 9e:0b:59:9b:82:0c:55:9e:18:b4:a9:28:c0:47:e6:e2: 52:85:38:91:13:79:8a:da:93:4c:13:3f:3b:e4:10:c0: a9:31:17:15:86:71:b0:34:d1:fd:9f:1e:04:c5:65:8f: 9c:e5:d7:f1:a5:bc:ef:73:5a:61:84:ca:8d:d8:4d:6c Fingerprint (SHA-256): 91:90:F1:FA:22:33:14:30:84:41:A8:FD:5B:91:92:89:A3:3A:2B:E3:4B:39:06:D6:F4:C4:21:FF:F6:4A:7A:4C Fingerprint (SHA1): E1:A2:4F:B6:2F:AC:5A:8F:0B:41:56:D3:6C:BD:8D:F3:72:16:A4:65 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7665: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122889 (0x1e67db89) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:34:12 2017 Not After : Tue May 10 12:34:12 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:ae:7e:36:a6:39:4c:5a:55:c6:ad:98:cc:de:c7:7e: 2a:08:a6:ca:6f:09:d7:4f:16:32:52:28:3a:b6:ea:c1: b5:02:71:7c:30:a4:65:53:bf:e4:62:6a:61:f2:c1:4d: d0:f9:f9:52:37:85:b6:f7:02:89:ac:d8:c5:2e:ce:a7: ea:b3:e0:d5:a7:e1:c5:af:29:9c:43:b0:1f:3d:ed:49: d6:09:09:3d:c3:9c:11:8f:ba:f7:84:e7:fb:00:4f:9c: c5:98:0f:c9:62:94:84:c6:b7:8e:33:5c:89:96:b4:bf: 71:9c:b9:86:96:5f:3c:23:23:20:1a:a2:00:77:a4:d4: ab:f5:19:11:d2:aa:91:ed:65:8a:13:aa:fe:e7:5b:83: ce:b2:a0:57:30:90:5e:eb:b9:66:0e:74:e0:29:35:fa: b4:8f:d0:3d:74:7e:a2:06:32:be:63:d7:32:a8:15:fe: af:39:5c:34:b5:5f:2b:59:15:9a:6e:aa:67:2c:d1:5c: 13:58:1d:1f:47:39:a7:b4:e9:c6:f1:37:f6:fb:03:84: 5b:d7:73:ab:21:0d:dd:fa:93:3a:cc:e3:e9:6e:63:5e: 29:c5:57:b4:b7:17:b0:61:b8:25:27:2a:7e:97:db:16: 3e:ba:33:fb:83:b7:4b:02:62:94:08:ee:c7:7e:2f:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:e6:f7:f4:b3:f5:15:ca:92:fb:44:94:b1:32:c1:25: 63:15:8c:04:42:0e:bd:fd:62:6d:2a:0e:3d:61:c3:00: 58:6b:b4:e5:90:72:30:82:bc:66:9e:e8:95:27:86:a7: b8:16:5a:40:bb:78:14:2a:e2:b5:e4:09:22:21:1e:f2: 4b:78:28:68:9b:36:11:c0:cb:c5:eb:06:c0:24:a9:54: 3a:63:81:e5:82:01:4f:fa:74:d6:3b:f8:c6:29:cb:9c: 67:41:d9:3c:50:bf:28:43:c8:17:73:31:b6:06:91:e8: 87:3d:eb:aa:b4:ac:5f:21:b5:5b:7f:b9:ea:30:4b:32: 73:02:6c:dc:4a:ba:89:27:39:a0:9a:78:bd:22:f8:a8: de:38:6f:c1:c5:e0:6d:54:f4:e4:bd:7e:fe:8e:c9:d7: ef:d8:75:8d:5e:5c:1c:cd:71:94:98:64:99:48:e3:97: d6:be:cf:a7:6d:26:05:10:4c:df:32:16:5b:86:6c:c1: df:89:56:cb:0a:26:02:a4:c0:05:2b:30:ea:96:cd:74: 06:18:73:87:9a:21:dc:1f:d4:3e:41:d6:80:c3:27:24: a7:6b:4b:83:a3:ca:59:2e:be:a6:96:6d:48:2b:d1:15: 26:72:81:42:92:d2:3a:e3:0c:3d:c0:2c:f8:63:c4:f7 Fingerprint (SHA-256): C9:D5:C5:1A:20:9E:9F:6A:B2:24:57:E6:9F:26:F9:2C:4F:DA:BD:EE:9B:D7:7E:B9:55:8F:BA:2C:2E:3B:C7:D9 Fingerprint (SHA1): DF:D3:20:F2:77:26:63:12:F6:75:69:07:A2:00:5B:E0:98:4F:58:98 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #7666: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #7667: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #7668: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #7669: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122887 (0x1e67db87) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:34:09 2017 Not After : Tue May 10 12:34:09 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:83:4c:aa:60:b1:17:30:31:02:a3:72:aa:6b:ec:80: dc:95:97:2e:ba:22:51:a1:9f:2f:a1:c5:01:66:29:5e: da:93:4b:ec:d2:30:d1:e7:54:78:7c:41:c8:7c:32:59: 50:0d:85:f4:6e:05:a0:22:e7:9f:d4:4a:fc:49:89:f1: ba:cb:4f:ac:57:1e:74:44:e6:10:dc:a0:e2:d3:f2:2a: cf:7d:65:7a:35:d6:98:2e:41:a1:49:ea:5c:fe:3c:15: dd:92:62:bd:2d:78:e4:25:c4:ab:ac:e3:c6:e0:8d:bd: 25:c8:f8:60:14:91:cc:75:a1:f6:d1:31:44:1f:2d:2c: 79:ef:a2:09:a3:0a:a6:da:7c:dc:8e:fe:65:41:5e:84: 6d:46:3f:cc:7d:d1:db:71:b7:25:b1:2b:c1:71:60:68: 91:f2:bc:07:6d:54:09:56:d7:ec:5c:f3:f7:32:8b:d2: 31:44:4a:09:7a:5c:57:79:11:79:1b:6d:a7:27:5f:3b: 9b:73:4b:e2:78:4b:3a:af:cd:7d:da:a3:4f:2b:a4:85: 06:fe:d2:a5:10:95:a9:16:54:85:e9:d1:41:9e:52:cd: df:02:9f:cf:54:a9:49:d4:92:24:ea:16:77:95:d9:af: 87:38:74:c6:14:8c:27:d1:4e:0d:a7:2d:a6:59:9a:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:8f:81:2f:2b:e2:53:33:5c:3a:29:92:d4:54:47:4f: d7:09:2f:77:33:be:d3:71:b2:9e:44:c1:c4:f3:a8:43: cd:ad:60:84:4d:ad:cd:e9:78:23:f3:73:7e:02:a0:04: 16:34:86:f6:77:c1:6c:0b:bd:f1:9c:80:b8:f7:07:25: 10:31:04:5e:6f:5c:c9:a5:eb:c3:c1:fd:2a:3c:e0:45: 99:49:1d:51:5d:22:11:e3:44:e0:30:ce:60:c0:a3:4d: e5:ba:3c:01:9f:1e:20:2b:37:f0:ec:eb:88:50:45:c6: 11:72:66:44:29:d5:81:77:f9:3a:a5:d6:02:af:c3:fe: e9:0b:c5:3a:13:9f:c8:72:09:e0:af:4d:5b:a4:20:76: 7b:d2:cc:ae:76:3f:2a:c2:5a:1d:83:22:9a:d0:3a:ae: b7:b6:e4:7c:29:3d:1d:94:00:d8:60:bd:eb:91:20:d0: 19:48:93:d2:0f:d5:a7:20:fd:a6:87:56:bc:d1:fa:1e: 9e:0b:59:9b:82:0c:55:9e:18:b4:a9:28:c0:47:e6:e2: 52:85:38:91:13:79:8a:da:93:4c:13:3f:3b:e4:10:c0: a9:31:17:15:86:71:b0:34:d1:fd:9f:1e:04:c5:65:8f: 9c:e5:d7:f1:a5:bc:ef:73:5a:61:84:ca:8d:d8:4d:6c Fingerprint (SHA-256): 91:90:F1:FA:22:33:14:30:84:41:A8:FD:5B:91:92:89:A3:3A:2B:E3:4B:39:06:D6:F4:C4:21:FF:F6:4A:7A:4C Fingerprint (SHA1): E1:A2:4F:B6:2F:AC:5A:8F:0B:41:56:D3:6C:BD:8D:F3:72:16:A4:65 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7670: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122891 (0x1e67db8b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed May 10 12:34:16 2017 Not After : Tue May 10 12:34:16 2067 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:5b:90:c6:57:03:63:dd:e3:36:64:8e:e0:51:c2:fa: e1:15:63:8f:6b:fc:6e:98:cc:12:74:13:c6:2f:b5:50: 34:cf:42:fe:4c:9f:dd:b8:7b:83:57:30:ee:1b:35:c8: f8:92:a5:63:50:cf:e8:25:10:2a:68:7c:9b:73:6e:53: 87:28:e9:9f:9c:ec:a5:fb:5f:fb:42:a8:06:97:fd:c3: 77:26:28:90:a2:31:af:f2:a1:ef:2b:44:fd:b4:48:66: 1a:60:d8:74:a7:81:93:56:ef:82:3e:db:ab:a5:2c:ce: 69:25:15:4d:c0:6e:40:d6:04:7f:0d:8c:39:8f:92:08: 83:26:4b:b8:67:e0:2a:75:81:d8:7d:6a:54:f8:43:89: 8b:95:92:8a:02:8f:40:18:91:d4:e6:5c:3b:4b:33:67: 52:07:66:d3:ce:d2:9b:b6:41:f2:98:f7:b6:c3:96:60: 2b:28:fe:8e:46:71:fe:97:7f:b5:7f:43:eb:10:50:d6: 80:a2:cc:5a:53:fd:5d:db:4d:63:39:41:6b:55:df:f0: ad:a0:b7:a0:ef:ed:56:b0:63:36:af:b7:cf:e6:ee:31: b5:86:14:ce:2c:f8:e3:4f:9a:8f:76:2f:18:e3:ec:41: fc:8a:73:4b:e5:94:63:13:03:3e:e4:af:8a:48:9f:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:0b:b3:da:2e:56:60:4d:58:7f:8d:d4:35:a7:c7:e5: 4c:ec:13:06:09:a8:5f:66:bb:ea:47:d5:b4:85:e4:d5: 47:9d:bc:12:28:3a:7d:eb:2d:6c:5e:c9:88:0c:a6:57: ef:35:ca:82:13:00:65:43:74:5f:62:69:7a:76:2a:24: 66:fd:05:01:55:22:ea:c5:39:69:3d:3b:f7:89:86:d1: 1e:3b:26:87:76:37:73:2b:3a:61:bb:b1:8d:63:3f:86: ab:2b:37:90:25:66:26:aa:1b:5b:8a:25:46:17:5f:ee: df:f4:a2:e9:4a:89:d7:dd:46:94:7e:a1:59:de:cc:57: cc:4a:4a:79:3f:fa:6f:f4:69:fb:ca:e8:63:b3:25:01: 24:d7:8a:f9:37:26:5b:d9:ef:02:c3:06:e0:56:9d:5a: fc:d0:a8:6f:b8:3c:0f:40:51:6f:47:58:03:ff:ba:c7: b2:31:cc:80:24:9c:bd:41:69:06:97:91:3d:b8:6f:c3: c9:da:16:ca:b4:97:34:5c:47:bf:0f:50:d7:e9:13:55: 72:e5:1e:0b:77:c6:9c:4c:83:73:80:b6:7a:d0:a1:3c: 99:8c:78:4d:da:12:8b:f9:d9:f6:74:59:01:bf:c8:64: 17:79:d1:ca:30:c6:01:e8:88:3f:93:f4:3e:e9:43:0b Fingerprint (SHA-256): E6:8D:1B:A9:5E:C4:09:AF:94:F6:CF:16:F2:F7:53:7C:3D:23:BE:B8:78:85:A3:D0:D5:AF:78:18:A0:5B:ED:8C Fingerprint (SHA1): FF:9E:9B:6E:15:99:F9:49:2E:EF:0D:EC:13:EE:1D:58:66:CA:87:FE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #7671: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122887 (0x1e67db87) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:34:09 2017 Not After : Tue May 10 12:34:09 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:83:4c:aa:60:b1:17:30:31:02:a3:72:aa:6b:ec:80: dc:95:97:2e:ba:22:51:a1:9f:2f:a1:c5:01:66:29:5e: da:93:4b:ec:d2:30:d1:e7:54:78:7c:41:c8:7c:32:59: 50:0d:85:f4:6e:05:a0:22:e7:9f:d4:4a:fc:49:89:f1: ba:cb:4f:ac:57:1e:74:44:e6:10:dc:a0:e2:d3:f2:2a: cf:7d:65:7a:35:d6:98:2e:41:a1:49:ea:5c:fe:3c:15: dd:92:62:bd:2d:78:e4:25:c4:ab:ac:e3:c6:e0:8d:bd: 25:c8:f8:60:14:91:cc:75:a1:f6:d1:31:44:1f:2d:2c: 79:ef:a2:09:a3:0a:a6:da:7c:dc:8e:fe:65:41:5e:84: 6d:46:3f:cc:7d:d1:db:71:b7:25:b1:2b:c1:71:60:68: 91:f2:bc:07:6d:54:09:56:d7:ec:5c:f3:f7:32:8b:d2: 31:44:4a:09:7a:5c:57:79:11:79:1b:6d:a7:27:5f:3b: 9b:73:4b:e2:78:4b:3a:af:cd:7d:da:a3:4f:2b:a4:85: 06:fe:d2:a5:10:95:a9:16:54:85:e9:d1:41:9e:52:cd: df:02:9f:cf:54:a9:49:d4:92:24:ea:16:77:95:d9:af: 87:38:74:c6:14:8c:27:d1:4e:0d:a7:2d:a6:59:9a:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:8f:81:2f:2b:e2:53:33:5c:3a:29:92:d4:54:47:4f: d7:09:2f:77:33:be:d3:71:b2:9e:44:c1:c4:f3:a8:43: cd:ad:60:84:4d:ad:cd:e9:78:23:f3:73:7e:02:a0:04: 16:34:86:f6:77:c1:6c:0b:bd:f1:9c:80:b8:f7:07:25: 10:31:04:5e:6f:5c:c9:a5:eb:c3:c1:fd:2a:3c:e0:45: 99:49:1d:51:5d:22:11:e3:44:e0:30:ce:60:c0:a3:4d: e5:ba:3c:01:9f:1e:20:2b:37:f0:ec:eb:88:50:45:c6: 11:72:66:44:29:d5:81:77:f9:3a:a5:d6:02:af:c3:fe: e9:0b:c5:3a:13:9f:c8:72:09:e0:af:4d:5b:a4:20:76: 7b:d2:cc:ae:76:3f:2a:c2:5a:1d:83:22:9a:d0:3a:ae: b7:b6:e4:7c:29:3d:1d:94:00:d8:60:bd:eb:91:20:d0: 19:48:93:d2:0f:d5:a7:20:fd:a6:87:56:bc:d1:fa:1e: 9e:0b:59:9b:82:0c:55:9e:18:b4:a9:28:c0:47:e6:e2: 52:85:38:91:13:79:8a:da:93:4c:13:3f:3b:e4:10:c0: a9:31:17:15:86:71:b0:34:d1:fd:9f:1e:04:c5:65:8f: 9c:e5:d7:f1:a5:bc:ef:73:5a:61:84:ca:8d:d8:4d:6c Fingerprint (SHA-256): 91:90:F1:FA:22:33:14:30:84:41:A8:FD:5B:91:92:89:A3:3A:2B:E3:4B:39:06:D6:F4:C4:21:FF:F6:4A:7A:4C Fingerprint (SHA1): E1:A2:4F:B6:2F:AC:5A:8F:0B:41:56:D3:6C:BD:8D:F3:72:16:A4:65 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7672: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #7673: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #7674: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #7675: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #7676: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #7677: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510122892 (0x1e67db8c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed May 10 12:34:18 2017 Not After : Tue May 10 12:34:18 2022 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ef:6d:89:19:6d:1c:5a:14:17:22:57:ff:07:65:d5:c4: 38:ae:dd:84:16:51:5d:ac:1d:6d:c0:53:bf:0e:a7:91: e1:3f:c9:6d:ca:fb:aa:ae:f6:7d:0f:d1:c2:44:df:bd: f1:f3:e3:6d:25:f5:5b:b1:6c:f6:9b:04:12:82:54:50: 28:40:3e:07:7e:66:31:79:77:c1:97:dc:62:e0:61:9b: f9:f4:db:4c:ee:d0:46:7d:9f:a0:ee:8d:c7:9c:a6:d0: 17:c7:42:37:1a:33:60:73:f6:b4:ad:c3:46:a6:df:3b: 68:a2:b2:a7:b7:96:c2:f4:3f:42:9f:a5:b9:9a:ed:16: e2:18:7f:cc:51:1e:b7:e5:bf:88:c7:ba:a8:8e:85:66: c9:ee:36:84:b8:6d:c3:1a:69:1f:6d:45:52:8c:76:f8: 43:c9:15:4f:c9:a4:5b:32:ed:95:e6:72:65:24:20:54: c3:84:75:44:92:d4:80:ba:37:f5:e1:cb:e9:af:0e:06: 99:69:a1:be:e5:e0:31:9e:ca:df:bf:08:96:20:9d:31: c5:43:fa:b2:5d:a6:c4:6f:11:0a:4b:9f:4c:55:41:ca: 0c:11:f5:89:17:94:ab:c8:bb:05:73:bf:06:44:a6:bf: 7d:a3:50:2a:33:91:3b:97:16:a8:95:09:b2:13:c9:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:9d:1a:22:34:a8:50:c9:36:7d:7a:43:7b:6e:ed:c0: 21:16:c3:c1:83:28:4d:6f:a0:10:93:3d:70:25:59:e5: 31:d7:e5:0a:ac:12:e1:1c:f9:29:30:e7:a1:b7:41:50: d5:c6:b0:ec:4d:b1:2d:24:19:23:2e:16:6a:f7:6a:92: d4:0a:bd:15:13:86:8e:bb:9c:cf:7f:18:0f:26:09:0a: 77:15:f4:cc:44:68:37:c0:5d:e2:98:f3:6f:62:4f:bd: f7:ff:b3:3d:be:c9:8b:e7:cf:3d:de:17:de:cc:3b:5b: 14:7d:c1:3a:40:7f:11:95:99:ae:7d:f8:39:dc:54:f1: 41:78:2c:29:4e:21:76:59:22:59:47:bf:98:c3:d0:de: 64:4f:36:f8:9e:f1:67:2f:85:03:b2:9f:cf:2d:6f:41: 5c:88:64:49:c1:8a:72:57:49:42:45:ba:9b:57:87:32: b6:56:a3:17:8c:4a:91:1c:25:04:0f:65:db:b8:08:c0: 2e:58:50:da:03:00:1e:20:4a:91:5e:85:8f:4d:27:2e: e3:c2:2e:5d:eb:c8:4e:68:53:90:44:20:c1:9d:d3:d5: 44:5d:da:4a:93:2e:43:9c:a5:d9:ff:e8:82:b3:12:39: 61:72:8e:44:28:18:5b:85:9d:e2:a5:56:ec:47:11:17 Fingerprint (SHA-256): BA:2F:69:DF:59:71:72:79:B8:67:6B:7B:4B:5B:46:10:03:1F:A7:EA:A5:33:A8:4F:49:81:06:01:52:32:1A:94 Fingerprint (SHA1): 43:62:7E:4D:85:17:18:83:3D:8A:8F:C1:AB:6B:4B:52:BD:75:89:F2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #7678: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #7679: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #7680: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #7681: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #7682: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #7683: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #7684: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #7685: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #7686: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #7687: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #7688: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #7689: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #7690: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #7691: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #7692: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #7693: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #7694: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #7695: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #7696: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #7697: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #7698: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #7699: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #7700: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #7701: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 2526 at Wed May 10 12:34:25 UTC 2017 kill -USR1 2526 httpserv: normal termination httpserv -b -p 9218 2>/dev/null; httpserv with PID 2526 killed at Wed May 10 12:34:25 UTC 2017 TIMESTAMP chains END: Wed May 10 12:34:25 UTC 2017 Running tests for ec TIMESTAMP ec BEGIN: Wed May 10 12:34:25 UTC 2017 Running ec tests for ecperf TIMESTAMP ecperf BEGIN: Wed May 10 12:34:25 UTC 2017 ecperf.sh: ecperf test =============================== ./ecperf.sh: line 43: ecperf: command not found ecperf.sh: #7702: ec(perf) test - PASSED TIMESTAMP ecperf END: Wed May 10 12:34:25 UTC 2017 Running ec tests for ectest TIMESTAMP ectest BEGIN: Wed May 10 12:34:25 UTC 2017 ectest.sh: freebl and pk11 ectest tests =============================== No password file "../tests.pw" exists. Test curve25519 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #7703: ec test certutil keygen - curve25519 - PASSED Test secp256r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #7704: ec test certutil keygen - secp256r1 - PASSED Test secp384r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #7705: ec test certutil keygen - secp384r1 - PASSED Test secp521r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #7706: ec test certutil keygen - secp521r1 - PASSED Test sect571r1 key generation using certutil that should fail because it's not implemented ... Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_KEY: The key does not support the requested operation. ectest.sh: #7707: ec test certutil keygen - secp521r1 - PASSED ectest.sh: #7708: pk11 ec tests - PASSED TIMESTAMP ectest END: Wed May 10 12:34:26 UTC 2017 TIMESTAMP ec END: Wed May 10 12:34:26 UTC 2017 Running tests for gtests TIMESTAMP gtests BEGIN: Wed May 10 12:34:26 UTC 2017 gtests: prng_gtest der_gtest pk11_gtest util_gtest gtests.sh: #7709: Skipping prng_gtest (not built) - UNKNOWN gtests.sh: der_gtest =============================== executing der_gtest [==========] Running 16 tests from 2 test cases. [----------] Global test environment set-up. [----------] 13 tests from DERIntegerDecodingTest [ RUN ] DERIntegerDecodingTest.DecodeLongMinus126 [ OK ] DERIntegerDecodingTest.DecodeLongMinus126 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong130 [ OK ] DERIntegerDecodingTest.DecodeLong130 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong130Padded [ OK ] DERIntegerDecodingTest.DecodeLong130Padded (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong0 [ OK ] DERIntegerDecodingTest.DecodeLong0 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong1 [ OK ] DERIntegerDecodingTest.DecodeLong1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinus1Padded [ OK ] DERIntegerDecodingTest.DecodeLongMinus1Padded (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMax [ OK ] DERIntegerDecodingTest.DecodeLongMax (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMin [ OK ] DERIntegerDecodingTest.DecodeLongMin (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMaxMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMaxMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinPlus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinPlus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMaxPlus1 [ OK ] DERIntegerDecodingTest.DecodeLongMaxPlus1 (0 ms) [----------] 13 tests from DERIntegerDecodingTest (0 ms total) [----------] 3 tests from DERPrivateKeyImportTest [ RUN ] DERPrivateKeyImportTest.ImportPrivateRSAKey [ OK ] DERPrivateKeyImportTest.ImportPrivateRSAKey (1 ms) [ RUN ] DERPrivateKeyImportTest.ImportInvalidPrivateKey [ OK ] DERPrivateKeyImportTest.ImportInvalidPrivateKey (0 ms) [ RUN ] DERPrivateKeyImportTest.ImportZeroLengthPrivateKey [ OK ] DERPrivateKeyImportTest.ImportZeroLengthPrivateKey (0 ms) [----------] 3 tests from DERPrivateKeyImportTest (1 ms total) [----------] Global test environment tear-down [==========] 16 tests from 2 test cases ran. (1 ms total) [ PASSED ] 16 tests. gtests.sh: #7710: der_gtest run successfully - PASSED test output dir: /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/pkix/der_gtest/report.xml executing sed to parse the xml report processing the parsed report gtests.sh: #7711: 'DERIntegerDecodingTest: DecodeLongMinus126' - PASSED gtests.sh: #7712: 'DERIntegerDecodingTest: DecodeLong130' - PASSED gtests.sh: #7713: 'DERIntegerDecodingTest: DecodeLong130Padded' - PASSED gtests.sh: #7714: 'DERIntegerDecodingTest: DecodeLong0' - PASSED gtests.sh: #7715: 'DERIntegerDecodingTest: DecodeLong1' - PASSED gtests.sh: #7716: 'DERIntegerDecodingTest: DecodeLongMinus1' - PASSED gtests.sh: #7717: 'DERIntegerDecodingTest: DecodeLongMinus1Padded' - PASSED gtests.sh: #7718: 'DERIntegerDecodingTest: DecodeLongMax' - PASSED gtests.sh: #7719: 'DERIntegerDecodingTest: DecodeLongMin' - PASSED gtests.sh: #7720: 'DERIntegerDecodingTest: DecodeLongMaxMinus1' - PASSED gtests.sh: #7721: 'DERIntegerDecodingTest: DecodeLongMinPlus1' - PASSED gtests.sh: #7722: 'DERIntegerDecodingTest: DecodeLongMinMinus1' - PASSED gtests.sh: #7723: 'DERIntegerDecodingTest: DecodeLongMaxPlus1' - PASSED gtests.sh: #7724: 'DERPrivateKeyImportTest: ImportPrivateRSAKey' - PASSED gtests.sh: #7725: 'DERPrivateKeyImportTest: ImportInvalidPrivateKey' - PASSED gtests.sh: #7726: 'DERPrivateKeyImportTest: ImportZeroLengthPrivateKey' - PASSED gtests.sh: #7727: Skipping pk11_gtest (not built) - UNKNOWN gtests.sh: #7728: Skipping util_gtest (not built) - UNKNOWN TIMESTAMP gtests END: Wed May 10 12:34:26 UTC 2017 Running tests for ssl_gtests TIMESTAMP ssl_gtests BEGIN: Wed May 10 12:34:26 UTC 2017 ssl_gtest.sh: SSL Gtests =============================== ssl_gtest.sh: #7729: create ssl_gtest database - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #7730: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #7731: create certificate: sign kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #7732: create certificate: sign kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #7733: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #7734: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #7735: create certificate: kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #7736: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #7737: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #7738: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #7739: create certificate: kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #7740: create certificate: ca - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #7741: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #7742: create certificate: kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #7743: create certificate: sign - PASSED ssl_gtest.sh: #7744: Skipping ssl_gtest (not built) - UNKNOWN TIMESTAMP ssl_gtests END: Wed May 10 12:34:29 UTC 2017 ssl_gtests.sh: Testing with upgraded library =============================== cp: cannot stat '/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/cert.done': No such file or directory Running tests for dbupgrade TIMESTAMP dbupgrade BEGIN: Wed May 10 12:34:29 UTC 2017 dbupgrade.sh: DB upgrade tests =============================== Reset databases to their initial values: certutil: could not find certificate named "objsigner": SEC_ERROR_BAD_DATABASE: security library: bad database. Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu dbupgrade.sh: Legacy to shared Library update =============================== alicedir upgrading db alicedir Generating key. This may take a few moments... dbupgrade.sh: #7745: Upgrading alicedir - PASSED bobdir upgrading db bobdir Generating key. This may take a few moments... dbupgrade.sh: #7746: Upgrading bobdir - PASSED CA upgrading db CA Generating key. This may take a few moments... dbupgrade.sh: #7747: Upgrading CA - PASSED cert_extensions upgrading db cert_extensions Generating key. This may take a few moments... dbupgrade.sh: #7748: Upgrading cert_extensions - PASSED client upgrading db client Generating key. This may take a few moments... dbupgrade.sh: #7749: Upgrading client - PASSED clientCA upgrading db clientCA Generating key. This may take a few moments... dbupgrade.sh: #7750: Upgrading clientCA - PASSED dave upgrading db dave Generating key. This may take a few moments... dbupgrade.sh: #7751: Upgrading dave - PASSED eccurves upgrading db eccurves Generating key. This may take a few moments... dbupgrade.sh: #7752: Upgrading eccurves - PASSED eve upgrading db eve Generating key. This may take a few moments... dbupgrade.sh: #7753: Upgrading eve - PASSED ext_client upgrading db ext_client Generating key. This may take a few moments... dbupgrade.sh: #7754: Upgrading ext_client - PASSED ext_server upgrading db ext_server Generating key. This may take a few moments... dbupgrade.sh: #7755: Upgrading ext_server - PASSED SDR upgrading db SDR Generating key. This may take a few moments... dbupgrade.sh: #7756: Upgrading SDR - PASSED server upgrading db server Generating key. This may take a few moments... dbupgrade.sh: #7757: Upgrading server - PASSED serverCA upgrading db serverCA Generating key. This may take a few moments... dbupgrade.sh: #7758: Upgrading serverCA - PASSED ssl_gtests skipping db ssl_gtests dbupgrade.sh: #7759: No directory ssl_gtests - PASSED stapling upgrading db stapling Generating key. This may take a few moments... dbupgrade.sh: #7760: Upgrading stapling - PASSED tools/copydir skipping db tools/copydir dbupgrade.sh: #7761: No directory tools/copydir - PASSED upgrading db fips Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. dbupgrade.sh: #7762: Upgrading fips - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu TIMESTAMP dbupgrade END: Wed May 10 12:34:44 UTC 2017 Running tests for tools TIMESTAMP tools BEGIN: Wed May 10 12:34:44 UTC 2017 tools.sh: Tools Tests with ECC =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7763: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 44:a4:95:52:5b:29:dc:c8:be:6f:08:d0:e4:1d:20:30 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7764: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7765: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7766: Exporting Alice's email EC cert & key (pk12util -o) - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7767: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 88:86:fa:d1:b5:82:d7:d4:a3:ea:fc:f6:90:df:23:1c Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed May 10 11:41:32 2017 Not After : Tue May 10 11:41:32 2067 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:00:05:68:88:c0:15:13:15:d2:06:64:38:93:77:95: 25:9a:17:ab:ea:e7:0f:15:ad:f2:dd:82:a3:6f:0a:af: 9a:a4:db:dc:bd:32:55:ca:2a:79:99:fd:41:cb:cb:27: 61:25:00:d5:48:08:af:58:9d:71:57:5e:e5:42:10:d6: 69:40:fb:01:ab:80:c2:88:9d:a4:36:9a:b7:67:dc:8b: 82:3d:a0:98:dc:1b:05:eb:83:00:cf:e5:ad:49:3a:c4: 17:e7:b7:e9:6b:16:9c:ab:de:05:bb:45:a1:15:1a:0a: b5:a0:60:6d:e3:3c:fa:e6:52:fd:95:3a:d0:dd:04:28: fc:77:e5:ec:67 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:88:02:42:01:99:07:26:ef:ed:b0:a4:6d:d3:1c: 10:bf:8c:1d:73:89:68:89:a3:03:c6:01:44:17:5d:a2: 30:86:73:f9:f0:ec:e6:d0:c5:e3:d5:45:2d:e9:ee:a2: 8f:bd:e3:7c:0a:a9:2f:d8:cf:7d:ed:39:ca:97:9f:9c: 67:e1:05:c1:f5:59:38:02:42:01:8d:33:b9:6b:db:e0: b5:53:a0:75:5b:10:b5:5a:c5:e4:ae:da:f9:a2:c2:1d: 0d:2d:d2:cc:1b:41:f6:c1:96:c7:78:ba:2a:9a:fd:da: 65:9c:de:2e:2d:c5:2c:30:11:19:66:51:0a:8b:94:02: 99:be:0a:92:96:b3:dd:ec:1a:a4:c3 Fingerprint (SHA-256): C8:52:91:B3:AC:17:62:95:23:45:EB:9E:A0:59:AB:47:15:9C:32:EB:D3:4A:65:21:C8:83:00:4B:A7:D1:3A:AB Fingerprint (SHA1): 77:D3:D1:30:56:7F:B1:F5:E3:52:EF:84:9B:48:D6:C0:5A:4A:FE:9A Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed May 10 11:41:50 2017 Not After : Tue May 10 11:41:50 2022 Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:ab:09:ed:bc:5a:5b:a9:04:15:49:3b:39:b0:f3:a9: 90:54:0e:e8:3f:92:37:0c:2b:d1:49:f2:07:d1:4c:1b: 06:81:b1:33:ac:f1:5a:10:00:33:50:e6:95:cf:c2:1c: 24:55:5e:e7:c7:2b:a8:ce:c2:50:35:66:eb:21:74:73: 77:c1:1f:74:68:10:2c:0f:8b:9a:cb:9a:76:36:68:cb: f7:47:59:6a:d5:bd:d9:b5:af:c0:e0:21:5a:da:b8:22: d8 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:88:02:42:01:27:95:e8:5e:63:a3:ec:53:20:a2: 8c:4c:c2:0c:22:8c:86:aa:eb:71:2d:91:fa:66:9c:9e: 84:db:5b:f8:f9:da:e7:13:73:a8:e8:db:13:52:0f:2e: 2c:31:4c:33:25:62:9f:70:61:ef:61:4d:e6:b8:57:13: d2:65:40:ac:2a:d2:33:02:42:01:7d:05:7b:a5:11:6a: c7:37:bf:11:97:ea:46:57:66:54:e8:84:77:a8:89:48: ab:9c:6c:bd:f1:d3:12:86:16:fd:07:70:37:1b:c6:f6: c8:54:d5:89:46:62:b4:1d:0e:25:88:2e:b6:4c:b9:76: 43:f8:c6:08:fd:33:c5:05:62:fa:da Fingerprint (SHA-256): E8:31:B8:84:8C:22:42:6F:BD:45:3E:48:41:78:F3:76:C6:49:9B:98:EA:8E:3C:46:5C:43:14:30:EA:72:6C:7E Fingerprint (SHA1): F8:E3:60:9E:57:B3:49:D8:25:7F:38:DA:95:FB:08:58:E4:84:C1:AC Friendly Name: Alice-ec tools.sh: #7768: Listing Alice's pk12 EC file (pk12util -l) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7769: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 3e:f9:ab:21:35:ca:fb:0b:1a:b4:9a:fe:2c:6c:b0:9c Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7770: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7771: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7772: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: bf:49:4a:d7:a0:b2:78:68:d2:05:7a:5d:18:34:8c:9b Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7773: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7774: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7775: Exporting with [RC2-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 7a:ce:b2:04:9e:8d:35:ca:e6:37:b7:32:77:a3:c4:de Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7776: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7777: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7778: Exporting with [RC2-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 07:63:04:3e:bb:71:15:40:d3:4e:6c:ab:0a:ee:b8:52 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7779: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7780: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7781: Exporting with [RC2-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 0e:ed:2c:00:d1:c3:69:9d:73:73:0d:de:fa:97:e6:f9 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7782: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7783: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7784: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: bc:c2:b8:cc:be:d0:61:5a:10:77:46:09:66:e8:0a:ca Iteration Count: 2000 (0x7d0) tools.sh: #7785: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7786: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7787: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 91:c6:58:03:4c:a6:61:ed:a1:cf:f0:9a:93:ad:fe:12 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7788: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7789: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7790: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9a:e8:20:d9:2c:74:3c:f9:1d:a6:f3:f0:0d:a4:6f:57 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7791: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7792: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7793: Exporting with [DES-EDE3-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5b:43:50:29:20:fe:77:98:50:14:b1:35:da:27:70:27 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7794: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7795: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7796: Exporting with [DES-EDE3-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d4:a5:44:15:f9:1e:cc:31:db:12:44:cf:42:1a:98:a0 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7797: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7798: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7799: Exporting with [DES-EDE3-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e2:4a:c0:af:39:4f:80:ff:0c:3c:9f:a0:a9:d0:a8:6a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7800: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7801: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7802: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: da:81:91:68:84:a2:d6:23:ea:e4:ae:13:0c:d5:77:1c Iteration Count: 2000 (0x7d0) tools.sh: #7803: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7804: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7805: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 28:7a:57:9f:77:79:d6:c0:ad:99:b0:ac:0b:39:de:b2 Iteration Count: 2000 (0x7d0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:11:4e:fe:76:f1:2c:53:85:6a:13:be:f0:98:fd: 21:4d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7806: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7807: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7808: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e3:ef:9e:ce:98:97:7e:fe:83:b4:f4:bf:f1:ee:6f:2b Iteration Count: 2000 (0x7d0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:f8:3f:5b:c6:d2:2d:52:43:b1:fe:48:a1:97:b3: 72:3c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7809: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7810: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7811: Exporting with [AES-128-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8c:51:fb:2c:30:cd:6e:f3:d1:47:dd:33:96:18:db:64 Iteration Count: 2000 (0x7d0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:db:c5:7b:bd:f1:28:55:01:15:62:e1:ac:12:4a: 92:0e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7812: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7813: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7814: Exporting with [AES-128-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 42:07:a2:58:5f:4e:62:dc:1e:56:7b:a0:29:ae:dc:5b Iteration Count: 2000 (0x7d0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:50:3c:12:0e:35:d9:ea:c3:1b:63:a3:70:a5:c8: 3c:30 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7815: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7816: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7817: Exporting with [AES-128-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ba:5e:f9:a2:a7:3c:d3:bc:65:4f:65:31:0b:fe:b3:06 Iteration Count: 2000 (0x7d0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:de:ac:9a:31:c1:5b:11:10:42:0f:df:ee:ed:5f: 7d:1d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7818: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7819: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7820: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5f:e0:cb:d4:d3:88:9f:51:12:31:d1:cb:a3:04:bd:ec Iteration Count: 2000 (0x7d0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:da:79:e7:5c:16:de:92:9c:19:a3:ab:52:41:7d: 0f:ed tools.sh: #7821: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7822: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7823: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fa:08:7a:09:f6:1d:e4:bf:f2:8b:bf:18:7e:f5:ff:8e Iteration Count: 2000 (0x7d0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:eb:66:8c:de:ec:5e:33:42:54:2e:5e:cb:1e:7e: cc:db Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7824: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7825: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7826: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 32:c2:e2:fe:86:e9:8a:26:ec:09:4e:aa:70:fb:81:1f Iteration Count: 2000 (0x7d0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:99:91:0c:75:39:ed:c3:76:86:2f:f4:f2:60:c0: 97:64 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7827: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7828: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7829: Exporting with [AES-192-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f6:fa:59:c9:36:b5:47:51:16:53:3f:77:93:7e:aa:aa Iteration Count: 2000 (0x7d0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:81:4e:cb:dc:74:7f:96:db:5a:21:85:5d:80:cf: 2a:b8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7830: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7831: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7832: Exporting with [AES-192-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c2:72:50:6d:8f:e6:8c:ee:9b:6d:59:bf:5f:57:b9:18 Iteration Count: 2000 (0x7d0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:66:a1:3e:99:f0:2f:49:af:80:ef:ae:dc:9b:14: 30:63 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7833: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7834: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7835: Exporting with [AES-192-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9a:10:aa:55:5f:0d:41:84:ca:07:ce:ca:70:5c:36:b8 Iteration Count: 2000 (0x7d0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:68:e5:ff:47:97:a9:b6:5a:c1:c6:e2:d3:05:db: 74:54 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7836: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7837: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7838: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 73:9e:8d:6a:4a:6a:6a:3a:cd:03:fb:66:43:ee:35:56 Iteration Count: 2000 (0x7d0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:b3:0d:f6:27:81:e8:33:a8:87:05:5a:51:fd:bc: cc:63 tools.sh: #7839: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7840: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7841: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 59:b1:eb:42:db:49:9a:ab:28:c8:fd:66:91:18:b1:af Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:f5:8a:4a:4f:01:f9:d8:26:ec:4d:d8:cf:80:bb: d4:c7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7842: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7843: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7844: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: dd:43:e9:38:72:9d:6b:68:1d:25:cc:c4:52:91:0f:1e Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:8a:0c:86:02:14:b3:ae:1e:40:a8:30:14:aa:9c: a6:cd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7845: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7846: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7847: Exporting with [AES-256-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a7:7c:07:f5:3a:fc:fd:ae:a2:10:b7:ec:89:54:85:cb Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:77:6b:0b:e6:40:bb:2c:43:96:2d:eb:da:17:b6: e7:cc Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7848: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7849: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7850: Exporting with [AES-256-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a7:b0:89:08:a6:7e:e8:5b:7b:a5:14:45:e5:52:59:20 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:9a:47:da:48:08:cb:04:ea:e9:94:df:93:00:36: 55:12 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7851: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7852: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7853: Exporting with [AES-256-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 48:c9:18:33:03:98:ce:9a:f2:32:83:97:89:f3:66:64 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:a5:00:2f:0b:e7:2e:b5:58:2f:08:98:09:0f:c4: bd:ea Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7854: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7855: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7856: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 34:7b:f8:1d:03:35:5d:45:ce:62:00:b3:04:12:c8:42 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:fa:75:5c:15:45:19:be:df:fa:03:bc:5e:cf:cb: 77:42 tools.sh: #7857: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7858: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7859: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: df:6d:af:a7:47:5e:1e:fb:9e:a4:f3:9b:d7:6e:af:9b Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:3a:9d:e3:3b:50:dc:77:07:17:d4:b1:9a:82:a6: 7c:af Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7860: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7861: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7862: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3f:50:04:8d:fe:a3:3d:65:a1:17:cd:6b:4c:87:61:1a Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:62:2f:b3:1f:9a:95:73:75:3d:9e:f1:e3:33:59: aa:16 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7863: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7864: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7865: Exporting with [CAMELLIA-128-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 83:b0:3c:4e:44:ab:b4:14:b4:44:d6:06:47:c5:5a:e4 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:4e:7b:b2:34:05:78:1d:9b:ea:0a:ed:08:f7:fa: a1:00 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7866: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7867: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7868: Exporting with [CAMELLIA-128-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9e:7b:d0:e0:77:1f:17:49:24:47:50:28:4d:b5:39:f7 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:09:a6:5a:14:d1:11:cb:68:d2:51:6c:d9:5c:ee: 54:c0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7869: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7870: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7871: Exporting with [CAMELLIA-128-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: da:24:da:5b:c6:50:0e:ae:15:82:aa:b7:cb:9f:cf:ef Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:7e:5a:e4:48:16:d9:e4:5b:b5:b7:c0:51:89:d3: 4c:fa Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7872: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7873: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7874: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: cb:da:7e:5c:b7:bb:c4:09:90:a3:e3:0f:38:cd:11:4a Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:a8:95:35:7d:1f:37:61:c5:c1:f7:34:84:29:f1: 32:ed tools.sh: #7875: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7876: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7877: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 82:4b:e9:51:5d:9a:23:b4:7c:59:ec:fe:a0:dc:a5:fb Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:b2:58:e8:40:50:d9:69:72:43:94:cb:c4:5c:d9: 16:ba Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7878: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7879: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7880: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 38:72:fe:91:bc:78:bd:49:b8:94:8f:63:78:b4:d2:11 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:00:38:31:4f:49:71:d9:44:b2:0e:ea:f5:75:9f: 36:1d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7881: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7882: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7883: Exporting with [CAMELLIA-192-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 41:3e:75:2c:b7:bd:b2:45:63:cf:80:b6:21:f1:b7:65 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:34:db:a6:0f:9d:6d:14:c8:b0:cb:cd:bc:24:69: 51:61 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7884: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7885: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7886: Exporting with [CAMELLIA-192-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 15:a7:b3:1f:8e:d3:ba:6c:79:c8:ef:a1:3f:0a:31:31 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:94:e9:35:46:fe:b7:04:5e:9b:f9:a6:89:34:66: 77:b7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7887: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7888: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7889: Exporting with [CAMELLIA-192-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 55:82:84:47:98:e0:78:37:b7:0c:64:22:62:05:e9:60 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:75:3e:11:d5:bf:f4:58:35:1f:dc:c9:2f:28:67: a2:4f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7890: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7891: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7892: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 73:22:4b:9b:39:a6:0c:f1:ca:6e:12:95:32:20:9a:60 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:73:66:35:3d:ce:c9:d0:1e:64:b9:5f:a5:5a:06: fc:18 tools.sh: #7893: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7894: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7895: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 59:a1:01:29:26:84:80:d8:73:e5:92:6c:c1:c6:4a:5e Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:d1:f4:04:19:62:25:ea:fa:da:14:5a:53:54:e1: 58:73 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7896: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7897: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7898: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8f:93:93:78:8f:8e:aa:28:65:04:08:c0:bc:a7:5d:9c Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:7f:71:18:a6:39:32:97:07:ff:f9:1d:c5:3e:c8: 4b:9d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7899: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7900: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7901: Exporting with [CAMELLIA-256-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b2:be:a5:13:32:f3:0e:d3:12:bc:c0:11:10:69:4d:55 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:93:41:70:23:1b:4d:d0:0f:a5:77:7a:48:2a:18: 41:a8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7902: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7903: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7904: Exporting with [CAMELLIA-256-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 42:0a:c6:ee:bb:68:47:10:5f:78:f4:a6:74:f3:70:31 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:8d:71:11:05:66:ea:e7:1f:40:5d:59:5c:fb:8c: 54:99 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7905: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7906: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7907: Exporting with [CAMELLIA-256-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 17:d6:d4:ab:1e:45:33:7a:3a:31:f8:7c:24:bd:0c:0f Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:5f:d7:61:88:c6:a5:6d:8c:ad:fa:39:9c:53:76: 41:6e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7908: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7909: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7910: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 99:df:69:e9:46:49:2d:36:62:5e:c2:4e:b1:7b:a9:9f Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:2c:5f:10:74:f9:9d:4a:32:18:15:05:03:ad:cf: 31:ec tools.sh: #7911: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7912: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7913: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 1c:7d:a2:d8:0f:59:8d:d5:ea:03:fe:2f:90:7c:b1:4b Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7914: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7915: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7916: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 8d:25:a4:91:db:64:66:68:a0:6b:45:aa:f0:48:dc:c5 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7917: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7918: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7919: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 51:d9:46:f4:af:72:40:2d:31:db:a6:b3:a5:77:b3:7b Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7920: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7921: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7922: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: bd:12:51:1b:81:85:87:5e:be:42:97:ae:2c:db:23:3e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7923: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7924: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7925: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 37:87:40:73:61:ef:57:45:02:4a:3c:6b:d6:51:b8:50 Iteration Count: 2000 (0x7d0) tools.sh: #7926: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7927: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7928: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: d2:02:83:7c:d8:70:3a:19:44:b6:c0:98:d8:ac:22:6f Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7929: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7930: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7931: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: a8:5c:c3:be:67:e3:11:55:03:cb:70:dd:7e:95:2b:c1 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7932: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7933: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7934: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: cf:33:87:a1:7d:71:84:eb:a1:75:95:56:7f:93:71:cb Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7935: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7936: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7937: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: c9:e7:6c:27:5c:8d:66:83:03:dc:2f:7b:c5:cb:2a:d0 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7938: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7939: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7940: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 62:76:0c:bc:74:9b:5d:8e:4d:61:6f:4c:5a:7c:59:03 Iteration Count: 2000 (0x7d0) tools.sh: #7941: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7942: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7943: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: a9:b6:56:83:16:25:27:0c:4c:7c:6f:90:40:ab:2a:b4 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7944: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7945: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7946: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 27:04:f3:34:f7:95:01:c5:fc:72:1d:20:98:68:a9:70 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7947: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7948: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7949: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d8:fb:ce:54:40:05:dc:3b:7b:a3:43:be:c6:a3:92:9c Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7950: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7951: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7952: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 8f:47:8c:78:58:d2:b6:04:ae:70:e2:19:97:af:5d:3b Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7953: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7954: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7955: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d1:55:73:5b:c6:4b:a0:f5:56:b5:d5:7b:9b:8a:69:41 Iteration Count: 2000 (0x7d0) tools.sh: #7956: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7957: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7958: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a9:24:22:8e:c8:07:10:1a:b3:91:31:69:3a:4f:c1:ca Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7959: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7960: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7961: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7b:53:b2:0c:71:b0:b5:9a:10:b6:97:92:a0:7a:cc:99 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7962: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7963: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7964: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 01:c6:11:db:88:bf:f9:34:77:0d:ca:f9:33:ff:c5:10 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7965: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7966: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7967: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d6:30:ad:a9:d3:96:f6:68:d4:6d:fd:bb:04:d9:96:c2 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7968: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7969: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7970: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 90:01:1a:3c:c3:e0:34:dc:0b:4e:5d:9c:e8:5b:e6:61 Iteration Count: 2000 (0x7d0) tools.sh: #7971: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7972: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7973: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d5:17:cb:5b:30:1f:24:42:76:89:23:61:70:4a:0b:46 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7974: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7975: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7976: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7f:90:04:a0:1c:6c:e5:e1:ff:9b:40:53:50:ef:19:d2 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7977: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7978: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7979: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: dc:f1:fe:19:f0:51:43:87:50:82:32:56:94:eb:a8:2d Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7980: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7981: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7982: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c8:87:4c:2e:59:f4:c2:04:83:fd:5f:87:60:ba:05:94 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7983: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7984: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7985: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5a:3e:94:e0:35:45:a1:b8:31:ec:34:67:e3:77:18:82 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7986: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7987: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7988: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5a:e4:7a:96:54:52:91:5f:58:c7:c9:73:bc:1c:89:c6 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7989: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7990: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7991: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 81:15:77:e0:8d:65:79:b8:24:32:1a:06:60:a6:b7:2e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7992: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7993: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7994: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cb:94:10:59:3b:df:34:80:18:7d:b3:a6:cc:d5:75:0a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7995: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7996: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #7997: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8c:32:a7:bb:12:79:03:43:45:1b:ba:e4:55:10:87:5a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #7998: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7999: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8000: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a6:52:3c:62:7f:a4:eb:a7:27:0a:5e:a4:dc:3d:f8:d7 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:21 2017 Not After : Tue May 10 11:41:21 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:5e:4e:0c:9c:37:bd:fa:3e:0e:72:9b:56:41:ca:04: 8a:9e:4f:34:9c:71:65:23:94:45:37:37:b8:2b:06:9a: 40:f3:13:a9:f0:14:a9:0b:84:f4:b0:a5:67:f7:0f:1b: 97:48:b5:34:e5:aa:00:d3:f4:1f:84:3d:89:18:37:50: 7a:1a:74:2c:29:61:80:de:61:15:79:ea:8f:1d:bc:58: 85:68:8b:29:fd:c1:58:8b:b8:f4:ce:06:07:d1:f0:4c: 50:b7:41:00:ca:b6:11:21:0b:01:94:a3:3c:f2:61:ad: a9:9f:06:15:13:d8:94:74:49:ce:6e:c2:1e:34:5e:24: 3a:14:32:bb:bc:05:96:f0:cd:2e:a1:5a:85:07:cf:af: ee:ba:e4:ab:8e:d7:bb:85:a1:c8:2b:fc:c4:f0:28:b3: f8:64:b9:49:95:06:5e:63:e6:d1:31:72:24:d3:cf:f1: 08:f8:d1:e5:71:0b:34:b5:b9:06:cf:f4:d5:b3:f8:a7: 3d:24:50:72:b7:54:ba:1a:d7:5b:12:f6:81:10:57:4a: a0:0e:30:ae:70:07:29:42:01:1d:3e:ea:14:a8:4e:59: 48:77:2a:3e:20:e6:01:39:d8:51:4a:fb:da:2b:5a:17: 57:ce:51:12:dd:d4:38:68:5a:86:78:7c:86:3d:ca:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:70:2f:b9:01:72:c9:1d:68:84:db:0a:a1:55:db:a7: f6:b0:11:cc:e0:79:be:83:05:4a:63:f0:1d:f5:31:c1: c6:bf:bb:a4:d4:29:3b:10:85:5b:aa:76:04:c2:2b:38: 5b:c5:83:fe:1c:06:c5:c8:9b:be:55:2a:d6:f5:79:67: bd:fc:a3:a7:46:ef:fd:e3:76:29:b6:e3:9a:a2:f3:1a: 1f:41:44:0e:a2:24:eb:bf:37:1c:90:c7:c3:71:4f:db: 0e:b7:08:85:43:f8:94:1b:09:c1:59:ec:ac:22:c9:b3: 88:35:47:d4:51:36:3f:98:dc:f4:c2:8f:15:38:6f:dc: d3:d4:d1:11:27:35:f6:bc:8e:3a:b8:74:f8:38:3a:22: 14:e8:f6:11:ed:48:c1:3f:92:26:3f:88:87:02:55:6d: 8b:84:e0:2f:40:9a:46:4a:46:80:96:dc:9a:05:2a:79: 0e:bf:d2:be:ce:de:b8:72:0f:6b:2c:c6:5b:4f:db:ed: ba:8a:53:d5:9d:a9:9b:46:eb:2d:ed:81:a5:ef:19:d8: 53:56:2d:22:4f:24:c5:2f:45:b6:ee:b5:cf:be:02:22: 38:3c:d1:1a:72:0f:bc:b9:68:88:54:5f:ca:df:dc:14: b2:0a:fa:df:32:be:2b:0c:93:c9:ed:8f:91:39:c0:b0 Fingerprint (SHA-256): 9E:6B:B4:15:51:CA:24:4F:F8:E6:AF:36:3C:2F:92:C6:59:C5:58:99:F2:62:02:88:25:47:AC:B2:8A:B5:97:60 Fingerprint (SHA1): 8A:26:07:74:7C:53:53:C1:84:E0:90:79:A0:CC:13:7A:1B:8D:42:52 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:41:49 2017 Not After : Tue May 10 11:41:49 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:23:f5:d6:fd:63:10:02:96:4e:54:bd:37:87:81:13: 7f:4b:67:79:c8:ee:47:98:7b:c1:6f:f1:dc:2a:d2:6f: b0:9c:db:a5:88:e1:58:4d:34:37:cc:ea:7c:1f:06:96: b1:6c:57:3e:f5:71:f1:4f:8c:99:19:70:4c:c0:96:cd: 97:58:ae:25:25:60:3f:82:9b:dd:df:34:b1:6f:df:5d: ff:69:f7:a8:e7:e9:e7:b4:4d:90:72:b3:0a:de:8e:4e: 8c:48:a5:2b:18:da:71:8b:f6:c1:88:73:a4:6b:81:a6: c3:fc:bd:47:2c:8d:eb:80:df:58:59:e3:b2:f8:86:39: 6d:75:25:6a:c6:ff:f7:f9:51:14:e5:82:29:f5:97:4a: 70:ca:7b:b1:4c:a2:be:6e:00:72:b6:39:89:1c:5f:d6: e6:48:14:1b:fe:4b:e9:45:a6:4a:53:36:91:f8:e8:e9: 62:87:0b:89:27:4f:8c:b5:c0:e3:a8:d1:5c:83:25:ac: 19:3d:b2:61:82:81:84:5c:d0:5b:25:90:91:58:61:19: 53:31:8f:dd:93:51:34:71:0c:2a:bb:99:98:37:f9:63: 7a:8d:06:c4:c2:6f:ca:71:24:7f:17:6d:c2:b7:4d:19: ff:b3:b7:53:91:bf:8c:94:04:27:29:b0:91:51:97:fd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d3:9f:39:bf:ab:27:2f:a3:cf:89:17:04:52:4d:a9: 9c:4c:fc:20:2f:3b:13:5c:71:cc:11:a1:3a:91:35:7f: 2e:26:fe:36:3e:70:b2:cf:ba:cd:ed:07:86:09:5f:ce: 70:44:07:ee:31:88:07:67:aa:bb:3d:8a:2c:db:00:db: 64:ba:51:2f:cd:33:1d:81:20:89:19:92:94:c5:ac:68: 7e:53:d8:c5:e9:41:1c:16:8a:3c:6b:38:f9:1d:b5:8c: 25:61:fd:d7:07:09:b8:09:a0:7f:ab:02:72:16:0c:6e: 3c:7f:14:13:7e:ae:a4:73:2b:fd:de:ce:74:58:f2:aa: 58:5b:d3:80:10:cb:68:6d:96:aa:c2:95:43:4f:7a:a3: d6:5b:f1:ac:76:48:91:8f:22:7d:0e:c4:ea:80:b2:d4: cc:c9:a6:a0:71:85:04:5e:40:3a:4e:e1:45:a8:f3:71: 4f:8c:3f:f6:d2:90:95:28:81:d0:08:70:ea:62:bf:d7: 71:ee:65:a3:e7:18:9f:f9:ae:0c:87:8d:8a:72:68:e8: fa:99:26:2b:6a:b5:87:64:15:4a:89:a3:29:d1:4e:13: 5a:2e:1e:52:3c:d6:46:1b:8e:a4:21:93:f2:89:36:73: 6b:19:6f:08:33:b1:04:9d:db:81:2c:16:39:bf:11:73 Fingerprint (SHA-256): FB:21:61:7F:E4:BF:02:F5:A0:E3:E5:68:F0:B8:4E:16:19:76:BB:9B:D2:4F:FD:08:68:BB:06:C3:8F:C0:71:75 Fingerprint (SHA1): 5F:E7:F1:E8:4A:B8:B1:C4:8F:73:55:31:CC:3D:09:95:7D:EC:5F:59 Friendly Name: Alice tools.sh: #8001: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8002: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #8003: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8004: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #8005: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 37%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) tree "../tools/html" signed successfully tools.sh: #8006: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #8007: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #8008: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html --> sign.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 33%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 37%) tree "../tools/html" signed successfully tools.sh: #8009: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #8010: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #8011: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Wed May 10 12:35:28 UTC 2017 Running tests for fips TIMESTAMP fips BEGIN: Wed May 10 12:35:28 UTC 2017 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #8012: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #8013: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 56ada9822a1ced475dbd58d6714e3c6778f4bd87 FIPS_PUB_140_Test_Certificate fips.sh: #8014: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #8015: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #8016: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #8017: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #8018: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #8019: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #8020: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #8021: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #8022: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #8023: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #8024: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 56ada9822a1ced475dbd58d6714e3c6778f4bd87 FIPS_PUB_140_Test_Certificate fips.sh: #8025: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #8026: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #8027: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #8028: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #8029: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 56ada9822a1ced475dbd58d6714e3c6778f4bd87 FIPS_PUB_140_Test_Certificate fips.sh: #8030: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #8031: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #8032: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle mkdir: cannot create directory '/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle': File exists cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest1.so /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle/libsoftokn3.so -o -8 -b 5 Changing byte 0x00033918 (211224): from 21 (33) to 01 (1) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/fips/mangle dbtest -r -d ../fips fips.sh: #8033: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Wed May 10 12:36:05 UTC 2017 Running tests for crmf TIMESTAMP crmf BEGIN: Wed May 10 12:36:05 UTC 2017 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #8034: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #8035: CMMF test . - PASSED TIMESTAMP crmf END: Wed May 10 12:36:05 UTC 2017 Running tests for smime TIMESTAMP smime BEGIN: Wed May 10 12:36:05 UTC 2017 smime.sh: S/MIME Tests with ECC =============================== smime.sh: Signing Detached Message {SHA1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #8036: Create Detached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #8037: Verifying Alice's Detached Signature (SHA1) . - PASSED smime.sh: Signing Attached Message (SHA1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #8038: Create Attached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1 smime.sh: #8039: Decode Alice's Attached Signature (SHA1) . - PASSED diff alice.txt alice.data.SHA1 smime.sh: #8040: Compare Attached Signed Data and Original (SHA1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA1} ------------------ cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #8041: Create Detached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #8042: Verifying Alice's Detached Signature (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA1) ------------------ cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #8043: Create Attached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.SHA1 smime.sh: #8044: Decode Alice's Attached Signature (ECDSA w/ SHA1) . - PASSED diff alice.txt alice-ec.data.SHA1 smime.sh: #8045: Compare Attached Signed Data and Original (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Detached Message {SHA256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #8046: Create Detached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #8047: Verifying Alice's Detached Signature (SHA256) . - PASSED smime.sh: Signing Attached Message (SHA256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #8048: Create Attached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256 smime.sh: #8049: Decode Alice's Attached Signature (SHA256) . - PASSED diff alice.txt alice.data.SHA256 smime.sh: #8050: Compare Attached Signed Data and Original (SHA256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA256} ------------------ cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #8051: Create Detached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #8052: Verifying Alice's Detached Signature (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA256) ------------------ cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #8053: Create Attached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.SHA256 smime.sh: #8054: Decode Alice's Attached Signature (ECDSA w/ SHA256) . - PASSED diff alice.txt alice-ec.data.SHA256 smime.sh: #8055: Compare Attached Signed Data and Original (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Detached Message {SHA384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #8056: Create Detached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #8057: Verifying Alice's Detached Signature (SHA384) . - PASSED smime.sh: Signing Attached Message (SHA384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #8058: Create Attached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384 smime.sh: #8059: Decode Alice's Attached Signature (SHA384) . - PASSED diff alice.txt alice.data.SHA384 smime.sh: #8060: Compare Attached Signed Data and Original (SHA384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA384} ------------------ cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #8061: Create Detached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #8062: Verifying Alice's Detached Signature (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA384) ------------------ cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #8063: Create Attached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.SHA384 smime.sh: #8064: Decode Alice's Attached Signature (ECDSA w/ SHA384) . - PASSED diff alice.txt alice-ec.data.SHA384 smime.sh: #8065: Compare Attached Signed Data and Original (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Detached Message {SHA512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #8066: Create Detached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #8067: Verifying Alice's Detached Signature (SHA512) . - PASSED smime.sh: Signing Attached Message (SHA512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #8068: Create Attached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512 smime.sh: #8069: Decode Alice's Attached Signature (SHA512) . - PASSED diff alice.txt alice.data.SHA512 smime.sh: #8070: Compare Attached Signed Data and Original (SHA512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA512} ------------------ cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #8071: Create Detached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #8072: Verifying Alice's Detached Signature (ECDSA w/ SHA512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA512) ------------------ cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #8073: Create Attached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.SHA512 smime.sh: #8074: Decode Alice's Attached Signature (ECDSA w/ SHA512) . - PASSED diff alice.txt alice-ec.data.SHA512 smime.sh: #8075: Compare Attached Signed Data and Original (ECDSA w/ SHA512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #8076: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #8077: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #8078: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@bogus.com,dave@bogus.com smime.sh: #8079: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@bogus.net smime.sh: #8080: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #8081: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #8082: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #8083: Decrypt with a Multiple Email cert . - PASSED smime.sh: #8084: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #8085: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #8086: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \ -d ../alicedir > co.der smime.sh: #8087: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #8088: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@bogus.com" > alice.enc smime.sh: #8089: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #8090: Decode Encrypted-Data . - PASSED smime.sh: #8091: Compare Decoded and Original Data . - PASSED smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #8092: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice.env -o alice_p7.data smime.sh: #8093: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #8094: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #8095: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #8096: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Wed May 10 12:36:15 UTC 2017 Running tests for ssl TIMESTAMP ssl BEGIN: Wed May 10 12:36:15 UTC 2017 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:36:15 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 21805 >/dev/null 2>/dev/null selfserv_9208 with PID 21805 found at Wed May 10 12:36:15 UTC 2017 selfserv_9208 with PID 21805 started at Wed May 10 12:36:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8097: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 21805 at Wed May 10 12:36:16 UTC 2017 kill -USR1 21805 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 21805 killed at Wed May 10 12:36:16 UTC 2017 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:36:16 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 21861 >/dev/null 2>/dev/null selfserv_9208 with PID 21861 found at Wed May 10 12:36:16 UTC 2017 selfserv_9208 with PID 21861 started at Wed May 10 12:36:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8098: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 21861 at Wed May 10 12:36:17 UTC 2017 kill -USR1 21861 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 21861 killed at Wed May 10 12:36:17 UTC 2017 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:36:17 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:17 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 21917 >/dev/null 2>/dev/null selfserv_9208 with PID 21917 found at Wed May 10 12:36:17 UTC 2017 selfserv_9208 with PID 21917 started at Wed May 10 12:36:17 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8099: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 21917 at Wed May 10 12:36:17 UTC 2017 kill -USR1 21917 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 21917 killed at Wed May 10 12:36:18 UTC 2017 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:36:18 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 21985 >/dev/null 2>/dev/null selfserv_9208 with PID 21985 found at Wed May 10 12:36:18 UTC 2017 selfserv_9208 with PID 21985 started at Wed May 10 12:36:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8100: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 21985 at Wed May 10 12:36:18 UTC 2017 kill -USR1 21985 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 21985 killed at Wed May 10 12:36:18 UTC 2017 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:36:18 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22041 >/dev/null 2>/dev/null selfserv_9208 with PID 22041 found at Wed May 10 12:36:18 UTC 2017 selfserv_9208 with PID 22041 started at Wed May 10 12:36:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8101: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 22041 at Wed May 10 12:36:19 UTC 2017 kill -USR1 22041 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22041 killed at Wed May 10 12:36:19 UTC 2017 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:36:19 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:19 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22097 >/dev/null 2>/dev/null selfserv_9208 with PID 22097 found at Wed May 10 12:36:19 UTC 2017 selfserv_9208 with PID 22097 started at Wed May 10 12:36:19 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8102: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 22097 at Wed May 10 12:36:20 UTC 2017 kill -USR1 22097 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22097 killed at Wed May 10 12:36:20 UTC 2017 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:36:20 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22165 >/dev/null 2>/dev/null selfserv_9208 with PID 22165 found at Wed May 10 12:36:20 UTC 2017 selfserv_9208 with PID 22165 started at Wed May 10 12:36:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8103: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 22165 at Wed May 10 12:36:20 UTC 2017 kill -USR1 22165 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22165 killed at Wed May 10 12:36:20 UTC 2017 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:36:21 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22221 >/dev/null 2>/dev/null selfserv_9208 with PID 22221 found at Wed May 10 12:36:21 UTC 2017 selfserv_9208 with PID 22221 started at Wed May 10 12:36:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8104: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 22221 at Wed May 10 12:36:21 UTC 2017 kill -USR1 22221 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22221 killed at Wed May 10 12:36:21 UTC 2017 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:36:21 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22277 >/dev/null 2>/dev/null selfserv_9208 with PID 22277 found at Wed May 10 12:36:21 UTC 2017 selfserv_9208 with PID 22277 started at Wed May 10 12:36:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8105: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 22277 at Wed May 10 12:36:22 UTC 2017 kill -USR1 22277 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22277 killed at Wed May 10 12:36:22 UTC 2017 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:36:22 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22345 >/dev/null 2>/dev/null selfserv_9208 with PID 22345 found at Wed May 10 12:36:22 UTC 2017 selfserv_9208 with PID 22345 started at Wed May 10 12:36:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8106: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 22345 at Wed May 10 12:36:23 UTC 2017 kill -USR1 22345 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22345 killed at Wed May 10 12:36:23 UTC 2017 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:36:23 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22401 >/dev/null 2>/dev/null selfserv_9208 with PID 22401 found at Wed May 10 12:36:23 UTC 2017 selfserv_9208 with PID 22401 started at Wed May 10 12:36:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8107: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 22401 at Wed May 10 12:36:23 UTC 2017 kill -USR1 22401 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22401 killed at Wed May 10 12:36:23 UTC 2017 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:36:23 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22457 >/dev/null 2>/dev/null selfserv_9208 with PID 22457 found at Wed May 10 12:36:23 UTC 2017 selfserv_9208 with PID 22457 started at Wed May 10 12:36:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8108: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 22457 at Wed May 10 12:36:24 UTC 2017 kill -USR1 22457 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22457 killed at Wed May 10 12:36:24 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:36:24 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:24 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22525 >/dev/null 2>/dev/null selfserv_9208 with PID 22525 found at Wed May 10 12:36:24 UTC 2017 selfserv_9208 with PID 22525 started at Wed May 10 12:36:24 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8109: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 22525 at Wed May 10 12:36:25 UTC 2017 kill -USR1 22525 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22525 killed at Wed May 10 12:36:25 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:36:25 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:25 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22581 >/dev/null 2>/dev/null selfserv_9208 with PID 22581 found at Wed May 10 12:36:25 UTC 2017 selfserv_9208 with PID 22581 started at Wed May 10 12:36:25 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8110: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 22581 at Wed May 10 12:36:25 UTC 2017 kill -USR1 22581 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22581 killed at Wed May 10 12:36:25 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:36:26 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:26 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22639 >/dev/null 2>/dev/null selfserv_9208 with PID 22639 found at Wed May 10 12:36:26 UTC 2017 selfserv_9208 with PID 22639 started at Wed May 10 12:36:26 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8111: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 22639 at Wed May 10 12:36:26 UTC 2017 kill -USR1 22639 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22639 killed at Wed May 10 12:36:26 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:36:26 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:26 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22707 >/dev/null 2>/dev/null selfserv_9208 with PID 22707 found at Wed May 10 12:36:26 UTC 2017 selfserv_9208 with PID 22707 started at Wed May 10 12:36:26 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8112: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 22707 at Wed May 10 12:36:27 UTC 2017 kill -USR1 22707 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22707 killed at Wed May 10 12:36:27 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:36:27 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:27 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22763 >/dev/null 2>/dev/null selfserv_9208 with PID 22763 found at Wed May 10 12:36:27 UTC 2017 selfserv_9208 with PID 22763 started at Wed May 10 12:36:27 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8113: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 22763 at Wed May 10 12:36:28 UTC 2017 kill -USR1 22763 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22763 killed at Wed May 10 12:36:28 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:36:28 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:28 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22819 >/dev/null 2>/dev/null selfserv_9208 with PID 22819 found at Wed May 10 12:36:28 UTC 2017 selfserv_9208 with PID 22819 started at Wed May 10 12:36:28 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8114: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 22819 at Wed May 10 12:36:28 UTC 2017 kill -USR1 22819 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22819 killed at Wed May 10 12:36:28 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:36:29 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:29 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22889 >/dev/null 2>/dev/null selfserv_9208 with PID 22889 found at Wed May 10 12:36:29 UTC 2017 selfserv_9208 with PID 22889 started at Wed May 10 12:36:29 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8115: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 22889 at Wed May 10 12:36:29 UTC 2017 kill -USR1 22889 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22889 killed at Wed May 10 12:36:29 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:36:29 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:29 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 22945 >/dev/null 2>/dev/null selfserv_9208 with PID 22945 found at Wed May 10 12:36:29 UTC 2017 selfserv_9208 with PID 22945 started at Wed May 10 12:36:29 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8116: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 22945 at Wed May 10 12:36:30 UTC 2017 kill -USR1 22945 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 22945 killed at Wed May 10 12:36:30 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:36:30 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:30 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23001 >/dev/null 2>/dev/null selfserv_9208 with PID 23001 found at Wed May 10 12:36:30 UTC 2017 selfserv_9208 with PID 23001 started at Wed May 10 12:36:30 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8117: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 23001 at Wed May 10 12:36:30 UTC 2017 kill -USR1 23001 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23001 killed at Wed May 10 12:36:30 UTC 2017 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:36:31 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:31 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23069 >/dev/null 2>/dev/null selfserv_9208 with PID 23069 found at Wed May 10 12:36:31 UTC 2017 selfserv_9208 with PID 23069 started at Wed May 10 12:36:31 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8118: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 23069 at Wed May 10 12:36:31 UTC 2017 kill -USR1 23069 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23069 killed at Wed May 10 12:36:31 UTC 2017 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:36:31 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:31 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23125 >/dev/null 2>/dev/null selfserv_9208 with PID 23125 found at Wed May 10 12:36:31 UTC 2017 selfserv_9208 with PID 23125 started at Wed May 10 12:36:31 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8119: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 23125 at Wed May 10 12:36:32 UTC 2017 kill -USR1 23125 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23125 killed at Wed May 10 12:36:32 UTC 2017 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:36:32 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:32 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23181 >/dev/null 2>/dev/null selfserv_9208 with PID 23181 found at Wed May 10 12:36:32 UTC 2017 selfserv_9208 with PID 23181 started at Wed May 10 12:36:32 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8120: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 23181 at Wed May 10 12:36:33 UTC 2017 kill -USR1 23181 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23181 killed at Wed May 10 12:36:33 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:36:33 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:33 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23249 >/dev/null 2>/dev/null selfserv_9208 with PID 23249 found at Wed May 10 12:36:33 UTC 2017 selfserv_9208 with PID 23249 started at Wed May 10 12:36:33 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8121: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 23249 at Wed May 10 12:36:33 UTC 2017 kill -USR1 23249 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23249 killed at Wed May 10 12:36:33 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:36:33 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:33 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23305 >/dev/null 2>/dev/null selfserv_9208 with PID 23305 found at Wed May 10 12:36:33 UTC 2017 selfserv_9208 with PID 23305 started at Wed May 10 12:36:33 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8122: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 23305 at Wed May 10 12:36:34 UTC 2017 kill -USR1 23305 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23305 killed at Wed May 10 12:36:34 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:36:34 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:34 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23361 >/dev/null 2>/dev/null selfserv_9208 with PID 23361 found at Wed May 10 12:36:34 UTC 2017 selfserv_9208 with PID 23361 started at Wed May 10 12:36:34 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8123: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 23361 at Wed May 10 12:36:35 UTC 2017 kill -USR1 23361 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23361 killed at Wed May 10 12:36:35 UTC 2017 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:36:35 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:35 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23429 >/dev/null 2>/dev/null selfserv_9208 with PID 23429 found at Wed May 10 12:36:35 UTC 2017 selfserv_9208 with PID 23429 started at Wed May 10 12:36:35 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8124: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 23429 at Wed May 10 12:36:35 UTC 2017 kill -USR1 23429 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23429 killed at Wed May 10 12:36:35 UTC 2017 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:36:35 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:35 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23486 >/dev/null 2>/dev/null selfserv_9208 with PID 23486 found at Wed May 10 12:36:35 UTC 2017 selfserv_9208 with PID 23486 started at Wed May 10 12:36:36 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8125: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 23486 at Wed May 10 12:36:36 UTC 2017 kill -USR1 23486 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23486 killed at Wed May 10 12:36:36 UTC 2017 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:36:36 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:36 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23542 >/dev/null 2>/dev/null selfserv_9208 with PID 23542 found at Wed May 10 12:36:36 UTC 2017 selfserv_9208 with PID 23542 started at Wed May 10 12:36:36 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8126: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 23542 at Wed May 10 12:36:37 UTC 2017 kill -USR1 23542 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23542 killed at Wed May 10 12:36:37 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:36:37 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:37 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23610 >/dev/null 2>/dev/null selfserv_9208 with PID 23610 found at Wed May 10 12:36:37 UTC 2017 selfserv_9208 with PID 23610 started at Wed May 10 12:36:37 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8127: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 23610 at Wed May 10 12:36:37 UTC 2017 kill -USR1 23610 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23610 killed at Wed May 10 12:36:37 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:36:37 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:38 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23666 >/dev/null 2>/dev/null selfserv_9208 with PID 23666 found at Wed May 10 12:36:38 UTC 2017 selfserv_9208 with PID 23666 started at Wed May 10 12:36:38 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8128: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 23666 at Wed May 10 12:36:38 UTC 2017 kill -USR1 23666 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23666 killed at Wed May 10 12:36:38 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:36:38 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:38 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23722 >/dev/null 2>/dev/null selfserv_9208 with PID 23722 found at Wed May 10 12:36:38 UTC 2017 selfserv_9208 with PID 23722 started at Wed May 10 12:36:38 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8129: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 23722 at Wed May 10 12:36:39 UTC 2017 kill -USR1 23722 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23722 killed at Wed May 10 12:36:39 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:36:39 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:39 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23790 >/dev/null 2>/dev/null selfserv_9208 with PID 23790 found at Wed May 10 12:36:39 UTC 2017 selfserv_9208 with PID 23790 started at Wed May 10 12:36:39 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8130: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 23790 at Wed May 10 12:36:40 UTC 2017 kill -USR1 23790 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23790 killed at Wed May 10 12:36:40 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:36:40 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:40 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23846 >/dev/null 2>/dev/null selfserv_9208 with PID 23846 found at Wed May 10 12:36:40 UTC 2017 selfserv_9208 with PID 23846 started at Wed May 10 12:36:40 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8131: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 23846 at Wed May 10 12:36:40 UTC 2017 kill -USR1 23846 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23846 killed at Wed May 10 12:36:40 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:36:40 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:40 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23902 >/dev/null 2>/dev/null selfserv_9208 with PID 23902 found at Wed May 10 12:36:40 UTC 2017 selfserv_9208 with PID 23902 started at Wed May 10 12:36:40 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8132: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 23902 at Wed May 10 12:36:41 UTC 2017 kill -USR1 23902 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23902 killed at Wed May 10 12:36:41 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:36:41 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:41 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23970 >/dev/null 2>/dev/null selfserv_9208 with PID 23970 found at Wed May 10 12:36:41 UTC 2017 selfserv_9208 with PID 23970 started at Wed May 10 12:36:41 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8133: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 23970 at Wed May 10 12:36:42 UTC 2017 kill -USR1 23970 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23970 killed at Wed May 10 12:36:42 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:36:42 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:42 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24026 >/dev/null 2>/dev/null selfserv_9208 with PID 24026 found at Wed May 10 12:36:42 UTC 2017 selfserv_9208 with PID 24026 started at Wed May 10 12:36:42 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8134: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 24026 at Wed May 10 12:36:43 UTC 2017 kill -USR1 24026 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24026 killed at Wed May 10 12:36:43 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:36:43 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:43 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24082 >/dev/null 2>/dev/null selfserv_9208 with PID 24082 found at Wed May 10 12:36:43 UTC 2017 selfserv_9208 with PID 24082 started at Wed May 10 12:36:43 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8135: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 24082 at Wed May 10 12:36:43 UTC 2017 kill -USR1 24082 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24082 killed at Wed May 10 12:36:43 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:36:43 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:43 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24150 >/dev/null 2>/dev/null selfserv_9208 with PID 24150 found at Wed May 10 12:36:43 UTC 2017 selfserv_9208 with PID 24150 started at Wed May 10 12:36:43 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8136: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 24150 at Wed May 10 12:36:44 UTC 2017 kill -USR1 24150 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24150 killed at Wed May 10 12:36:44 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:36:44 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:44 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24206 >/dev/null 2>/dev/null selfserv_9208 with PID 24206 found at Wed May 10 12:36:44 UTC 2017 selfserv_9208 with PID 24206 started at Wed May 10 12:36:44 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8137: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 24206 at Wed May 10 12:36:45 UTC 2017 kill -USR1 24206 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24206 killed at Wed May 10 12:36:45 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:36:45 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:45 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24262 >/dev/null 2>/dev/null selfserv_9208 with PID 24262 found at Wed May 10 12:36:45 UTC 2017 selfserv_9208 with PID 24262 started at Wed May 10 12:36:45 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8138: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 24262 at Wed May 10 12:36:46 UTC 2017 kill -USR1 24262 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24262 killed at Wed May 10 12:36:46 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:36:46 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:46 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24330 >/dev/null 2>/dev/null selfserv_9208 with PID 24330 found at Wed May 10 12:36:46 UTC 2017 selfserv_9208 with PID 24330 started at Wed May 10 12:36:46 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8139: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 24330 at Wed May 10 12:36:47 UTC 2017 kill -USR1 24330 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24330 killed at Wed May 10 12:36:47 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:36:47 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:47 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24386 >/dev/null 2>/dev/null selfserv_9208 with PID 24386 found at Wed May 10 12:36:47 UTC 2017 selfserv_9208 with PID 24386 started at Wed May 10 12:36:47 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8140: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 24386 at Wed May 10 12:36:47 UTC 2017 kill -USR1 24386 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24386 killed at Wed May 10 12:36:47 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:36:47 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:47 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24442 >/dev/null 2>/dev/null selfserv_9208 with PID 24442 found at Wed May 10 12:36:47 UTC 2017 selfserv_9208 with PID 24442 started at Wed May 10 12:36:47 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8141: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 24442 at Wed May 10 12:36:48 UTC 2017 kill -USR1 24442 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24442 killed at Wed May 10 12:36:48 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:36:48 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24510 >/dev/null 2>/dev/null selfserv_9208 with PID 24510 found at Wed May 10 12:36:48 UTC 2017 selfserv_9208 with PID 24510 started at Wed May 10 12:36:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8142: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 24510 at Wed May 10 12:36:49 UTC 2017 kill -USR1 24510 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24510 killed at Wed May 10 12:36:49 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:36:49 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:49 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24566 >/dev/null 2>/dev/null selfserv_9208 with PID 24566 found at Wed May 10 12:36:49 UTC 2017 selfserv_9208 with PID 24566 started at Wed May 10 12:36:49 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8143: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 24566 at Wed May 10 12:36:50 UTC 2017 kill -USR1 24566 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24566 killed at Wed May 10 12:36:50 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:36:50 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:50 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24622 >/dev/null 2>/dev/null selfserv_9208 with PID 24622 found at Wed May 10 12:36:50 UTC 2017 selfserv_9208 with PID 24622 started at Wed May 10 12:36:50 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8144: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 24622 at Wed May 10 12:36:51 UTC 2017 kill -USR1 24622 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24622 killed at Wed May 10 12:36:51 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:36:51 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:51 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24690 >/dev/null 2>/dev/null selfserv_9208 with PID 24690 found at Wed May 10 12:36:51 UTC 2017 selfserv_9208 with PID 24690 started at Wed May 10 12:36:51 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8145: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 24690 at Wed May 10 12:36:51 UTC 2017 kill -USR1 24690 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24690 killed at Wed May 10 12:36:51 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:36:51 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:51 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24746 >/dev/null 2>/dev/null selfserv_9208 with PID 24746 found at Wed May 10 12:36:51 UTC 2017 selfserv_9208 with PID 24746 started at Wed May 10 12:36:51 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8146: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 24746 at Wed May 10 12:36:52 UTC 2017 kill -USR1 24746 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24746 killed at Wed May 10 12:36:52 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:36:52 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:52 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24802 >/dev/null 2>/dev/null selfserv_9208 with PID 24802 found at Wed May 10 12:36:52 UTC 2017 selfserv_9208 with PID 24802 started at Wed May 10 12:36:52 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8147: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 24802 at Wed May 10 12:36:53 UTC 2017 kill -USR1 24802 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24802 killed at Wed May 10 12:36:53 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:36:53 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24870 >/dev/null 2>/dev/null selfserv_9208 with PID 24870 found at Wed May 10 12:36:53 UTC 2017 selfserv_9208 with PID 24870 started at Wed May 10 12:36:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8148: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 24870 at Wed May 10 12:36:54 UTC 2017 kill -USR1 24870 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24870 killed at Wed May 10 12:36:54 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:36:54 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:54 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24926 >/dev/null 2>/dev/null selfserv_9208 with PID 24926 found at Wed May 10 12:36:54 UTC 2017 selfserv_9208 with PID 24926 started at Wed May 10 12:36:54 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8149: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 24926 at Wed May 10 12:36:55 UTC 2017 kill -USR1 24926 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24926 killed at Wed May 10 12:36:55 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:36:55 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24982 >/dev/null 2>/dev/null selfserv_9208 with PID 24982 found at Wed May 10 12:36:55 UTC 2017 selfserv_9208 with PID 24982 started at Wed May 10 12:36:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8150: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 24982 at Wed May 10 12:36:55 UTC 2017 kill -USR1 24982 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24982 killed at Wed May 10 12:36:55 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:36:56 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25050 >/dev/null 2>/dev/null selfserv_9208 with PID 25050 found at Wed May 10 12:36:56 UTC 2017 selfserv_9208 with PID 25050 started at Wed May 10 12:36:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8151: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 25050 at Wed May 10 12:36:56 UTC 2017 kill -USR1 25050 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25050 killed at Wed May 10 12:36:56 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:36:56 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25107 >/dev/null 2>/dev/null selfserv_9208 with PID 25107 found at Wed May 10 12:36:56 UTC 2017 selfserv_9208 with PID 25107 started at Wed May 10 12:36:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8152: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 25107 at Wed May 10 12:36:57 UTC 2017 kill -USR1 25107 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25107 killed at Wed May 10 12:36:57 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:36:57 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25163 >/dev/null 2>/dev/null selfserv_9208 with PID 25163 found at Wed May 10 12:36:57 UTC 2017 selfserv_9208 with PID 25163 started at Wed May 10 12:36:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8153: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 25163 at Wed May 10 12:36:58 UTC 2017 kill -USR1 25163 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25163 killed at Wed May 10 12:36:58 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:36:58 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25231 >/dev/null 2>/dev/null selfserv_9208 with PID 25231 found at Wed May 10 12:36:58 UTC 2017 selfserv_9208 with PID 25231 started at Wed May 10 12:36:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8154: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 25231 at Wed May 10 12:36:59 UTC 2017 kill -USR1 25231 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25231 killed at Wed May 10 12:36:59 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:36:59 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:36:59 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25287 >/dev/null 2>/dev/null selfserv_9208 with PID 25287 found at Wed May 10 12:36:59 UTC 2017 selfserv_9208 with PID 25287 started at Wed May 10 12:36:59 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8155: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 25287 at Wed May 10 12:37:00 UTC 2017 kill -USR1 25287 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25287 killed at Wed May 10 12:37:00 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:00 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25343 >/dev/null 2>/dev/null selfserv_9208 with PID 25343 found at Wed May 10 12:37:00 UTC 2017 selfserv_9208 with PID 25343 started at Wed May 10 12:37:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8156: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 25343 at Wed May 10 12:37:01 UTC 2017 kill -USR1 25343 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25343 killed at Wed May 10 12:37:01 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:01 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25411 >/dev/null 2>/dev/null selfserv_9208 with PID 25411 found at Wed May 10 12:37:01 UTC 2017 selfserv_9208 with PID 25411 started at Wed May 10 12:37:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8157: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 25411 at Wed May 10 12:37:02 UTC 2017 kill -USR1 25411 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25411 killed at Wed May 10 12:37:02 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:02 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25468 >/dev/null 2>/dev/null selfserv_9208 with PID 25468 found at Wed May 10 12:37:02 UTC 2017 selfserv_9208 with PID 25468 started at Wed May 10 12:37:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8158: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 25468 at Wed May 10 12:37:02 UTC 2017 kill -USR1 25468 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25468 killed at Wed May 10 12:37:02 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:03 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25524 >/dev/null 2>/dev/null selfserv_9208 with PID 25524 found at Wed May 10 12:37:03 UTC 2017 selfserv_9208 with PID 25524 started at Wed May 10 12:37:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8159: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 25524 at Wed May 10 12:37:03 UTC 2017 kill -USR1 25524 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25524 killed at Wed May 10 12:37:03 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:37:03 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25592 >/dev/null 2>/dev/null selfserv_9208 with PID 25592 found at Wed May 10 12:37:03 UTC 2017 selfserv_9208 with PID 25592 started at Wed May 10 12:37:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8160: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 25592 at Wed May 10 12:37:04 UTC 2017 kill -USR1 25592 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25592 killed at Wed May 10 12:37:04 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:37:04 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25648 >/dev/null 2>/dev/null selfserv_9208 with PID 25648 found at Wed May 10 12:37:04 UTC 2017 selfserv_9208 with PID 25648 started at Wed May 10 12:37:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8161: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 25648 at Wed May 10 12:37:05 UTC 2017 kill -USR1 25648 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25648 killed at Wed May 10 12:37:05 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:37:05 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:05 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25705 >/dev/null 2>/dev/null selfserv_9208 with PID 25705 found at Wed May 10 12:37:05 UTC 2017 selfserv_9208 with PID 25705 started at Wed May 10 12:37:05 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8162: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 25705 at Wed May 10 12:37:06 UTC 2017 kill -USR1 25705 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25705 killed at Wed May 10 12:37:06 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:06 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25773 >/dev/null 2>/dev/null selfserv_9208 with PID 25773 found at Wed May 10 12:37:06 UTC 2017 selfserv_9208 with PID 25773 started at Wed May 10 12:37:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8163: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 25773 at Wed May 10 12:37:07 UTC 2017 kill -USR1 25773 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25773 killed at Wed May 10 12:37:07 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:07 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25829 >/dev/null 2>/dev/null selfserv_9208 with PID 25829 found at Wed May 10 12:37:07 UTC 2017 selfserv_9208 with PID 25829 started at Wed May 10 12:37:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8164: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 25829 at Wed May 10 12:37:08 UTC 2017 kill -USR1 25829 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25829 killed at Wed May 10 12:37:08 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:08 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25885 >/dev/null 2>/dev/null selfserv_9208 with PID 25885 found at Wed May 10 12:37:08 UTC 2017 selfserv_9208 with PID 25885 started at Wed May 10 12:37:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8165: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 25885 at Wed May 10 12:37:08 UTC 2017 kill -USR1 25885 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25885 killed at Wed May 10 12:37:08 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:09 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25953 >/dev/null 2>/dev/null selfserv_9208 with PID 25953 found at Wed May 10 12:37:09 UTC 2017 selfserv_9208 with PID 25953 started at Wed May 10 12:37:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8166: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 25953 at Wed May 10 12:37:09 UTC 2017 kill -USR1 25953 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25953 killed at Wed May 10 12:37:09 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:09 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26009 >/dev/null 2>/dev/null selfserv_9208 with PID 26009 found at Wed May 10 12:37:10 UTC 2017 selfserv_9208 with PID 26009 started at Wed May 10 12:37:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8167: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 26009 at Wed May 10 12:37:10 UTC 2017 kill -USR1 26009 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26009 killed at Wed May 10 12:37:10 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:10 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26065 >/dev/null 2>/dev/null selfserv_9208 with PID 26065 found at Wed May 10 12:37:10 UTC 2017 selfserv_9208 with PID 26065 started at Wed May 10 12:37:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8168: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 26065 at Wed May 10 12:37:11 UTC 2017 kill -USR1 26065 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26065 killed at Wed May 10 12:37:11 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:37:11 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26133 >/dev/null 2>/dev/null selfserv_9208 with PID 26133 found at Wed May 10 12:37:11 UTC 2017 selfserv_9208 with PID 26133 started at Wed May 10 12:37:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8169: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 26133 at Wed May 10 12:37:12 UTC 2017 kill -USR1 26133 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26133 killed at Wed May 10 12:37:12 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:37:12 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26189 >/dev/null 2>/dev/null selfserv_9208 with PID 26189 found at Wed May 10 12:37:12 UTC 2017 selfserv_9208 with PID 26189 started at Wed May 10 12:37:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8170: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 26189 at Wed May 10 12:37:13 UTC 2017 kill -USR1 26189 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26189 killed at Wed May 10 12:37:13 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:37:13 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26245 >/dev/null 2>/dev/null selfserv_9208 with PID 26245 found at Wed May 10 12:37:13 UTC 2017 selfserv_9208 with PID 26245 started at Wed May 10 12:37:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8171: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 26245 at Wed May 10 12:37:13 UTC 2017 kill -USR1 26245 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26245 killed at Wed May 10 12:37:14 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:14 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26313 >/dev/null 2>/dev/null selfserv_9208 with PID 26313 found at Wed May 10 12:37:14 UTC 2017 selfserv_9208 with PID 26313 started at Wed May 10 12:37:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8172: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 26313 at Wed May 10 12:37:14 UTC 2017 kill -USR1 26313 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26313 killed at Wed May 10 12:37:14 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:14 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26369 >/dev/null 2>/dev/null selfserv_9208 with PID 26369 found at Wed May 10 12:37:14 UTC 2017 selfserv_9208 with PID 26369 started at Wed May 10 12:37:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8173: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 26369 at Wed May 10 12:37:15 UTC 2017 kill -USR1 26369 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26369 killed at Wed May 10 12:37:15 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:15 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26425 >/dev/null 2>/dev/null selfserv_9208 with PID 26425 found at Wed May 10 12:37:15 UTC 2017 selfserv_9208 with PID 26425 started at Wed May 10 12:37:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8174: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 26425 at Wed May 10 12:37:16 UTC 2017 kill -USR1 26425 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26425 killed at Wed May 10 12:37:16 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:16 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26493 >/dev/null 2>/dev/null selfserv_9208 with PID 26493 found at Wed May 10 12:37:16 UTC 2017 selfserv_9208 with PID 26493 started at Wed May 10 12:37:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8175: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 26493 at Wed May 10 12:37:17 UTC 2017 kill -USR1 26493 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26493 killed at Wed May 10 12:37:17 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:17 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:17 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26549 >/dev/null 2>/dev/null selfserv_9208 with PID 26549 found at Wed May 10 12:37:17 UTC 2017 selfserv_9208 with PID 26549 started at Wed May 10 12:37:17 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8176: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 26549 at Wed May 10 12:37:17 UTC 2017 kill -USR1 26549 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26549 killed at Wed May 10 12:37:17 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:18 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26605 >/dev/null 2>/dev/null selfserv_9208 with PID 26605 found at Wed May 10 12:37:18 UTC 2017 selfserv_9208 with PID 26605 started at Wed May 10 12:37:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8177: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 26605 at Wed May 10 12:37:18 UTC 2017 kill -USR1 26605 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26605 killed at Wed May 10 12:37:18 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:37:18 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26673 >/dev/null 2>/dev/null selfserv_9208 with PID 26673 found at Wed May 10 12:37:18 UTC 2017 selfserv_9208 with PID 26673 started at Wed May 10 12:37:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8178: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 26673 at Wed May 10 12:37:19 UTC 2017 kill -USR1 26673 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26673 killed at Wed May 10 12:37:19 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:37:19 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:19 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26729 >/dev/null 2>/dev/null selfserv_9208 with PID 26729 found at Wed May 10 12:37:19 UTC 2017 selfserv_9208 with PID 26729 started at Wed May 10 12:37:19 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8179: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 26729 at Wed May 10 12:37:20 UTC 2017 kill -USR1 26729 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26729 killed at Wed May 10 12:37:20 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:37:20 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26785 >/dev/null 2>/dev/null selfserv_9208 with PID 26785 found at Wed May 10 12:37:20 UTC 2017 selfserv_9208 with PID 26785 started at Wed May 10 12:37:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8180: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 26785 at Wed May 10 12:37:20 UTC 2017 kill -USR1 26785 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26785 killed at Wed May 10 12:37:20 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:21 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26853 >/dev/null 2>/dev/null selfserv_9208 with PID 26853 found at Wed May 10 12:37:21 UTC 2017 selfserv_9208 with PID 26853 started at Wed May 10 12:37:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8181: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 26853 at Wed May 10 12:37:21 UTC 2017 kill -USR1 26853 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26853 killed at Wed May 10 12:37:21 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:21 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26909 >/dev/null 2>/dev/null selfserv_9208 with PID 26909 found at Wed May 10 12:37:21 UTC 2017 selfserv_9208 with PID 26909 started at Wed May 10 12:37:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8182: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 26909 at Wed May 10 12:37:22 UTC 2017 kill -USR1 26909 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26909 killed at Wed May 10 12:37:22 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:22 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 26965 >/dev/null 2>/dev/null selfserv_9208 with PID 26965 found at Wed May 10 12:37:22 UTC 2017 selfserv_9208 with PID 26965 started at Wed May 10 12:37:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8183: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 26965 at Wed May 10 12:37:23 UTC 2017 kill -USR1 26965 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 26965 killed at Wed May 10 12:37:23 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:23 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27033 >/dev/null 2>/dev/null selfserv_9208 with PID 27033 found at Wed May 10 12:37:23 UTC 2017 selfserv_9208 with PID 27033 started at Wed May 10 12:37:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8184: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 27033 at Wed May 10 12:37:24 UTC 2017 kill -USR1 27033 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27033 killed at Wed May 10 12:37:24 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:24 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:24 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27089 >/dev/null 2>/dev/null selfserv_9208 with PID 27089 found at Wed May 10 12:37:24 UTC 2017 selfserv_9208 with PID 27089 started at Wed May 10 12:37:24 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8185: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 27089 at Wed May 10 12:37:24 UTC 2017 kill -USR1 27089 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27089 killed at Wed May 10 12:37:24 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:24 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:24 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27145 >/dev/null 2>/dev/null selfserv_9208 with PID 27145 found at Wed May 10 12:37:24 UTC 2017 selfserv_9208 with PID 27145 started at Wed May 10 12:37:24 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8186: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 27145 at Wed May 10 12:37:25 UTC 2017 kill -USR1 27145 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27145 killed at Wed May 10 12:37:25 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:25 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:25 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27222 >/dev/null 2>/dev/null selfserv_9208 with PID 27222 found at Wed May 10 12:37:25 UTC 2017 selfserv_9208 with PID 27222 started at Wed May 10 12:37:25 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8187: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 27222 at Wed May 10 12:37:26 UTC 2017 kill -USR1 27222 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27222 killed at Wed May 10 12:37:26 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:26 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:26 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27278 >/dev/null 2>/dev/null selfserv_9208 with PID 27278 found at Wed May 10 12:37:26 UTC 2017 selfserv_9208 with PID 27278 started at Wed May 10 12:37:26 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8188: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 27278 at Wed May 10 12:37:27 UTC 2017 kill -USR1 27278 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27278 killed at Wed May 10 12:37:27 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:27 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:27 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27334 >/dev/null 2>/dev/null selfserv_9208 with PID 27334 found at Wed May 10 12:37:27 UTC 2017 selfserv_9208 with PID 27334 started at Wed May 10 12:37:27 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8189: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 27334 at Wed May 10 12:37:27 UTC 2017 kill -USR1 27334 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27334 killed at Wed May 10 12:37:27 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:28 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:28 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27402 >/dev/null 2>/dev/null selfserv_9208 with PID 27402 found at Wed May 10 12:37:28 UTC 2017 selfserv_9208 with PID 27402 started at Wed May 10 12:37:28 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8190: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 27402 at Wed May 10 12:37:28 UTC 2017 kill -USR1 27402 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27402 killed at Wed May 10 12:37:28 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:28 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:28 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27458 >/dev/null 2>/dev/null selfserv_9208 with PID 27458 found at Wed May 10 12:37:28 UTC 2017 selfserv_9208 with PID 27458 started at Wed May 10 12:37:28 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8191: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 27458 at Wed May 10 12:37:29 UTC 2017 kill -USR1 27458 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27458 killed at Wed May 10 12:37:29 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:29 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:29 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27514 >/dev/null 2>/dev/null selfserv_9208 with PID 27514 found at Wed May 10 12:37:29 UTC 2017 selfserv_9208 with PID 27514 started at Wed May 10 12:37:29 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8192: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 27514 at Wed May 10 12:37:30 UTC 2017 kill -USR1 27514 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27514 killed at Wed May 10 12:37:30 UTC 2017 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:30 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:30 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27582 >/dev/null 2>/dev/null selfserv_9208 with PID 27582 found at Wed May 10 12:37:30 UTC 2017 selfserv_9208 with PID 27582 started at Wed May 10 12:37:30 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8193: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 27582 at Wed May 10 12:37:31 UTC 2017 kill -USR1 27582 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27582 killed at Wed May 10 12:37:31 UTC 2017 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:31 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:31 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27638 >/dev/null 2>/dev/null selfserv_9208 with PID 27638 found at Wed May 10 12:37:31 UTC 2017 selfserv_9208 with PID 27638 started at Wed May 10 12:37:31 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8194: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 27638 at Wed May 10 12:37:32 UTC 2017 kill -USR1 27638 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27638 killed at Wed May 10 12:37:32 UTC 2017 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:32 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:32 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27694 >/dev/null 2>/dev/null selfserv_9208 with PID 27694 found at Wed May 10 12:37:32 UTC 2017 selfserv_9208 with PID 27694 started at Wed May 10 12:37:32 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8195: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 27694 at Wed May 10 12:37:32 UTC 2017 kill -USR1 27694 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27694 killed at Wed May 10 12:37:32 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:32 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:32 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27762 >/dev/null 2>/dev/null selfserv_9208 with PID 27762 found at Wed May 10 12:37:32 UTC 2017 selfserv_9208 with PID 27762 started at Wed May 10 12:37:32 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8196: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 27762 at Wed May 10 12:37:33 UTC 2017 kill -USR1 27762 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27762 killed at Wed May 10 12:37:33 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:33 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:33 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27818 >/dev/null 2>/dev/null selfserv_9208 with PID 27818 found at Wed May 10 12:37:33 UTC 2017 selfserv_9208 with PID 27818 started at Wed May 10 12:37:33 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8197: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 27818 at Wed May 10 12:37:34 UTC 2017 kill -USR1 27818 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27818 killed at Wed May 10 12:37:34 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:34 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:34 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27874 >/dev/null 2>/dev/null selfserv_9208 with PID 27874 found at Wed May 10 12:37:34 UTC 2017 selfserv_9208 with PID 27874 started at Wed May 10 12:37:34 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8198: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 27874 at Wed May 10 12:37:35 UTC 2017 kill -USR1 27874 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27874 killed at Wed May 10 12:37:35 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:35 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:35 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27942 >/dev/null 2>/dev/null selfserv_9208 with PID 27942 found at Wed May 10 12:37:35 UTC 2017 selfserv_9208 with PID 27942 started at Wed May 10 12:37:35 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8199: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 27942 at Wed May 10 12:37:35 UTC 2017 kill -USR1 27942 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27942 killed at Wed May 10 12:37:35 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:36 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:36 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27998 >/dev/null 2>/dev/null selfserv_9208 with PID 27998 found at Wed May 10 12:37:36 UTC 2017 selfserv_9208 with PID 27998 started at Wed May 10 12:37:36 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8200: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 27998 at Wed May 10 12:37:36 UTC 2017 kill -USR1 27998 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27998 killed at Wed May 10 12:37:36 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:36 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:36 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28054 >/dev/null 2>/dev/null selfserv_9208 with PID 28054 found at Wed May 10 12:37:36 UTC 2017 selfserv_9208 with PID 28054 started at Wed May 10 12:37:36 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8201: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 28054 at Wed May 10 12:37:37 UTC 2017 kill -USR1 28054 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28054 killed at Wed May 10 12:37:37 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:37 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:37 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28122 >/dev/null 2>/dev/null selfserv_9208 with PID 28122 found at Wed May 10 12:37:37 UTC 2017 selfserv_9208 with PID 28122 started at Wed May 10 12:37:37 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8202: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 28122 at Wed May 10 12:37:38 UTC 2017 kill -USR1 28122 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28122 killed at Wed May 10 12:37:38 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:38 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:38 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28178 >/dev/null 2>/dev/null selfserv_9208 with PID 28178 found at Wed May 10 12:37:38 UTC 2017 selfserv_9208 with PID 28178 started at Wed May 10 12:37:38 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8203: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 28178 at Wed May 10 12:37:38 UTC 2017 kill -USR1 28178 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28178 killed at Wed May 10 12:37:38 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:39 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:39 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28234 >/dev/null 2>/dev/null selfserv_9208 with PID 28234 found at Wed May 10 12:37:39 UTC 2017 selfserv_9208 with PID 28234 started at Wed May 10 12:37:39 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8204: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 28234 at Wed May 10 12:37:39 UTC 2017 kill -USR1 28234 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28234 killed at Wed May 10 12:37:39 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:39 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:39 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28302 >/dev/null 2>/dev/null selfserv_9208 with PID 28302 found at Wed May 10 12:37:39 UTC 2017 selfserv_9208 with PID 28302 started at Wed May 10 12:37:39 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8205: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 28302 at Wed May 10 12:37:40 UTC 2017 kill -USR1 28302 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28302 killed at Wed May 10 12:37:40 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:40 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:40 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28359 >/dev/null 2>/dev/null selfserv_9208 with PID 28359 found at Wed May 10 12:37:40 UTC 2017 selfserv_9208 with PID 28359 started at Wed May 10 12:37:40 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8206: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 28359 at Wed May 10 12:37:41 UTC 2017 kill -USR1 28359 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28359 killed at Wed May 10 12:37:41 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:41 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:41 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28415 >/dev/null 2>/dev/null selfserv_9208 with PID 28415 found at Wed May 10 12:37:41 UTC 2017 selfserv_9208 with PID 28415 started at Wed May 10 12:37:41 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8207: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 28415 at Wed May 10 12:37:41 UTC 2017 kill -USR1 28415 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28415 killed at Wed May 10 12:37:41 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:41 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:41 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28483 >/dev/null 2>/dev/null selfserv_9208 with PID 28483 found at Wed May 10 12:37:41 UTC 2017 selfserv_9208 with PID 28483 started at Wed May 10 12:37:41 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8208: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 28483 at Wed May 10 12:37:42 UTC 2017 kill -USR1 28483 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28483 killed at Wed May 10 12:37:42 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:42 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:42 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28539 >/dev/null 2>/dev/null selfserv_9208 with PID 28539 found at Wed May 10 12:37:42 UTC 2017 selfserv_9208 with PID 28539 started at Wed May 10 12:37:42 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8209: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 28539 at Wed May 10 12:37:43 UTC 2017 kill -USR1 28539 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28539 killed at Wed May 10 12:37:43 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:43 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:43 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28595 >/dev/null 2>/dev/null selfserv_9208 with PID 28595 found at Wed May 10 12:37:43 UTC 2017 selfserv_9208 with PID 28595 started at Wed May 10 12:37:43 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8210: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 28595 at Wed May 10 12:37:44 UTC 2017 kill -USR1 28595 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28595 killed at Wed May 10 12:37:44 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:44 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:44 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28663 >/dev/null 2>/dev/null selfserv_9208 with PID 28663 found at Wed May 10 12:37:44 UTC 2017 selfserv_9208 with PID 28663 started at Wed May 10 12:37:44 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8211: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 28663 at Wed May 10 12:37:44 UTC 2017 kill -USR1 28663 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28663 killed at Wed May 10 12:37:45 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:45 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:45 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28719 >/dev/null 2>/dev/null selfserv_9208 with PID 28719 found at Wed May 10 12:37:45 UTC 2017 selfserv_9208 with PID 28719 started at Wed May 10 12:37:45 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8212: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 28719 at Wed May 10 12:37:45 UTC 2017 kill -USR1 28719 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28719 killed at Wed May 10 12:37:45 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:45 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:45 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28775 >/dev/null 2>/dev/null selfserv_9208 with PID 28775 found at Wed May 10 12:37:45 UTC 2017 selfserv_9208 with PID 28775 started at Wed May 10 12:37:45 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8213: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 28775 at Wed May 10 12:37:46 UTC 2017 kill -USR1 28775 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28775 killed at Wed May 10 12:37:46 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:46 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:46 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28843 >/dev/null 2>/dev/null selfserv_9208 with PID 28843 found at Wed May 10 12:37:46 UTC 2017 selfserv_9208 with PID 28843 started at Wed May 10 12:37:46 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8214: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 28843 at Wed May 10 12:37:47 UTC 2017 kill -USR1 28843 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28843 killed at Wed May 10 12:37:47 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:47 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:47 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28899 >/dev/null 2>/dev/null selfserv_9208 with PID 28899 found at Wed May 10 12:37:47 UTC 2017 selfserv_9208 with PID 28899 started at Wed May 10 12:37:47 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8215: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 28899 at Wed May 10 12:37:48 UTC 2017 kill -USR1 28899 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28899 killed at Wed May 10 12:37:48 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:48 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28955 >/dev/null 2>/dev/null selfserv_9208 with PID 28955 found at Wed May 10 12:37:48 UTC 2017 selfserv_9208 with PID 28955 started at Wed May 10 12:37:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8216: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 28955 at Wed May 10 12:37:49 UTC 2017 kill -USR1 28955 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28955 killed at Wed May 10 12:37:49 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:49 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:49 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 29023 >/dev/null 2>/dev/null selfserv_9208 with PID 29023 found at Wed May 10 12:37:49 UTC 2017 selfserv_9208 with PID 29023 started at Wed May 10 12:37:49 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8217: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 29023 at Wed May 10 12:37:50 UTC 2017 kill -USR1 29023 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 29023 killed at Wed May 10 12:37:50 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:50 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:50 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 29079 >/dev/null 2>/dev/null selfserv_9208 with PID 29079 found at Wed May 10 12:37:50 UTC 2017 selfserv_9208 with PID 29079 started at Wed May 10 12:37:50 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8218: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 29079 at Wed May 10 12:37:50 UTC 2017 kill -USR1 29079 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 29079 killed at Wed May 10 12:37:50 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:50 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:50 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 29135 >/dev/null 2>/dev/null selfserv_9208 with PID 29135 found at Wed May 10 12:37:51 UTC 2017 selfserv_9208 with PID 29135 started at Wed May 10 12:37:51 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8219: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 29135 at Wed May 10 12:37:51 UTC 2017 kill -USR1 29135 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 29135 killed at Wed May 10 12:37:51 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:51 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:51 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 29203 >/dev/null 2>/dev/null selfserv_9208 with PID 29203 found at Wed May 10 12:37:51 UTC 2017 selfserv_9208 with PID 29203 started at Wed May 10 12:37:51 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8220: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 29203 at Wed May 10 12:37:52 UTC 2017 kill -USR1 29203 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 29203 killed at Wed May 10 12:37:52 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:52 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:52 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 29259 >/dev/null 2>/dev/null selfserv_9208 with PID 29259 found at Wed May 10 12:37:52 UTC 2017 selfserv_9208 with PID 29259 started at Wed May 10 12:37:52 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8221: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 29259 at Wed May 10 12:37:53 UTC 2017 kill -USR1 29259 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 29259 killed at Wed May 10 12:37:53 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:53 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 29315 >/dev/null 2>/dev/null selfserv_9208 with PID 29315 found at Wed May 10 12:37:53 UTC 2017 selfserv_9208 with PID 29315 started at Wed May 10 12:37:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8222: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 29315 at Wed May 10 12:37:54 UTC 2017 kill -USR1 29315 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 29315 killed at Wed May 10 12:37:54 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:54 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:54 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 29383 >/dev/null 2>/dev/null selfserv_9208 with PID 29383 found at Wed May 10 12:37:54 UTC 2017 selfserv_9208 with PID 29383 started at Wed May 10 12:37:54 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8223: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 29383 at Wed May 10 12:37:55 UTC 2017 kill -USR1 29383 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 29383 killed at Wed May 10 12:37:55 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:55 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 29439 >/dev/null 2>/dev/null selfserv_9208 with PID 29439 found at Wed May 10 12:37:55 UTC 2017 selfserv_9208 with PID 29439 started at Wed May 10 12:37:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8224: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 29439 at Wed May 10 12:37:56 UTC 2017 kill -USR1 29439 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 29439 killed at Wed May 10 12:37:56 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:56 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 29495 >/dev/null 2>/dev/null selfserv_9208 with PID 29495 found at Wed May 10 12:37:56 UTC 2017 selfserv_9208 with PID 29495 started at Wed May 10 12:37:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8225: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 29495 at Wed May 10 12:37:56 UTC 2017 kill -USR1 29495 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 29495 killed at Wed May 10 12:37:57 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:57 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 29563 >/dev/null 2>/dev/null selfserv_9208 with PID 29563 found at Wed May 10 12:37:57 UTC 2017 selfserv_9208 with PID 29563 started at Wed May 10 12:37:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8226: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 29563 at Wed May 10 12:37:57 UTC 2017 kill -USR1 29563 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 29563 killed at Wed May 10 12:37:57 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:58 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 29619 >/dev/null 2>/dev/null selfserv_9208 with PID 29619 found at Wed May 10 12:37:58 UTC 2017 selfserv_9208 with PID 29619 started at Wed May 10 12:37:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8227: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 29619 at Wed May 10 12:37:58 UTC 2017 kill -USR1 29619 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 29619 killed at Wed May 10 12:37:58 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:37:58 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:59 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 29675 >/dev/null 2>/dev/null selfserv_9208 with PID 29675 found at Wed May 10 12:37:59 UTC 2017 selfserv_9208 with PID 29675 started at Wed May 10 12:37:59 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8228: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 29675 at Wed May 10 12:37:59 UTC 2017 kill -USR1 29675 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 29675 killed at Wed May 10 12:37:59 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:37:59 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:37:59 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 29743 >/dev/null 2>/dev/null selfserv_9208 with PID 29743 found at Wed May 10 12:37:59 UTC 2017 selfserv_9208 with PID 29743 started at Wed May 10 12:38:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8229: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 29743 at Wed May 10 12:38:00 UTC 2017 kill -USR1 29743 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 29743 killed at Wed May 10 12:38:00 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:38:00 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:38:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 29799 >/dev/null 2>/dev/null selfserv_9208 with PID 29799 found at Wed May 10 12:38:00 UTC 2017 selfserv_9208 with PID 29799 started at Wed May 10 12:38:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8230: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 29799 at Wed May 10 12:38:01 UTC 2017 kill -USR1 29799 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 29799 killed at Wed May 10 12:38:01 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:38:01 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:38:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 29855 >/dev/null 2>/dev/null selfserv_9208 with PID 29855 found at Wed May 10 12:38:01 UTC 2017 selfserv_9208 with PID 29855 started at Wed May 10 12:38:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8231: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 29855 at Wed May 10 12:38:02 UTC 2017 kill -USR1 29855 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 29855 killed at Wed May 10 12:38:02 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:38:02 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:38:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 29923 >/dev/null 2>/dev/null selfserv_9208 with PID 29923 found at Wed May 10 12:38:02 UTC 2017 selfserv_9208 with PID 29923 started at Wed May 10 12:38:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8232: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 29923 at Wed May 10 12:38:03 UTC 2017 kill -USR1 29923 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 29923 killed at Wed May 10 12:38:03 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:38:03 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:38:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 29979 >/dev/null 2>/dev/null selfserv_9208 with PID 29979 found at Wed May 10 12:38:03 UTC 2017 selfserv_9208 with PID 29979 started at Wed May 10 12:38:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8233: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 29979 at Wed May 10 12:38:04 UTC 2017 kill -USR1 29979 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 29979 killed at Wed May 10 12:38:04 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:38:04 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:38:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 30035 >/dev/null 2>/dev/null selfserv_9208 with PID 30035 found at Wed May 10 12:38:04 UTC 2017 selfserv_9208 with PID 30035 started at Wed May 10 12:38:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8234: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 30035 at Wed May 10 12:38:05 UTC 2017 kill -USR1 30035 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 30035 killed at Wed May 10 12:38:05 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:38:05 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:38:05 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 30103 >/dev/null 2>/dev/null selfserv_9208 with PID 30103 found at Wed May 10 12:38:05 UTC 2017 selfserv_9208 with PID 30103 started at Wed May 10 12:38:05 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8235: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 30103 at Wed May 10 12:38:06 UTC 2017 kill -USR1 30103 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 30103 killed at Wed May 10 12:38:06 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:38:06 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:38:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 30159 >/dev/null 2>/dev/null selfserv_9208 with PID 30159 found at Wed May 10 12:38:06 UTC 2017 selfserv_9208 with PID 30159 started at Wed May 10 12:38:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8236: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 30159 at Wed May 10 12:38:06 UTC 2017 kill -USR1 30159 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 30159 killed at Wed May 10 12:38:06 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:38:06 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:38:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 30215 >/dev/null 2>/dev/null selfserv_9208 with PID 30215 found at Wed May 10 12:38:06 UTC 2017 selfserv_9208 with PID 30215 started at Wed May 10 12:38:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8237: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 30215 at Wed May 10 12:38:07 UTC 2017 kill -USR1 30215 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 30215 killed at Wed May 10 12:38:07 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:38:07 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:38:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 30283 >/dev/null 2>/dev/null selfserv_9208 with PID 30283 found at Wed May 10 12:38:07 UTC 2017 selfserv_9208 with PID 30283 started at Wed May 10 12:38:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8238: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 30283 at Wed May 10 12:38:08 UTC 2017 kill -USR1 30283 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 30283 killed at Wed May 10 12:38:08 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:38:08 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:38:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 30339 >/dev/null 2>/dev/null selfserv_9208 with PID 30339 found at Wed May 10 12:38:08 UTC 2017 selfserv_9208 with PID 30339 started at Wed May 10 12:38:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8239: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 30339 at Wed May 10 12:38:09 UTC 2017 kill -USR1 30339 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 30339 killed at Wed May 10 12:38:09 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:38:09 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:38:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 30395 >/dev/null 2>/dev/null selfserv_9208 with PID 30395 found at Wed May 10 12:38:09 UTC 2017 selfserv_9208 with PID 30395 started at Wed May 10 12:38:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8240: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 30395 at Wed May 10 12:38:10 UTC 2017 kill -USR1 30395 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 30395 killed at Wed May 10 12:38:10 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:38:10 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:38:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 30463 >/dev/null 2>/dev/null selfserv_9208 with PID 30463 found at Wed May 10 12:38:10 UTC 2017 selfserv_9208 with PID 30463 started at Wed May 10 12:38:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8241: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 30463 at Wed May 10 12:38:10 UTC 2017 kill -USR1 30463 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 30463 killed at Wed May 10 12:38:10 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:38:10 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:38:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 30519 >/dev/null 2>/dev/null selfserv_9208 with PID 30519 found at Wed May 10 12:38:11 UTC 2017 selfserv_9208 with PID 30519 started at Wed May 10 12:38:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8242: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 30519 at Wed May 10 12:38:11 UTC 2017 kill -USR1 30519 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 30519 killed at Wed May 10 12:38:11 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:38:11 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:38:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 30575 >/dev/null 2>/dev/null selfserv_9208 with PID 30575 found at Wed May 10 12:38:11 UTC 2017 selfserv_9208 with PID 30575 started at Wed May 10 12:38:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #8243: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 30575 at Wed May 10 12:38:12 UTC 2017 kill -USR1 30575 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 30575 killed at Wed May 10 12:38:12 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:38:12 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:38:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 30643 >/dev/null 2>/dev/null selfserv_9208 with PID 30643 found at Wed May 10 12:38:12 UTC 2017 selfserv_9208 with PID 30643 started at Wed May 10 12:38:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8244: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 30643 at Wed May 10 12:38:13 UTC 2017 kill -USR1 30643 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 30643 killed at Wed May 10 12:38:13 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:38:13 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:38:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 30699 >/dev/null 2>/dev/null selfserv_9208 with PID 30699 found at Wed May 10 12:38:13 UTC 2017 selfserv_9208 with PID 30699 started at Wed May 10 12:38:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8245: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 30699 at Wed May 10 12:38:14 UTC 2017 kill -USR1 30699 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 30699 killed at Wed May 10 12:38:14 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:38:14 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:38:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 30755 >/dev/null 2>/dev/null selfserv_9208 with PID 30755 found at Wed May 10 12:38:14 UTC 2017 selfserv_9208 with PID 30755 started at Wed May 10 12:38:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #8246: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 30755 at Wed May 10 12:38:14 UTC 2017 kill -USR1 30755 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 30755 killed at Wed May 10 12:38:14 UTC 2017 ssl.sh: Cache CRL SSL Client Tests - with ECC =============================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/authin.tl.tmp 0 selfserv_9208 starting at Wed May 10 12:38:15 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:38:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:15 UTC 2017 selfserv_9208 with PID 30818 started at Wed May 10 12:38:15 UTC 2017 Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:15 UTC 2017 ssl.sh: #8247: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:16 UTC 2017 ssl.sh: #8248: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:16 UTC 2017 ssl.sh: #8249: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:16 UTC 2017 ssl.sh: #8250: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:17 UTC 2017 ssl.sh: #8251: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:17 UTC 2017 ssl.sh: #8252: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:17 UTC 2017 ssl.sh: #8253: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:18 UTC 2017 ssl.sh: #8254: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:18 UTC 2017 ssl.sh: #8255: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:19 UTC 2017 ssl.sh: #8256: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:19 UTC 2017 ssl.sh: #8257: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:19 UTC 2017 ssl.sh: #8258: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:20 UTC 2017 ssl.sh: #8259: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:20 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8260: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:20 UTC 2017 ssl.sh: #8261: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:21 UTC 2017 ssl.sh: #8262: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:21 UTC 2017 ssl.sh: #8263: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:22 UTC 2017 ssl.sh: #8264: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:22 UTC 2017 ssl.sh: #8265: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:22 UTC 2017 ssl.sh: #8266: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:23 UTC 2017 ssl.sh: #8267: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:23 UTC 2017 ssl.sh: #8268: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:23 UTC 2017 ssl.sh: #8269: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:24 UTC 2017 ssl.sh: #8270: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:24 UTC 2017 ssl.sh: #8271: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:25 UTC 2017 ssl.sh: #8272: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:27 UTC 2017 ssl.sh: #8273: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:27 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8274: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:27 UTC 2017 ssl.sh: #8275: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:28 UTC 2017 ssl.sh: #8276: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:28 UTC 2017 ssl.sh: #8277: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:28 UTC 2017 ssl.sh: #8278: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:29 UTC 2017 ssl.sh: #8279: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:29 UTC 2017 ssl.sh: #8280: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:29 UTC 2017 ssl.sh: #8281: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:30 UTC 2017 ssl.sh: #8282: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:30 UTC 2017 ssl.sh: #8283: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:31 UTC 2017 ssl.sh: #8284: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:31 UTC 2017 ssl.sh: #8285: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:31 UTC 2017 ssl.sh: #8286: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30818 >/dev/null 2>/dev/null selfserv_9208 with PID 30818 found at Wed May 10 12:38:32 UTC 2017 ssl.sh: #8287: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 30818 at Wed May 10 12:38:33 UTC 2017 kill -USR1 30818 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 30818 killed at Wed May 10 12:38:33 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:38:33 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:38:33 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:33 UTC 2017 selfserv_9208 with PID 32240 started at Wed May 10 12:38:33 UTC 2017 Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:33 UTC 2017 ssl.sh: #8288: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:34 UTC 2017 ssl.sh: #8289: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:34 UTC 2017 ssl.sh: #8290: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:34 UTC 2017 ssl.sh: #8291: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:35 UTC 2017 ssl.sh: #8292: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:35 UTC 2017 ssl.sh: #8293: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:36 UTC 2017 ssl.sh: #8294: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:36 UTC 2017 ssl.sh: #8295: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:36 UTC 2017 ssl.sh: #8296: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:37 UTC 2017 ssl.sh: #8297: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:37 UTC 2017 ssl.sh: #8298: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:37 UTC 2017 ssl.sh: #8299: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:38 UTC 2017 ssl.sh: #8300: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:38 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8301: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:39 UTC 2017 ssl.sh: #8302: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:39 UTC 2017 ssl.sh: #8303: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:39 UTC 2017 ssl.sh: #8304: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:40 UTC 2017 ssl.sh: #8305: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:40 UTC 2017 ssl.sh: #8306: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:40 UTC 2017 ssl.sh: #8307: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:41 UTC 2017 ssl.sh: #8308: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:41 UTC 2017 ssl.sh: #8309: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:41 UTC 2017 ssl.sh: #8310: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:42 UTC 2017 ssl.sh: #8311: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:42 UTC 2017 ssl.sh: #8312: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:42 UTC 2017 ssl.sh: #8313: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:43 UTC 2017 ssl.sh: #8314: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:43 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8315: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:44 UTC 2017 ssl.sh: #8316: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:44 UTC 2017 ssl.sh: #8317: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:44 UTC 2017 ssl.sh: #8318: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:45 UTC 2017 ssl.sh: #8319: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:45 UTC 2017 ssl.sh: #8320: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:45 UTC 2017 ssl.sh: #8321: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:46 UTC 2017 ssl.sh: #8322: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:46 UTC 2017 ssl.sh: #8323: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:46 UTC 2017 ssl.sh: #8324: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:47 UTC 2017 ssl.sh: #8325: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:47 UTC 2017 ssl.sh: #8326: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:47 UTC 2017 ssl.sh: #8327: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32240 >/dev/null 2>/dev/null selfserv_9208 with PID 32240 found at Wed May 10 12:38:48 UTC 2017 ssl.sh: #8328: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 32240 at Wed May 10 12:38:48 UTC 2017 kill -USR1 32240 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 32240 killed at Wed May 10 12:38:48 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:38:48 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:38:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:38:48 UTC 2017 selfserv_9208 with PID 1275 started at Wed May 10 12:38:48 UTC 2017 Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:38:49 UTC 2017 ssl.sh: #8329: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:38:49 UTC 2017 ssl.sh: #8330: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:38:49 UTC 2017 ssl.sh: #8331: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:38:50 UTC 2017 ssl.sh: #8332: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:38:50 UTC 2017 ssl.sh: #8333: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:38:51 UTC 2017 ssl.sh: #8334: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:38:51 UTC 2017 ssl.sh: #8335: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:38:51 UTC 2017 ssl.sh: #8336: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:38:52 UTC 2017 ssl.sh: #8337: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:38:52 UTC 2017 ssl.sh: #8338: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:38:53 UTC 2017 ssl.sh: #8339: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:38:53 UTC 2017 ssl.sh: #8340: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:38:53 UTC 2017 ssl.sh: #8341: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:38:54 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8342: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:38:54 UTC 2017 ssl.sh: #8343: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:38:55 UTC 2017 ssl.sh: #8344: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:38:55 UTC 2017 ssl.sh: #8345: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:38:55 UTC 2017 ssl.sh: #8346: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:38:56 UTC 2017 ssl.sh: #8347: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:38:56 UTC 2017 ssl.sh: #8348: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:38:56 UTC 2017 ssl.sh: #8349: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:38:57 UTC 2017 ssl.sh: #8350: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:38:57 UTC 2017 ssl.sh: #8351: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:38:58 UTC 2017 ssl.sh: #8352: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:38:58 UTC 2017 ssl.sh: #8353: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:38:58 UTC 2017 ssl.sh: #8354: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:38:59 UTC 2017 ssl.sh: #8355: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:38:59 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8356: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:39:00 UTC 2017 ssl.sh: #8357: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:39:00 UTC 2017 ssl.sh: #8358: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:39:00 UTC 2017 ssl.sh: #8359: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:39:01 UTC 2017 ssl.sh: #8360: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:39:01 UTC 2017 ssl.sh: #8361: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:39:01 UTC 2017 ssl.sh: #8362: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:39:02 UTC 2017 ssl.sh: #8363: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:39:02 UTC 2017 ssl.sh: #8364: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:39:02 UTC 2017 ssl.sh: #8365: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:39:03 UTC 2017 ssl.sh: #8366: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:39:03 UTC 2017 ssl.sh: #8367: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:39:04 UTC 2017 ssl.sh: #8368: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1275 >/dev/null 2>/dev/null selfserv_9208 with PID 1275 found at Wed May 10 12:39:04 UTC 2017 ssl.sh: #8369: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 1275 at Wed May 10 12:39:04 UTC 2017 kill -USR1 1275 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1275 killed at Wed May 10 12:39:04 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:39:04 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:39:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:04 UTC 2017 selfserv_9208 with PID 2703 started at Wed May 10 12:39:04 UTC 2017 Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:05 UTC 2017 ssl.sh: #8370: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:05 UTC 2017 ssl.sh: #8371: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:06 UTC 2017 ssl.sh: #8372: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:06 UTC 2017 ssl.sh: #8373: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:06 UTC 2017 ssl.sh: #8374: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:07 UTC 2017 ssl.sh: #8375: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:07 UTC 2017 ssl.sh: #8376: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:07 UTC 2017 ssl.sh: #8377: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:08 UTC 2017 ssl.sh: #8378: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:08 UTC 2017 ssl.sh: #8379: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:09 UTC 2017 ssl.sh: #8380: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:09 UTC 2017 ssl.sh: #8381: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:10 UTC 2017 ssl.sh: #8382: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:10 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8383: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:10 UTC 2017 ssl.sh: #8384: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:11 UTC 2017 ssl.sh: #8385: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:11 UTC 2017 ssl.sh: #8386: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:11 UTC 2017 ssl.sh: #8387: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:12 UTC 2017 ssl.sh: #8388: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:12 UTC 2017 ssl.sh: #8389: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:12 UTC 2017 ssl.sh: #8390: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:13 UTC 2017 ssl.sh: #8391: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:13 UTC 2017 ssl.sh: #8392: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:14 UTC 2017 ssl.sh: #8393: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:14 UTC 2017 ssl.sh: #8394: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:14 UTC 2017 ssl.sh: #8395: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:15 UTC 2017 ssl.sh: #8396: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:15 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8397: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:16 UTC 2017 ssl.sh: #8398: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:16 UTC 2017 ssl.sh: #8399: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:16 UTC 2017 ssl.sh: #8400: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:17 UTC 2017 ssl.sh: #8401: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:17 UTC 2017 ssl.sh: #8402: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:17 UTC 2017 ssl.sh: #8403: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:18 UTC 2017 ssl.sh: #8404: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:18 UTC 2017 ssl.sh: #8405: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:18 UTC 2017 ssl.sh: #8406: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:19 UTC 2017 ssl.sh: #8407: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:19 UTC 2017 ssl.sh: #8408: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:20 UTC 2017 ssl.sh: #8409: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2703 >/dev/null 2>/dev/null selfserv_9208 with PID 2703 found at Wed May 10 12:39:20 UTC 2017 ssl.sh: #8410: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 2703 at Wed May 10 12:39:20 UTC 2017 kill -USR1 2703 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 2703 killed at Wed May 10 12:39:20 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:39:20 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:39:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 4126 >/dev/null 2>/dev/null selfserv_9208 with PID 4126 found at Wed May 10 12:39:20 UTC 2017 selfserv_9208 with PID 4126 started at Wed May 10 12:39:20 UTC 2017 trying to kill selfserv_9208 with PID 4126 at Wed May 10 12:39:20 UTC 2017 kill -USR1 4126 ./ssl.sh: line 183: 4126 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9208 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss ${sparam} -i ${R_SERVERPID} -V ssl3:tls1.2 $verbose -H 1 selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 4126 killed at Wed May 10 12:39:20 UTC 2017 selfserv_9208 starting at Wed May 10 12:39:20 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:39:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:20 UTC 2017 selfserv_9208 with PID 4160 started at Wed May 10 12:39:20 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:21 UTC 2017 ssl.sh: #8411: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:22 UTC 2017 ssl.sh: #8412: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:22 UTC 2017 ssl.sh: #8413: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:22 UTC 2017 ssl.sh: #8414: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:23 UTC 2017 ssl.sh: #8415: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:23 UTC 2017 ssl.sh: #8416: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:24 UTC 2017 ssl.sh: #8417: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:24 UTC 2017 ssl.sh: #8418: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:25 UTC 2017 ssl.sh: #8419: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:25 UTC 2017 ssl.sh: #8420: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:26 UTC 2017 ssl.sh: #8421: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:26 UTC 2017 ssl.sh: #8422: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:27 UTC 2017 ssl.sh: #8423: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:27 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8424: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:27 UTC 2017 ssl.sh: #8425: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:28 UTC 2017 ssl.sh: #8426: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:28 UTC 2017 ssl.sh: #8427: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:29 UTC 2017 ssl.sh: #8428: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:29 UTC 2017 ssl.sh: #8429: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:30 UTC 2017 ssl.sh: #8430: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:30 UTC 2017 ssl.sh: #8431: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:31 UTC 2017 ssl.sh: #8432: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:31 UTC 2017 ssl.sh: #8433: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:31 UTC 2017 ssl.sh: #8434: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:32 UTC 2017 ssl.sh: #8435: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:32 UTC 2017 ssl.sh: #8436: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:33 UTC 2017 ssl.sh: #8437: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:33 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8438: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:34 UTC 2017 ssl.sh: #8439: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:34 UTC 2017 ssl.sh: #8440: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:35 UTC 2017 ssl.sh: #8441: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:35 UTC 2017 ssl.sh: #8442: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:35 UTC 2017 ssl.sh: #8443: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:36 UTC 2017 ssl.sh: #8444: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:36 UTC 2017 ssl.sh: #8445: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:37 UTC 2017 ssl.sh: #8446: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:37 UTC 2017 ssl.sh: #8447: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:38 UTC 2017 ssl.sh: #8448: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:38 UTC 2017 ssl.sh: #8449: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:39 UTC 2017 ssl.sh: #8450: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4160 >/dev/null 2>/dev/null selfserv_9208 with PID 4160 found at Wed May 10 12:39:39 UTC 2017 ssl.sh: #8451: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 4160 at Wed May 10 12:39:39 UTC 2017 kill -USR1 4160 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 4160 killed at Wed May 10 12:39:39 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:39:39 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:39:39 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:39 UTC 2017 selfserv_9208 with PID 5583 started at Wed May 10 12:39:39 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:40 UTC 2017 ssl.sh: #8452: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:41 UTC 2017 ssl.sh: #8453: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:41 UTC 2017 ssl.sh: #8454: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:42 UTC 2017 ssl.sh: #8455: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:42 UTC 2017 ssl.sh: #8456: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:43 UTC 2017 ssl.sh: #8457: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:43 UTC 2017 ssl.sh: #8458: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:44 UTC 2017 ssl.sh: #8459: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:44 UTC 2017 ssl.sh: #8460: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:45 UTC 2017 ssl.sh: #8461: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:45 UTC 2017 ssl.sh: #8462: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:46 UTC 2017 ssl.sh: #8463: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:46 UTC 2017 ssl.sh: #8464: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:47 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8465: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:47 UTC 2017 ssl.sh: #8466: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:47 UTC 2017 ssl.sh: #8467: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:48 UTC 2017 ssl.sh: #8468: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:48 UTC 2017 ssl.sh: #8469: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:49 UTC 2017 ssl.sh: #8470: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:49 UTC 2017 ssl.sh: #8471: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:50 UTC 2017 ssl.sh: #8472: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:50 UTC 2017 ssl.sh: #8473: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:51 UTC 2017 ssl.sh: #8474: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:51 UTC 2017 ssl.sh: #8475: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:52 UTC 2017 ssl.sh: #8476: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:52 UTC 2017 ssl.sh: #8477: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:53 UTC 2017 ssl.sh: #8478: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:53 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8479: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:54 UTC 2017 ssl.sh: #8480: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:54 UTC 2017 ssl.sh: #8481: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:55 UTC 2017 ssl.sh: #8482: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:55 UTC 2017 ssl.sh: #8483: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:56 UTC 2017 ssl.sh: #8484: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:56 UTC 2017 ssl.sh: #8485: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:57 UTC 2017 ssl.sh: #8486: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:57 UTC 2017 ssl.sh: #8487: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:58 UTC 2017 ssl.sh: #8488: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:58 UTC 2017 ssl.sh: #8489: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:59 UTC 2017 ssl.sh: #8490: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:39:59 UTC 2017 ssl.sh: #8491: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5583 >/dev/null 2>/dev/null selfserv_9208 with PID 5583 found at Wed May 10 12:40:00 UTC 2017 ssl.sh: #8492: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 5583 at Wed May 10 12:40:00 UTC 2017 kill -USR1 5583 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5583 killed at Wed May 10 12:40:00 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:40:00 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:40:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:00 UTC 2017 selfserv_9208 with PID 7019 started at Wed May 10 12:40:00 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:01 UTC 2017 ssl.sh: #8493: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:01 UTC 2017 ssl.sh: #8494: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:01 UTC 2017 ssl.sh: #8495: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:02 UTC 2017 ssl.sh: #8496: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:02 UTC 2017 ssl.sh: #8497: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:03 UTC 2017 ssl.sh: #8498: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:03 UTC 2017 ssl.sh: #8499: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:04 UTC 2017 ssl.sh: #8500: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:04 UTC 2017 ssl.sh: #8501: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:04 UTC 2017 ssl.sh: #8502: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:05 UTC 2017 ssl.sh: #8503: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:05 UTC 2017 ssl.sh: #8504: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:06 UTC 2017 ssl.sh: #8505: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:06 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8506: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:07 UTC 2017 ssl.sh: #8507: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:07 UTC 2017 ssl.sh: #8508: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:07 UTC 2017 ssl.sh: #8509: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:08 UTC 2017 ssl.sh: #8510: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:08 UTC 2017 ssl.sh: #8511: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:09 UTC 2017 ssl.sh: #8512: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:09 UTC 2017 ssl.sh: #8513: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:10 UTC 2017 ssl.sh: #8514: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:10 UTC 2017 ssl.sh: #8515: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:10 UTC 2017 ssl.sh: #8516: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:11 UTC 2017 ssl.sh: #8517: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:11 UTC 2017 ssl.sh: #8518: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:12 UTC 2017 ssl.sh: #8519: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:12 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8520: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:12 UTC 2017 ssl.sh: #8521: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:13 UTC 2017 ssl.sh: #8522: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:13 UTC 2017 ssl.sh: #8523: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:14 UTC 2017 ssl.sh: #8524: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:14 UTC 2017 ssl.sh: #8525: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:15 UTC 2017 ssl.sh: #8526: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:15 UTC 2017 ssl.sh: #8527: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:15 UTC 2017 ssl.sh: #8528: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:16 UTC 2017 ssl.sh: #8529: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:16 UTC 2017 ssl.sh: #8530: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:17 UTC 2017 ssl.sh: #8531: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:17 UTC 2017 ssl.sh: #8532: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7019 >/dev/null 2>/dev/null selfserv_9208 with PID 7019 found at Wed May 10 12:40:18 UTC 2017 ssl.sh: #8533: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 7019 at Wed May 10 12:40:18 UTC 2017 kill -USR1 7019 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7019 killed at Wed May 10 12:40:18 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:40:18 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:40:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:18 UTC 2017 selfserv_9208 with PID 8441 started at Wed May 10 12:40:18 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:18 UTC 2017 ssl.sh: #8534: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:19 UTC 2017 ssl.sh: #8535: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:19 UTC 2017 ssl.sh: #8536: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:20 UTC 2017 ssl.sh: #8537: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:20 UTC 2017 ssl.sh: #8538: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:21 UTC 2017 ssl.sh: #8539: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:21 UTC 2017 ssl.sh: #8540: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:22 UTC 2017 ssl.sh: #8541: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:22 UTC 2017 ssl.sh: #8542: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:23 UTC 2017 ssl.sh: #8543: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:23 UTC 2017 ssl.sh: #8544: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:24 UTC 2017 ssl.sh: #8545: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:24 UTC 2017 ssl.sh: #8546: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:25 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8547: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:25 UTC 2017 ssl.sh: #8548: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:26 UTC 2017 ssl.sh: #8549: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:26 UTC 2017 ssl.sh: #8550: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:26 UTC 2017 ssl.sh: #8551: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:27 UTC 2017 ssl.sh: #8552: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:27 UTC 2017 ssl.sh: #8553: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:28 UTC 2017 ssl.sh: #8554: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:28 UTC 2017 ssl.sh: #8555: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:29 UTC 2017 ssl.sh: #8556: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:29 UTC 2017 ssl.sh: #8557: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:30 UTC 2017 ssl.sh: #8558: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:30 UTC 2017 ssl.sh: #8559: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:31 UTC 2017 ssl.sh: #8560: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:31 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8561: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:32 UTC 2017 ssl.sh: #8562: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:32 UTC 2017 ssl.sh: #8563: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:32 UTC 2017 ssl.sh: #8564: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:33 UTC 2017 ssl.sh: #8565: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:33 UTC 2017 ssl.sh: #8566: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:34 UTC 2017 ssl.sh: #8567: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:34 UTC 2017 ssl.sh: #8568: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:35 UTC 2017 ssl.sh: #8569: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:35 UTC 2017 ssl.sh: #8570: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:36 UTC 2017 ssl.sh: #8571: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:36 UTC 2017 ssl.sh: #8572: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:37 UTC 2017 ssl.sh: #8573: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8441 >/dev/null 2>/dev/null selfserv_9208 with PID 8441 found at Wed May 10 12:40:37 UTC 2017 ssl.sh: #8574: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 8441 at Wed May 10 12:40:37 UTC 2017 kill -USR1 8441 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 8441 killed at Wed May 10 12:40:37 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:40:37 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:40:37 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:37 UTC 2017 selfserv_9208 with PID 9863 started at Wed May 10 12:40:37 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:38 UTC 2017 ssl.sh: #8575: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:39 UTC 2017 ssl.sh: #8576: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:39 UTC 2017 ssl.sh: #8577: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:40 UTC 2017 ssl.sh: #8578: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:40 UTC 2017 ssl.sh: #8579: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:41 UTC 2017 ssl.sh: #8580: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:41 UTC 2017 ssl.sh: #8581: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:42 UTC 2017 ssl.sh: #8582: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:42 UTC 2017 ssl.sh: #8583: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:43 UTC 2017 ssl.sh: #8584: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:43 UTC 2017 ssl.sh: #8585: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:44 UTC 2017 ssl.sh: #8586: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:44 UTC 2017 ssl.sh: #8587: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:45 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8588: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:45 UTC 2017 ssl.sh: #8589: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:46 UTC 2017 ssl.sh: #8590: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:46 UTC 2017 ssl.sh: #8591: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:47 UTC 2017 ssl.sh: #8592: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:47 UTC 2017 ssl.sh: #8593: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:48 UTC 2017 ssl.sh: #8594: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:48 UTC 2017 ssl.sh: #8595: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:49 UTC 2017 ssl.sh: #8596: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:49 UTC 2017 ssl.sh: #8597: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:50 UTC 2017 ssl.sh: #8598: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:50 UTC 2017 ssl.sh: #8599: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:51 UTC 2017 ssl.sh: #8600: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:52 UTC 2017 ssl.sh: #8601: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:52 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8602: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:53 UTC 2017 ssl.sh: #8603: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:53 UTC 2017 ssl.sh: #8604: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:54 UTC 2017 ssl.sh: #8605: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:54 UTC 2017 ssl.sh: #8606: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:55 UTC 2017 ssl.sh: #8607: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:55 UTC 2017 ssl.sh: #8608: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:56 UTC 2017 ssl.sh: #8609: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:56 UTC 2017 ssl.sh: #8610: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:57 UTC 2017 ssl.sh: #8611: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:57 UTC 2017 ssl.sh: #8612: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:58 UTC 2017 ssl.sh: #8613: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:58 UTC 2017 ssl.sh: #8614: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9863 >/dev/null 2>/dev/null selfserv_9208 with PID 9863 found at Wed May 10 12:40:59 UTC 2017 ssl.sh: #8615: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 9863 at Wed May 10 12:40:59 UTC 2017 kill -USR1 9863 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 9863 killed at Wed May 10 12:40:59 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:40:59 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:40:59 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:40:59 UTC 2017 selfserv_9208 with PID 11285 started at Wed May 10 12:40:59 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:00 UTC 2017 ssl.sh: #8616: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:00 UTC 2017 ssl.sh: #8617: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:00 UTC 2017 ssl.sh: #8618: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:01 UTC 2017 ssl.sh: #8619: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:01 UTC 2017 ssl.sh: #8620: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:02 UTC 2017 ssl.sh: #8621: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:02 UTC 2017 ssl.sh: #8622: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:03 UTC 2017 ssl.sh: #8623: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:03 UTC 2017 ssl.sh: #8624: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:04 UTC 2017 ssl.sh: #8625: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:04 UTC 2017 ssl.sh: #8626: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:05 UTC 2017 ssl.sh: #8627: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:05 UTC 2017 ssl.sh: #8628: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:06 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8629: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:06 UTC 2017 ssl.sh: #8630: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:06 UTC 2017 ssl.sh: #8631: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:07 UTC 2017 ssl.sh: #8632: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:07 UTC 2017 ssl.sh: #8633: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:08 UTC 2017 ssl.sh: #8634: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:08 UTC 2017 ssl.sh: #8635: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:09 UTC 2017 ssl.sh: #8636: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:09 UTC 2017 ssl.sh: #8637: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:09 UTC 2017 ssl.sh: #8638: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:10 UTC 2017 ssl.sh: #8639: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:10 UTC 2017 ssl.sh: #8640: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:11 UTC 2017 ssl.sh: #8641: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:11 UTC 2017 ssl.sh: #8642: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:12 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8643: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:12 UTC 2017 ssl.sh: #8644: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:13 UTC 2017 ssl.sh: #8645: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:13 UTC 2017 ssl.sh: #8646: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:14 UTC 2017 ssl.sh: #8647: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:14 UTC 2017 ssl.sh: #8648: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:14 UTC 2017 ssl.sh: #8649: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:15 UTC 2017 ssl.sh: #8650: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:15 UTC 2017 ssl.sh: #8651: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:16 UTC 2017 ssl.sh: #8652: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:16 UTC 2017 ssl.sh: #8653: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:17 UTC 2017 ssl.sh: #8654: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:17 UTC 2017 ssl.sh: #8655: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11285 >/dev/null 2>/dev/null selfserv_9208 with PID 11285 found at Wed May 10 12:41:18 UTC 2017 ssl.sh: #8656: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 11285 at Wed May 10 12:41:18 UTC 2017 kill -USR1 11285 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 11285 killed at Wed May 10 12:41:18 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:41:18 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:41:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 12707 >/dev/null 2>/dev/null selfserv_9208 with PID 12707 found at Wed May 10 12:41:18 UTC 2017 selfserv_9208 with PID 12707 started at Wed May 10 12:41:18 UTC 2017 trying to kill selfserv_9208 with PID 12707 at Wed May 10 12:41:18 UTC 2017 kill -USR1 12707 ./ssl.sh: line 183: 12707 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9208 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss ${sparam} -i ${R_SERVERPID} -V ssl3:tls1.2 $verbose -H 1 selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 12707 killed at Wed May 10 12:41:18 UTC 2017 selfserv_9208 starting at Wed May 10 12:41:18 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:41:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:18 UTC 2017 selfserv_9208 with PID 12741 started at Wed May 10 12:41:18 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:19 UTC 2017 ssl.sh: #8657: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:19 UTC 2017 ssl.sh: #8658: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:19 UTC 2017 ssl.sh: #8659: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:20 UTC 2017 ssl.sh: #8660: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:20 UTC 2017 ssl.sh: #8661: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:21 UTC 2017 ssl.sh: #8662: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:21 UTC 2017 ssl.sh: #8663: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:22 UTC 2017 ssl.sh: #8664: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:22 UTC 2017 ssl.sh: #8665: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:23 UTC 2017 ssl.sh: #8666: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:23 UTC 2017 ssl.sh: #8667: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:24 UTC 2017 ssl.sh: #8668: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:24 UTC 2017 ssl.sh: #8669: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:25 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8670: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:25 UTC 2017 ssl.sh: #8671: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:25 UTC 2017 ssl.sh: #8672: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:26 UTC 2017 ssl.sh: #8673: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:26 UTC 2017 ssl.sh: #8674: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:27 UTC 2017 ssl.sh: #8675: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:27 UTC 2017 ssl.sh: #8676: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:28 UTC 2017 ssl.sh: #8677: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:28 UTC 2017 ssl.sh: #8678: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:29 UTC 2017 ssl.sh: #8679: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:29 UTC 2017 ssl.sh: #8680: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:29 UTC 2017 ssl.sh: #8681: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:30 UTC 2017 ssl.sh: #8682: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:30 UTC 2017 ssl.sh: #8683: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:31 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8684: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:31 UTC 2017 ssl.sh: #8685: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:32 UTC 2017 ssl.sh: #8686: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:32 UTC 2017 ssl.sh: #8687: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:33 UTC 2017 ssl.sh: #8688: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:33 UTC 2017 ssl.sh: #8689: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:34 UTC 2017 ssl.sh: #8690: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:34 UTC 2017 ssl.sh: #8691: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:34 UTC 2017 ssl.sh: #8692: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:35 UTC 2017 ssl.sh: #8693: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:35 UTC 2017 ssl.sh: #8694: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:36 UTC 2017 ssl.sh: #8695: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:36 UTC 2017 ssl.sh: #8696: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12741 >/dev/null 2>/dev/null selfserv_9208 with PID 12741 found at Wed May 10 12:41:37 UTC 2017 ssl.sh: #8697: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 12741 at Wed May 10 12:41:37 UTC 2017 kill -USR1 12741 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 12741 killed at Wed May 10 12:41:37 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:41:37 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:41:37 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:37 UTC 2017 selfserv_9208 with PID 14164 started at Wed May 10 12:41:37 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:38 UTC 2017 ssl.sh: #8698: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:38 UTC 2017 ssl.sh: #8699: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:39 UTC 2017 ssl.sh: #8700: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:39 UTC 2017 ssl.sh: #8701: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:40 UTC 2017 ssl.sh: #8702: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:40 UTC 2017 ssl.sh: #8703: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:41 UTC 2017 ssl.sh: #8704: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:41 UTC 2017 ssl.sh: #8705: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:42 UTC 2017 ssl.sh: #8706: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:42 UTC 2017 ssl.sh: #8707: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:43 UTC 2017 ssl.sh: #8708: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:43 UTC 2017 ssl.sh: #8709: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:44 UTC 2017 ssl.sh: #8710: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:44 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8711: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:45 UTC 2017 ssl.sh: #8712: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:45 UTC 2017 ssl.sh: #8713: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:46 UTC 2017 ssl.sh: #8714: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:46 UTC 2017 ssl.sh: #8715: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:47 UTC 2017 ssl.sh: #8716: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:47 UTC 2017 ssl.sh: #8717: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:48 UTC 2017 ssl.sh: #8718: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:48 UTC 2017 ssl.sh: #8719: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:49 UTC 2017 ssl.sh: #8720: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:49 UTC 2017 ssl.sh: #8721: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:50 UTC 2017 ssl.sh: #8722: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:50 UTC 2017 ssl.sh: #8723: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:51 UTC 2017 ssl.sh: #8724: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:51 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8725: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:52 UTC 2017 ssl.sh: #8726: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:52 UTC 2017 ssl.sh: #8727: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:53 UTC 2017 ssl.sh: #8728: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:53 UTC 2017 ssl.sh: #8729: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:54 UTC 2017 ssl.sh: #8730: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:54 UTC 2017 ssl.sh: #8731: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:55 UTC 2017 ssl.sh: #8732: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:55 UTC 2017 ssl.sh: #8733: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:56 UTC 2017 ssl.sh: #8734: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:56 UTC 2017 ssl.sh: #8735: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:57 UTC 2017 ssl.sh: #8736: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:57 UTC 2017 ssl.sh: #8737: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14164 >/dev/null 2>/dev/null selfserv_9208 with PID 14164 found at Wed May 10 12:41:58 UTC 2017 ssl.sh: #8738: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 14164 at Wed May 10 12:41:58 UTC 2017 kill -USR1 14164 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14164 killed at Wed May 10 12:41:58 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:41:58 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:41:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:41:58 UTC 2017 selfserv_9208 with PID 15586 started at Wed May 10 12:41:58 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:41:58 UTC 2017 ssl.sh: #8739: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:41:59 UTC 2017 ssl.sh: #8740: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:41:59 UTC 2017 ssl.sh: #8741: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:00 UTC 2017 ssl.sh: #8742: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:00 UTC 2017 ssl.sh: #8743: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:00 UTC 2017 ssl.sh: #8744: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:01 UTC 2017 ssl.sh: #8745: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:01 UTC 2017 ssl.sh: #8746: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:02 UTC 2017 ssl.sh: #8747: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:02 UTC 2017 ssl.sh: #8748: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:03 UTC 2017 ssl.sh: #8749: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:03 UTC 2017 ssl.sh: #8750: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:04 UTC 2017 ssl.sh: #8751: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:04 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8752: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:04 UTC 2017 ssl.sh: #8753: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:05 UTC 2017 ssl.sh: #8754: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:05 UTC 2017 ssl.sh: #8755: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:06 UTC 2017 ssl.sh: #8756: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:06 UTC 2017 ssl.sh: #8757: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:06 UTC 2017 ssl.sh: #8758: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:07 UTC 2017 ssl.sh: #8759: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:07 UTC 2017 ssl.sh: #8760: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:08 UTC 2017 ssl.sh: #8761: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:08 UTC 2017 ssl.sh: #8762: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:09 UTC 2017 ssl.sh: #8763: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:09 UTC 2017 ssl.sh: #8764: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:09 UTC 2017 ssl.sh: #8765: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:10 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8766: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:10 UTC 2017 ssl.sh: #8767: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:11 UTC 2017 ssl.sh: #8768: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:11 UTC 2017 ssl.sh: #8769: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:12 UTC 2017 ssl.sh: #8770: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:12 UTC 2017 ssl.sh: #8771: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:12 UTC 2017 ssl.sh: #8772: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:13 UTC 2017 ssl.sh: #8773: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:13 UTC 2017 ssl.sh: #8774: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:14 UTC 2017 ssl.sh: #8775: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:14 UTC 2017 ssl.sh: #8776: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:15 UTC 2017 ssl.sh: #8777: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:15 UTC 2017 ssl.sh: #8778: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15586 >/dev/null 2>/dev/null selfserv_9208 with PID 15586 found at Wed May 10 12:42:15 UTC 2017 ssl.sh: #8779: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 15586 at Wed May 10 12:42:15 UTC 2017 kill -USR1 15586 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15586 killed at Wed May 10 12:42:16 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:42:16 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:42:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:16 UTC 2017 selfserv_9208 with PID 17009 started at Wed May 10 12:42:16 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:16 UTC 2017 ssl.sh: #8780: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:17 UTC 2017 ssl.sh: #8781: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:17 UTC 2017 ssl.sh: #8782: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:18 UTC 2017 ssl.sh: #8783: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:18 UTC 2017 ssl.sh: #8784: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:19 UTC 2017 ssl.sh: #8785: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:19 UTC 2017 ssl.sh: #8786: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:20 UTC 2017 ssl.sh: #8787: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:20 UTC 2017 ssl.sh: #8788: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:21 UTC 2017 ssl.sh: #8789: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:21 UTC 2017 ssl.sh: #8790: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:22 UTC 2017 ssl.sh: #8791: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:22 UTC 2017 ssl.sh: #8792: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:23 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8793: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:23 UTC 2017 ssl.sh: #8794: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:23 UTC 2017 ssl.sh: #8795: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:24 UTC 2017 ssl.sh: #8796: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:24 UTC 2017 ssl.sh: #8797: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:25 UTC 2017 ssl.sh: #8798: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:25 UTC 2017 ssl.sh: #8799: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:26 UTC 2017 ssl.sh: #8800: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:26 UTC 2017 ssl.sh: #8801: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:27 UTC 2017 ssl.sh: #8802: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:27 UTC 2017 ssl.sh: #8803: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:28 UTC 2017 ssl.sh: #8804: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:28 UTC 2017 ssl.sh: #8805: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:29 UTC 2017 ssl.sh: #8806: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:29 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8807: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:30 UTC 2017 ssl.sh: #8808: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:30 UTC 2017 ssl.sh: #8809: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:30 UTC 2017 ssl.sh: #8810: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:31 UTC 2017 ssl.sh: #8811: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:31 UTC 2017 ssl.sh: #8812: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:32 UTC 2017 ssl.sh: #8813: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:32 UTC 2017 ssl.sh: #8814: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:33 UTC 2017 ssl.sh: #8815: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:33 UTC 2017 ssl.sh: #8816: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:34 UTC 2017 ssl.sh: #8817: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:34 UTC 2017 ssl.sh: #8818: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:35 UTC 2017 ssl.sh: #8819: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17009 >/dev/null 2>/dev/null selfserv_9208 with PID 17009 found at Wed May 10 12:42:35 UTC 2017 ssl.sh: #8820: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 17009 at Wed May 10 12:42:35 UTC 2017 kill -USR1 17009 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17009 killed at Wed May 10 12:42:35 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:42:35 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:42:35 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:35 UTC 2017 selfserv_9208 with PID 18432 started at Wed May 10 12:42:35 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:36 UTC 2017 ssl.sh: #8821: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:37 UTC 2017 ssl.sh: #8822: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:37 UTC 2017 ssl.sh: #8823: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:38 UTC 2017 ssl.sh: #8824: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:38 UTC 2017 ssl.sh: #8825: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:39 UTC 2017 ssl.sh: #8826: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:39 UTC 2017 ssl.sh: #8827: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:40 UTC 2017 ssl.sh: #8828: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:40 UTC 2017 ssl.sh: #8829: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:41 UTC 2017 ssl.sh: #8830: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:41 UTC 2017 ssl.sh: #8831: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:42 UTC 2017 ssl.sh: #8832: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:42 UTC 2017 ssl.sh: #8833: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:43 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8834: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:44 UTC 2017 ssl.sh: #8835: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:44 UTC 2017 ssl.sh: #8836: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:45 UTC 2017 ssl.sh: #8837: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:45 UTC 2017 ssl.sh: #8838: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:45 UTC 2017 ssl.sh: #8839: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:46 UTC 2017 ssl.sh: #8840: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:47 UTC 2017 ssl.sh: #8841: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:47 UTC 2017 ssl.sh: #8842: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:47 UTC 2017 ssl.sh: #8843: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:48 UTC 2017 ssl.sh: #8844: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:49 UTC 2017 ssl.sh: #8845: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:49 UTC 2017 ssl.sh: #8846: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:50 UTC 2017 ssl.sh: #8847: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:50 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8848: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:51 UTC 2017 ssl.sh: #8849: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:51 UTC 2017 ssl.sh: #8850: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:52 UTC 2017 ssl.sh: #8851: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:52 UTC 2017 ssl.sh: #8852: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:53 UTC 2017 ssl.sh: #8853: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:53 UTC 2017 ssl.sh: #8854: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:54 UTC 2017 ssl.sh: #8855: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:54 UTC 2017 ssl.sh: #8856: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:55 UTC 2017 ssl.sh: #8857: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:55 UTC 2017 ssl.sh: #8858: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:56 UTC 2017 ssl.sh: #8859: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:56 UTC 2017 ssl.sh: #8860: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18432 >/dev/null 2>/dev/null selfserv_9208 with PID 18432 found at Wed May 10 12:42:57 UTC 2017 ssl.sh: #8861: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 18432 at Wed May 10 12:42:57 UTC 2017 kill -USR1 18432 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18432 killed at Wed May 10 12:42:57 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:42:57 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:42:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:42:57 UTC 2017 selfserv_9208 with PID 19855 started at Wed May 10 12:42:57 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:42:58 UTC 2017 ssl.sh: #8862: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:42:58 UTC 2017 ssl.sh: #8863: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:42:58 UTC 2017 ssl.sh: #8864: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:42:59 UTC 2017 ssl.sh: #8865: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:42:59 UTC 2017 ssl.sh: #8866: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:00 UTC 2017 ssl.sh: #8867: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:00 UTC 2017 ssl.sh: #8868: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:01 UTC 2017 ssl.sh: #8869: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:01 UTC 2017 ssl.sh: #8870: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:02 UTC 2017 ssl.sh: #8871: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:02 UTC 2017 ssl.sh: #8872: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:03 UTC 2017 ssl.sh: #8873: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:03 UTC 2017 ssl.sh: #8874: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:04 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8875: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:04 UTC 2017 ssl.sh: #8876: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:04 UTC 2017 ssl.sh: #8877: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:05 UTC 2017 ssl.sh: #8878: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:05 UTC 2017 ssl.sh: #8879: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:06 UTC 2017 ssl.sh: #8880: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:06 UTC 2017 ssl.sh: #8881: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:07 UTC 2017 ssl.sh: #8882: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:07 UTC 2017 ssl.sh: #8883: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:07 UTC 2017 ssl.sh: #8884: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:08 UTC 2017 ssl.sh: #8885: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:08 UTC 2017 ssl.sh: #8886: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:09 UTC 2017 ssl.sh: #8887: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:09 UTC 2017 ssl.sh: #8888: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:10 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #8889: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:10 UTC 2017 ssl.sh: #8890: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:11 UTC 2017 ssl.sh: #8891: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:11 UTC 2017 ssl.sh: #8892: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:12 UTC 2017 ssl.sh: #8893: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:12 UTC 2017 ssl.sh: #8894: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:12 UTC 2017 ssl.sh: #8895: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:13 UTC 2017 ssl.sh: #8896: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:13 UTC 2017 ssl.sh: #8897: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:14 UTC 2017 ssl.sh: #8898: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:14 UTC 2017 ssl.sh: #8899: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:15 UTC 2017 ssl.sh: #8900: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:15 UTC 2017 ssl.sh: #8901: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19855 >/dev/null 2>/dev/null selfserv_9208 with PID 19855 found at Wed May 10 12:43:16 UTC 2017 ssl.sh: #8902: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 19855 at Wed May 10 12:43:16 UTC 2017 kill -USR1 19855 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 19855 killed at Wed May 10 12:43:16 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:43:16 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:43:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 21277 >/dev/null 2>/dev/null selfserv_9208 with PID 21277 found at Wed May 10 12:43:16 UTC 2017 selfserv_9208 with PID 21277 started at Wed May 10 12:43:16 UTC 2017 trying to kill selfserv_9208 with PID 21277 at Wed May 10 12:43:16 UTC 2017 kill -USR1 21277 ./ssl.sh: line 183: 21277 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9208 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss ${sparam} -i ${R_SERVERPID} -V ssl3:tls1.2 $verbose -H 1 selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 21277 killed at Wed May 10 12:43:16 UTC 2017 TIMESTAMP ssl END: Wed May 10 12:43:16 UTC 2017 Running tests for merge TIMESTAMP merge BEGIN: Wed May 10 12:43:16 UTC 2017 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/tests.v3.1556 -t Test2 -f ../tests.pw merge.sh: #8903: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id dave --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #8904: Merging Dave - PASSED merge.sh: Merging in new user certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id server --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #8905: Merging server - PASSED merge.sh: Merging in new chain certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id ext_client --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #8906: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict1 --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #8907: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict2 --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #8908: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:42:52 2017 Not After : Tue May 10 11:42:52 2022 Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:e3:a8:c5:7b:02:a6:97:3c:8c:d2:be:ae:0f:38:ca: d3:e9:d3:dd:bb:63:d1:3e:40:78:a4:8b:0e:77:c8:fb: 64:32:d3:73:f7:4e:9f:d2:0f:8a:cf:54:c6:43:8b:c4: 7b:41:d9:6d:a1:e1:4c:c3:4f:33:92:b8:c7:81:9a:c6: 22:09:7b:09:6e:26:e8:d9:3b:8c:b0:87:01:ff:b6:69: 7a:d8:3b:d3:cc:f3:f9:ff:28:f8:4f:dd:28:2f:df:a2: b4:69:0b:0a:9a:bf:6e:38:9f:c7:a0:32:29:70:46:71: 6c:73:b0:a6:b3:20:ad:68:28:58:1f:01:b9:d3:09:f7: 46:22:d3:8d:4c:fe:95:8d:57:61:97:38:cd:6c:a7:26: 04:6e:1f:75:c3:b6:50:a1:d1:32:dd:82:3e:84:b3:24: 4c:2b:85:20:b0:d3:8f:3c:d4:f0:fa:8c:03:65:32:2c: a6:0d:4d:a4:61:d4:17:7d:9e:a9:1b:5b:2b:3d:f9:0b: d5:be:57:b1:44:f9:3e:bc:7d:a2:10:fe:2b:7e:de:e8: d6:25:65:87:8b:6b:95:fc:90:2e:6f:7f:9e:fa:b9:08: fb:8e:6b:94:f0:6a:69:4d:2d:42:bc:fe:57:b5:18:ef: 51:01:41:c3:d6:a4:fb:91:3e:f4:48:8f:a5:18:40:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:82:c3:a9:f3:c1:59:65:c1:b0:69:c8:ec:95:39:34: 91:df:d2:ac:d9:10:2b:5a:a2:b1:9e:fa:e0:6a:dd:fd: 16:31:f3:66:87:d9:dc:ab:71:fe:0b:4f:73:27:37:3a: 5f:7e:3c:66:0b:2e:0b:19:d9:fc:65:10:48:ff:42:61: e8:f9:64:65:6c:fc:81:0d:9f:6c:3b:86:71:e7:17:dd: fb:b0:06:38:ef:85:90:27:30:d3:b3:e0:93:ed:85:9a: 5a:bd:19:ea:f9:12:fd:bb:bd:3f:f3:ea:d8:e7:18:62: 5f:d1:37:4f:86:cc:2a:74:72:a6:85:3d:cd:0e:fa:6e: ef:81:c2:e1:f9:a9:84:7c:8c:03:26:ea:23:34:c9:8b: c8:85:e8:0e:4e:77:d9:19:21:ec:b7:55:a2:cb:d4:d5: 11:dc:16:1c:54:a2:9f:b5:5d:8a:ad:11:ae:1a:80:c3: 91:33:b2:ca:ef:35:50:f3:24:b9:96:38:4a:82:5a:96: ac:80:fb:48:2a:ff:45:d8:ac:ac:8e:11:f0:13:98:c0: 91:55:bb:49:aa:0d:b3:56:b2:5b:84:e9:29:ab:3f:f9: 98:ae:af:ed:a8:aa:f6:41:6e:0e:d8:d7:d3:95:11:fe: 66:c2:d9:9c:4b:9c:2a:0b:42:7b:63:78:39:52:ed:92 Fingerprint (SHA-256): F1:D1:FF:D1:2F:49:D9:F4:0B:34:45:09:65:56:59:E8:05:A9:3A:7C:71:0B:13:D2:08:92:93:3E:00:C4:A6:0D Fingerprint (SHA1): C0:9C:6D:39:06:BD:0C:5C:77:79:94:8D:D7:4D:EC:74:EB:14:44:CC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #8909: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 11:42:55 2017 Not After : Tue May 10 11:42:55 2022 Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:13:5f:25:a4:5f:eb:1f:90:e5:a9:ae:af:a3:14:02: fb:fb:4f:04:5b:0e:d4:fa:ef:f8:ac:7f:e6:91:3c:cf: 23:5e:74:23:88:dc:ef:0f:57:ec:8e:4d:cc:56:44:d5: fe:1c:db:40:ea:92:33:96:d2:2a:ac:d5:f7:a3:bb:c0: 18:53:64:6c:2d:0a:e5:9b:54:91:de:fa:4a:86:4d:43: d1:ac:53:2d:f7:d1:22:8d:4f:e1:59:98:5d:f0:01:d9: 3b:6d:9d:10:ee:ff:ca:11:2c:c6:c4:e3:1e:04:6a:72: 21:7d:f8:d0:b5:45:64:4d:f6:cf:79:0b:2d:69:cc:e4: e9:eb:17:72:d9:29:5e:60:8d:15:7c:d6:ff:05:a3:f9: 49:0b:0b:06:40:9c:dd:be:be:21:75:0a:ea:52:42:62: 69:45:ef:22:e6:c4:14:b3:ad:89:85:3d:0a:b1:9f:1f: 6f:d2:8d:b6:92:cb:3f:c8:46:b0:26:b1:f0:fe:ba:99: 53:fe:21:3e:24:ad:dc:7e:27:ff:5b:d8:32:e7:75:b2: 43:a0:b9:9a:8b:08:8d:88:1b:51:ae:e2:e1:c0:3d:05: f0:b6:64:43:54:06:f5:eb:93:f7:21:dd:23:90:eb:4b: 0c:d8:7e:ce:da:83:3e:b5:f0:67:9b:d5:70:58:4b:e3 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:15:41:67:ac:8a:90:0b:a0:b3:d3:9e:e8:a0:2b:b3: 59:67:d9:66:3f:f5:49:75:82:bf:4f:b8:cb:8d:78:eb: 81:9c:20:b6:e3:9f:96:c2:76:53:26:51:0f:e9:71:1f: 99:33:2e:18:6e:a1:0d:a6:3d:39:7a:61:84:5b:79:da: c6:f9:c7:f5:3b:36:ce:60:fd:89:d6:74:5b:7e:17:32: c6:54:7d:a8:eb:eb:65:e8:ae:90:6c:4a:d7:da:7a:31: ee:c7:e8:42:ac:6c:65:15:6a:a0:21:16:d5:cc:a0:7b: 39:a0:6b:b3:30:05:65:5d:bc:24:67:f7:65:c2:7f:10: 8f:e8:02:b7:6e:78:ff:c8:d2:da:db:e3:eb:74:af:6b: e4:8f:ec:85:46:28:cc:cd:47:17:bf:02:82:ca:17:71: 05:d1:1d:32:92:85:fe:24:3d:24:2b:9e:66:3a:96:0b: c2:8d:ea:5f:16:e1:c7:18:17:7a:0e:fe:15:d7:a6:a8: 06:b4:87:3c:9e:30:5d:b9:0e:1f:e2:d5:0c:7e:b7:26: 37:ac:aa:fc:9a:3c:4a:90:61:7e:ab:7d:a7:29:63:0f: d5:f8:71:26:7b:57:4e:83:d6:d4:5e:98:46:6b:2f:7b: e1:98:70:01:b6:14:be:1d:c2:d8:41:ec:44:9a:f2:1e Fingerprint (SHA-256): A7:90:95:22:8B:5A:91:49:7A:E8:27:C1:3C:B8:40:C0:3C:B7:DE:65:68:07:F9:9A:0E:DE:47:D2:44:05:1A:63 Fingerprint (SHA1): 39:86:41:C6:50:58:FB:AB:74:BC:B7:A3:74:03:AF:96:DA:2E:40:64 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #8910: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id sdr --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #8911: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA-dsa CT,C,C Alice u,u,u Alice-dsamixed u,u,u Alice-ec u,u,u bob@bogus.com ,, Dave u,u,u eve@bogus.com ,, bob-ec@bogus.com ,, Dave-ec u,u,u TestCA CT,C,C TestCA-ec CT,C,C Alice-dsa u,u,u Alice-ecmixed u,u,u Dave-dsamixed u,u,u Dave-dsa u,u,u Dave-ecmixed u,u,u localhost.localdomain u,u,u localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u localhost-sni.localdomain-dsa u,u,u localhost-sni.localdomain-ecmixed u,u,u localhost.localdomain-dsa u,u,u localhost.localdomain-ecmixed u,u,u localhost-sni.localdomain u,u,u localhost-sni.localdomain-dsamixed u,u,u localhost-sni.localdomain-ec u,u,u ExtendedSSLUser-dsa u,u,u serverCA-dsa C,C,C ExtendedSSLUser-ecmixed u,u,u chain-2-clientCA-ec ,, chain-2-clientCA ,, clientCA T,C,C clientCA-ec T,C,C chain-1-clientCA-dsa ,, ExtendedSSLUser u,u,u serverCA C,C,C ExtendedSSLUser-dsamixed u,u,u ExtendedSSLUser-ec u,u,u serverCA-ec C,C,C chain-1-clientCA-ec ,, chain-1-clientCA ,, chain-2-clientCA-dsa ,, clientCA-dsa T,C,C Alice #1 ,, Alice #2 ,, Alice #99 ,, Alice #3 ,, Alice #100 ,, Alice #4 ,, CRL names CRL Type TestCA CRL TestCA-ec CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/tests.v3.1556 -t Test2 -f ../tests.pw merge.sh: #8912: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/tests.v1.1556 -t Test1 -f ../tests.pw merge.sh: #8913: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #8914: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. merge.sh: #8915: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #8916: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Wed May 10 11:43:15 2017 Entry 1 (0x1): Serial Number: 40 (0x28) Revocation Date: Wed May 10 11:41:20 2017 Entry Extensions: Name: CRL reason code Entry 2 (0x2): Serial Number: 42 (0x2a) Revocation Date: Wed May 10 11:43:11 2017 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #8917: Verifying TestCA CRL - PASSED TEST_MODE=UPGRADE_DB NSS_DEFAULT_DB_TYPE=sql TIMESTAMP merge END: Wed May 10 12:43:21 UTC 2017 Running tests for ec TIMESTAMP ec BEGIN: Wed May 10 12:43:21 UTC 2017 Running ec tests for ecperf TIMESTAMP ecperf BEGIN: Wed May 10 12:43:21 UTC 2017 ecperf.sh: ecperf test =============================== ./ecperf.sh: line 43: ecperf: command not found ecperf.sh: #8918: ec(perf) test - PASSED TIMESTAMP ecperf END: Wed May 10 12:43:21 UTC 2017 Running ec tests for ectest TIMESTAMP ectest BEGIN: Wed May 10 12:43:21 UTC 2017 ectest.sh: freebl and pk11 ectest tests =============================== No password file "../tests.pw" exists. Test curve25519 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #8919: ec test certutil keygen - curve25519 - PASSED Test secp256r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #8920: ec test certutil keygen - secp256r1 - PASSED Test secp384r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #8921: ec test certutil keygen - secp384r1 - PASSED Test secp521r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #8922: ec test certutil keygen - secp521r1 - PASSED Test sect571r1 key generation using certutil that should fail because it's not implemented ... Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_KEY: The key does not support the requested operation. ectest.sh: #8923: ec test certutil keygen - secp521r1 - PASSED ectest.sh: #8924: pk11 ec tests - PASSED TIMESTAMP ectest END: Wed May 10 12:43:23 UTC 2017 TIMESTAMP ec END: Wed May 10 12:43:23 UTC 2017 Running tests for gtests TIMESTAMP gtests BEGIN: Wed May 10 12:43:23 UTC 2017 gtests: prng_gtest der_gtest pk11_gtest util_gtest gtests.sh: #8925: Skipping prng_gtest (not built) - UNKNOWN gtests.sh: der_gtest =============================== executing der_gtest [==========] Running 16 tests from 2 test cases. [----------] Global test environment set-up. [----------] 13 tests from DERIntegerDecodingTest [ RUN ] DERIntegerDecodingTest.DecodeLongMinus126 [ OK ] DERIntegerDecodingTest.DecodeLongMinus126 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong130 [ OK ] DERIntegerDecodingTest.DecodeLong130 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong130Padded [ OK ] DERIntegerDecodingTest.DecodeLong130Padded (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong0 [ OK ] DERIntegerDecodingTest.DecodeLong0 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong1 [ OK ] DERIntegerDecodingTest.DecodeLong1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinus1Padded [ OK ] DERIntegerDecodingTest.DecodeLongMinus1Padded (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMax [ OK ] DERIntegerDecodingTest.DecodeLongMax (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMin [ OK ] DERIntegerDecodingTest.DecodeLongMin (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMaxMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMaxMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinPlus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinPlus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMaxPlus1 [ OK ] DERIntegerDecodingTest.DecodeLongMaxPlus1 (0 ms) [----------] 13 tests from DERIntegerDecodingTest (11 ms total) [----------] 3 tests from DERPrivateKeyImportTest [ RUN ] DERPrivateKeyImportTest.ImportPrivateRSAKey [ OK ] DERPrivateKeyImportTest.ImportPrivateRSAKey (1 ms) [ RUN ] DERPrivateKeyImportTest.ImportInvalidPrivateKey [ OK ] DERPrivateKeyImportTest.ImportInvalidPrivateKey (0 ms) [ RUN ] DERPrivateKeyImportTest.ImportZeroLengthPrivateKey [ OK ] DERPrivateKeyImportTest.ImportZeroLengthPrivateKey (0 ms) [----------] 3 tests from DERPrivateKeyImportTest (1 ms total) [----------] Global test environment tear-down [==========] 16 tests from 2 test cases ran. (14 ms total) [ PASSED ] 16 tests. gtests.sh: #8926: der_gtest run successfully - PASSED test output dir: /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/upgradedb/der_gtest/report.xml executing sed to parse the xml report processing the parsed report gtests.sh: #8927: 'DERIntegerDecodingTest: DecodeLongMinus126' - PASSED gtests.sh: #8928: 'DERIntegerDecodingTest: DecodeLong130' - PASSED gtests.sh: #8929: 'DERIntegerDecodingTest: DecodeLong130Padded' - PASSED gtests.sh: #8930: 'DERIntegerDecodingTest: DecodeLong0' - PASSED gtests.sh: #8931: 'DERIntegerDecodingTest: DecodeLong1' - PASSED gtests.sh: #8932: 'DERIntegerDecodingTest: DecodeLongMinus1' - PASSED gtests.sh: #8933: 'DERIntegerDecodingTest: DecodeLongMinus1Padded' - PASSED gtests.sh: #8934: 'DERIntegerDecodingTest: DecodeLongMax' - PASSED gtests.sh: #8935: 'DERIntegerDecodingTest: DecodeLongMin' - PASSED gtests.sh: #8936: 'DERIntegerDecodingTest: DecodeLongMaxMinus1' - PASSED gtests.sh: #8937: 'DERIntegerDecodingTest: DecodeLongMinPlus1' - PASSED gtests.sh: #8938: 'DERIntegerDecodingTest: DecodeLongMinMinus1' - PASSED gtests.sh: #8939: 'DERIntegerDecodingTest: DecodeLongMaxPlus1' - PASSED gtests.sh: #8940: 'DERPrivateKeyImportTest: ImportPrivateRSAKey' - PASSED gtests.sh: #8941: 'DERPrivateKeyImportTest: ImportInvalidPrivateKey' - PASSED gtests.sh: #8942: 'DERPrivateKeyImportTest: ImportZeroLengthPrivateKey' - PASSED gtests.sh: #8943: Skipping pk11_gtest (not built) - UNKNOWN gtests.sh: #8944: Skipping util_gtest (not built) - UNKNOWN TIMESTAMP gtests END: Wed May 10 12:43:23 UTC 2017 Running tests for ssl_gtests TIMESTAMP ssl_gtests BEGIN: Wed May 10 12:43:23 UTC 2017 ssl_gtest.sh: SSL Gtests =============================== ssl_gtest.sh: #8945: create ssl_gtest database - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #8946: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #8947: create certificate: sign kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #8948: create certificate: sign kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #8949: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #8950: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #8951: create certificate: kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #8952: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #8953: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #8954: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #8955: create certificate: kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #8956: create certificate: ca - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #8957: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #8958: create certificate: kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #8959: create certificate: sign - PASSED ssl_gtest.sh: #8960: Skipping ssl_gtest (not built) - UNKNOWN TIMESTAMP ssl_gtests END: Wed May 10 12:43:34 UTC 2017 ssl_gtests.sh: Testing with shared library =============================== Running tests for cert TIMESTAMP cert BEGIN: Wed May 10 12:43:34 UTC 2017 cert.sh: Certutil and Crlutil Tests with ECC =============================== cert.sh: #8961: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/CA -f ../tests.pw cert.sh: #8962: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #8963: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8964: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/CA -o root.cert cert.sh: #8965: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA -f ../tests.pw cert.sh: #8966: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #8967: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8968: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #8969: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8970: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #8971: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8972: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #8973: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA -f ../tests.pw cert.sh: #8974: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #8975: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8976: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #8977: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8978: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #8979: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8980: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #8981: Exporting Root Cert - PASSED cert.sh: Creating an DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8982: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #8983: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8984: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #8985: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8986: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #8987: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8988: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #8989: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8990: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #8991: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8992: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #8993: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8994: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #8995: Exporting DSA Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8996: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #8997: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8998: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #8999: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #9000: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #9001: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #9002: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #9003: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #9004: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #9005: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #9006: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #9007: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #9008: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #9009: Exporting EC Root Cert - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw cert.sh: #9010: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #9011: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9012: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #9013: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9014: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA/clientCA.ca.cert cert.sh: #9015: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9016: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #9017: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9018: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA/clientCA-dsa.ca.cert cert.sh: #9019: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9020: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #9021: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9022: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9023: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #9024: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9025: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA/clientCA-ec.ca.cert cert.sh: #9026: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9027: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #9028: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9029: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9030: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA/serverCA-dsa.ca.cert cert.sh: #9031: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9032: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9033: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9034: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9035: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA/serverCA-ec.ca.cert cert.sh: #9036: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9037: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA/serverCA.ca.cert cert.sh: #9038: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw cert.sh: #9039: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #9040: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9041: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #9042: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9043: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA/serverCA.ca.cert cert.sh: #9044: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9045: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #9046: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9047: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA/serverCA-dsa.ca.cert cert.sh: #9048: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9049: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #9050: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9051: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9052: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #9053: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9054: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA/serverCA-ec.ca.cert cert.sh: #9055: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9056: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #9057: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9058: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9059: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9060: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9061: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9062: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9063: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA/clientCA.ca.cert cert.sh: #9064: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA/clientCA-ec.ca.cert cert.sh: #9065: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9066: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/clientCA/clientCA-dsa.ca.cert cert.sh: #9067: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw cert.sh: #9068: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #9069: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA.ca.cert cert.sh: #9070: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #9071: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA-ec.ca.cert cert.sh: #9072: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9073: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #9074: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9075: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9076: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #9077: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9078: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9079: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #9080: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9081: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9082: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #9083: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9084: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9085: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #9086: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9087: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #9088: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #9089: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA.ca.cert cert.sh: #9090: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #9091: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA-ec.ca.cert cert.sh: #9092: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9093: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #9094: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9095: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9096: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #9097: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9098: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9099: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #9100: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9101: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9102: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #9103: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9104: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9105: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #9106: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9107: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9108: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #9109: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9110: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9111: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #9112: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9113: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9114: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #9115: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9116: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9117: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #9118: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9119: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9120: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #9121: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9122: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #9123: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #9124: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #9125: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw cert.sh: #9126: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #9127: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA.ca.cert cert.sh: #9128: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #9129: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #9130: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9131: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #9132: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9133: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9134: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #9135: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9136: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9137: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #9138: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9139: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9140: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #9141: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9142: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9143: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #9144: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9145: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw cert.sh: #9146: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #9147: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA.ca.cert cert.sh: #9148: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #9149: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #9150: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9151: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #9152: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9153: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9154: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #9155: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9156: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9157: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #9158: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9159: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9160: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #9161: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9162: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9163: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #9164: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9165: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw cert.sh: #9166: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #9167: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA.ca.cert cert.sh: #9168: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #9169: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #9170: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9171: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #9172: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9173: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9174: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #9175: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9176: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9177: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #9178: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9179: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9180: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #9181: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9182: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9183: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #9184: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9185: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw cert.sh: #9186: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #9187: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA.ca.cert cert.sh: #9188: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #9189: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #9190: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9191: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #9192: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9193: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9194: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #9195: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9196: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9197: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #9198: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9199: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9200: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #9201: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9202: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9203: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #9204: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9205: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #9206: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #9207: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #9208: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #9209: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #9210: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #9211: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #9212: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #9213: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips -f ../tests.fipspw cert.sh: #9214: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #9215: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #9216: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9217: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw cert.sh: #9218: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #9219: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #9220: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9221: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #9222: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9223: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9224: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #9225: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9226: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9227: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #9228: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9229: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw cert.sh: #9230: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #9231: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #9232: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #9233: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #9234: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9235: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #9236: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9237: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9238: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #9239: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9240: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9241: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #9242: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9243: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9244: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #9245: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9246: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9247: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #9248: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9249: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:5b:29 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Wed May 10 12:45:38 2017 Not After : Thu Aug 10 12:45:38 2017 Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:3d:5b:cc:f8:91:c1:03:6e:53:0a:76:12:d8:35:31: 5b:96:08:89:1f:d9:aa:51:3c:83:e6:44:cc:cb:5f:e1: 17:32:b2:f0:24:aa:c3:04:d4:1c:a5:32:f5:24:94:ae: 68:6f:75:41:eb:7b:23:6f:b1:a3:b7:d5:59:31:a7:8c: a0:7d:0d:e0:8d:5f:a8:fd:94:9f:2b:7b:78:1a:4a:10: 5d:fc:7e:14:85:c2:d7:f6:6f:df:32:9d:c5:d1:fb:91: 85:0a:a9:67:9b:95:57:16:a8:ac:16:38:11:c6:64:89: ca:81:5e:cb:94:ae:17:cd:0f:94:be:fa:5f:62:f1:26: d4:b8:ff:47:bc:25:88:b7:40:52:22:96:3b:f1:9b:70: 94:2c:a5:25:cb:42:34:5d:e0:8d:15:44:b5:b0:5e:cb: aa:6e:15:39:92:67:bb:3e:21:41:75:80:13:0f:90:f2: 36:84:24:10:78:a8:86:b2:f0:1a:af:82:fa:d9:b7:54: bb:06:42:37:48:3c:6f:bf:26:5b:f9:b9:86:3d:2c:ea: da:db:dd:3b:21:fe:62:15:6a:68:8b:83:3a:da:e1:b1: 7e:a9:62:a1:c2:67:56:dc:54:e6:91:54:86:f0:a6:a8: 7e:7f:85:ce:df:90:36:38:f8:76:90:58:41:c6:10:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:70:c6:7f:8a:25:04:fc:36:e7:ea:95:8e:76:b0:7f: da:78:27:fc:71:ab:0b:42:37:40:4e:dc:f6:2f:1a:87: 18:ae:57:6f:e2:e6:c8:a0:07:d6:88:26:21:12:e8:b0: d0:26:ad:80:58:34:83:e5:8f:6c:ea:28:69:df:a3:88: 45:77:bb:32:b8:de:6a:f3:fb:b6:df:19:b3:32:e6:7c: e1:b7:f0:e5:bb:eb:27:39:e4:40:e7:42:a0:0a:26:28: 2c:91:88:ae:10:bd:c0:49:69:af:a7:4b:4a:d9:8b:88: 9f:20:2d:b7:9c:d1:0e:5e:bf:7e:12:d6:f2:26:83:6d: 46:ef:a4:54:44:24:27:3e:c7:f8:9f:9f:85:24:37:ae: 0c:f4:d6:80:7d:f1:bb:fc:a8:6d:16:7a:b4:79:4e:16: fa:29:3c:24:df:9c:98:b1:8e:2f:07:4c:49:fe:a8:07: 31:dc:c9:77:88:2e:28:8e:cd:61:e9:0c:16:f8:23:29: 43:b1:0f:61:02:24:d8:9b:3a:c8:42:27:f8:da:8c:da: d9:fa:fe:af:b1:41:2a:7a:08:de:26:93:5a:42:ae:ed: 20:75:07:1a:4a:9a:77:24:0a:6c:f4:f4:86:c0:7f:59: 26:96:bf:b6:46:10:ce:8d:e2:51:4f:64:23:06:e0:b3 Fingerprint (SHA-256): FC:EB:29:0A:19:F0:6A:85:04:CF:CC:72:9F:02:93:CC:2F:E4:A0:8F:95:D9:8F:D8:D1:06:45:E5:AB:0E:DE:EA Fingerprint (SHA1): 7E:4C:4A:AE:17:3D:2E:78:9E:9B:A4:D5:FB:E5:82:D1:8D:63:A7:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #9250: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:5b:2e Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Wed May 10 12:45:39 2017 Not After : Thu Aug 10 12:45:39 2017 Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:12:df:0c:30:38:7e:51:5c:9d:c9:47:ab:23:d3:15: eb:4d:dd:3e:f3:62:d4:8c:dc:06:66:37:9a:98:27:56: 91:76:f9:3e:c5:63:e3:ce:5b:f7:cb:67:5b:a3:69:c3: 83:81:3f:10:d4:5f:7b:ee:a4:09:14:71:a6:80:aa:4e: aa:e3:eb:0b:87:44:80:a0:fa:6a:95:7a:e9:b3:cd:48: 70:a7:03:6b:f8:6a:8b:9a:ac:bc:d3:32:f3:52:8e:f6: be:ff:65:00:56:97:48:c2:bc:d1:f6:a8:da:06:ef:92: 7a:26:02:76:3b:7c:1e:b3:dc:79:be:09:52:0a:5d:8c: 12:2a:45:be:8f:78:2c:1d:c4:43:11:83:2d:16:cd:e6: 78:20:19:77:c5:16:b5:7f:de:65:6a:a2:92:e4:83:cb: 9f:19:0e:12:24:ac:f3:54:d1:d2:d1:b5:3c:ac:79:d5: 99:55:c2:30:4c:3a:cb:30:73:ec:14:42:62:66:f7:53: 9b:3b:32:d0:45:88:7d:32:7b:0a:8d:48:3e:4a:6b:0b: f2:fb:39:04:31:9b:cc:16:6c:95:7b:b2:82:76:a5:97: 27:8a:0d:e1:82:a0:99:56:a5:41:2d:9a:7a:8a:45:4e: 76:41:05:50:78:ea:0b:12:a6:5c:ee:0b:0c:e9:01:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:34:a2:44:d1:32:a2:f9:4a:38:6d:27:fc:60:74:36: 58:3e:7e:42:ab:59:d8:9d:59:fd:98:23:7c:c2:5a:b3: 74:06:54:8f:8d:8d:ea:09:bf:33:90:df:95:d6:91:7b: b4:d4:bf:e3:92:44:8c:47:9a:15:da:72:98:56:de:ae: ac:23:22:10:b9:4c:00:7f:0d:80:1b:7b:21:7c:a1:36: 13:eb:4f:45:ef:ae:85:3b:e5:ab:e7:64:56:72:4f:ba: 86:cd:1b:49:69:07:62:a1:bc:02:de:b5:00:32:ae:ec: 45:1c:c2:4f:72:75:42:68:b8:fb:f3:a8:08:07:cc:90: fb:cb:80:df:da:9d:87:ec:89:d4:0c:cc:23:1d:63:61: ad:7f:a6:6f:9f:34:8f:65:a1:40:01:1b:62:fd:f0:79: 51:ed:8b:92:22:4e:ee:ed:36:b0:9b:80:be:9d:42:a4: 52:71:30:11:96:60:44:4f:a0:53:22:54:22:67:d8:ae: e7:c9:23:9d:d7:b1:ea:b8:88:8d:cd:43:06:d3:5d:6f: 1f:2f:cb:36:24:e8:bb:15:68:a9:9c:dd:b1:e1:88:d8: ba:79:e6:1a:b9:02:fb:c6:8a:07:8e:65:0a:04:ec:9b: 2c:d2:fb:5f:26:0d:a7:9f:41:24:36:23:a8:e2:3e:03 Fingerprint (SHA-256): AA:E2:26:B9:46:40:35:20:2A:8A:33:83:60:CC:85:A3:9A:B0:72:C1:AF:CF:AC:41:C4:92:C4:00:44:89:07:2A Fingerprint (SHA1): F5:9B:E1:13:DB:78:C4:0B:3B:F1:45:9F:27:3D:00:E4:4D:4E:63:0A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #9251: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:5b:30 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Wed May 10 12:45:43 2017 Not After : Thu Aug 10 12:45:43 2017 Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:f9:cb:ea:ee:cc:6a:13:e0:d6:40:93:2d:1e:bd:94: 73:1b:4c:8d:d7:76:57:62:54:60:4b:ce:1b:92:5b:bc: c9:ae:ee:6e:71:b1:95:0c:a1:45:44:02:69:5e:0e:5e: 33:9b:57:10:0d:46:9c:81:6f:0c:d0:43:9f:36:18:06: 18:71:06:63:d7:27:ff:6c:d3:79:12:20:ef:bb:c3:86: cc:9c:82:78:6b:77:92:6c:a4:b0:44:12:06:37:d6:9c: 59:de:41:52:f3:8b:30:b0:97:0a:e3:b4:3e:2e:92:70: 04:47:2c:41:a7:da:64:3e:43:d2:0c:0f:4b:e8:79:fb: 6b:35:62:43:da:3f:61:31:1a:3e:39:74:52:fa:ad:62: 7d:36:4a:58:8f:44:05:f5:e3:c9:1c:24:94:df:50:3b: c3:cd:e5:d7:94:b6:d3:31:09:b1:a3:62:b7:31:bd:ce: e9:ee:31:cb:a7:4b:bd:37:22:a1:c3:1c:b6:36:61:33: 00:6a:27:a4:39:7b:64:e6:e9:f9:80:cb:38:69:a6:34: f4:8f:35:c2:d0:31:93:df:f0:75:0c:72:67:3d:d3:4c: 58:b0:0b:4a:f1:66:da:38:8b:4c:b2:e4:8a:e4:ff:c4: d5:7c:e1:01:17:07:54:fb:bb:ad:6b:7c:67:ad:c0:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d2:f6:8a:85:46:bf:84:15:48:76:c4:0a:58:f9:c2:3e: 9e:57:1b:bc:2d:43:92:00:58:4b:ab:16:13:57:18:14: 15:10:f0:0e:d5:74:59:98:65:ce:fa:45:4a:5c:88:56: 88:1e:46:3e:8a:c3:7b:80:f2:c0:44:c3:dd:23:4f:6f: 51:63:5c:b9:2f:67:ca:46:0e:4d:e2:7f:c2:69:31:84: 9d:da:92:32:0d:38:02:70:28:48:13:63:ac:45:23:15: 36:dd:9a:7a:32:76:6a:e0:8d:13:9a:88:f3:bd:f5:1f: c5:dc:57:6f:3d:ba:c7:79:3a:ef:ee:f2:29:01:11:d4: 53:57:76:bc:22:9c:4d:1f:f9:ec:6f:d7:c2:55:f2:e1: c3:c6:0e:ea:6d:b6:ed:19:a1:50:15:b6:07:b2:0a:4f: be:fa:02:f0:0b:69:88:08:11:95:b1:c9:94:72:e9:97: e9:20:c9:51:3c:f9:ff:c1:56:f7:41:86:6a:ae:de:6e: e9:5c:42:f3:5c:9b:78:f5:74:d0:d4:fa:1a:44:69:1d: fa:52:26:f2:6c:da:42:d2:3a:50:5b:42:da:11:5f:12: 4f:71:be:f2:ab:6a:23:e1:5f:13:30:8a:1d:34:ea:0d: e9:f3:2c:bc:9c:47:8d:a1:e4:45:a0:14:13:de:09:96 Fingerprint (SHA-256): 0B:45:0F:A5:9C:78:DB:EC:56:E9:B1:16:6A:24:F9:84:EE:D2:74:4B:21:49:19:45:18:CD:BB:5A:90:C0:F8:B2 Fingerprint (SHA1): 82:C9:61:C5:6E:57:7A:F6:39:B1:C8:AC:C8:9F:83:5C:A0:E1:B1:E4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #9252: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:5b:37 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Wed May 10 12:45:53 2017 Not After : Thu Aug 10 12:45:53 2017 Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:e1:ec:89:07:b7:6b:eb:ce:23:df:84:44:99:fd:21: 3f:00:73:39:85:9a:1d:dc:28:ef:62:63:89:3b:a2:78: 31:cd:ce:08:23:41:40:20:26:43:1a:0d:c9:63:81:e4: 6d:44:70:6e:38:f5:8f:97:56:19:0a:2a:07:81:77:7c: 92:e2:e3:04:f1:99:83:03:1b:0e:7b:ee:b8:33:80:7c: 8f:da:5b:0e:c4:97:e7:2c:a8:87:fd:54:74:68:c0:36: a5:74:3b:d4:64:f8:5b:e8:9b:38:ad:fe:2a:b3:fb:2d: 47:ad:ee:00:f6:a3:54:f3:22:fd:8a:ee:d8:5c:10:a8: 8b:1c:09:b5:c8:7d:88:c7:c7:f0:d4:85:ad:a2:59:24: 70:30:28:6d:66:44:ae:1d:b4:91:2a:c7:1b:cf:ac:2b: 4f:ca:df:66:d3:e7:9d:92:7f:33:e8:e9:23:a8:44:0c: e4:09:bb:31:95:6c:a8:0a:e1:b8:65:39:2f:0b:d6:39: fa:dc:8f:a5:db:11:2f:5d:ae:95:63:33:2c:e1:3c:66: 4e:80:f9:8f:a1:e6:12:1c:36:eb:a0:f2:41:88:8f:40: 33:30:1d:a5:4a:04:f9:cb:ba:23:04:df:c6:82:74:da: 0e:a3:e4:a6:c8:e3:8b:aa:bf:c0:e1:a4:ba:52:72:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:c0:e8:93:c2:d7:14:34:6a:d2:56:fe:aa:04:81:de: 42:85:a0:5b:2b:2a:74:6a:75:8a:9e:e3:0a:7a:5f:3f: ff:95:3a:d4:55:0a:a9:6c:0a:d7:6c:3d:92:66:7e:25: df:c8:a7:f7:dd:e4:93:5c:a9:03:18:0c:5b:4a:e1:54: f0:b7:03:e0:d4:2d:34:76:e5:e5:f4:f5:7d:8c:de:f8: e4:f9:68:4e:93:f4:dc:2f:5a:05:7d:14:65:2b:ff:46: d9:90:b2:35:d9:a2:b8:7a:4f:56:0f:82:1c:fa:1e:53: 3a:c4:e1:09:7b:27:49:37:07:06:7b:24:04:d0:c9:2c: 9e:6a:a4:1e:59:6e:b1:e6:7d:2c:64:37:c7:dc:a7:dd: c7:33:4a:fc:56:93:0f:65:40:0b:d0:51:06:1a:9f:84: e4:fa:3f:62:4a:9c:70:c4:98:6e:c5:6a:40:e1:57:0f: be:a1:57:61:e9:09:4a:38:e0:07:1d:94:08:21:89:ec: 9f:c7:34:02:25:72:ad:e9:35:c1:ed:fb:87:b6:aa:cf: 52:26:43:e6:7b:d6:3d:35:69:1e:cd:af:4c:c1:57:c9: c6:f7:21:bc:13:9f:c7:19:da:ca:59:d6:8a:0c:58:f7: 37:01:7c:30:d2:8a:a0:cf:1e:b9:b3:41:29:c4:83:b7 Fingerprint (SHA-256): A1:74:B6:8F:D5:FA:45:C3:48:80:AA:7F:36:DB:EA:F6:E1:2D:B5:96:33:12:38:5E:0F:56:33:4C:E4:E0:5A:ED Fingerprint (SHA1): 74:F7:8D:16:4C:EF:9B:65:92:1E:64:B0:48:E8:EC:8A:D1:D7:B0:CC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #9253: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:5b:4f Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Wed May 10 12:45:57 2017 Not After : Thu Aug 10 12:45:57 2017 Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ef:c2:f3:6e:74:11:c2:6f:b4:73:da:d4:ee:18:f4:18: 44:29:fe:4b:05:e6:bf:ef:2f:55:fe:dc:d8:52:20:8b: ae:40:13:e6:66:f2:67:a3:39:d4:f1:b1:1d:f5:13:6f: 96:25:d9:f5:c4:e1:78:7e:d9:74:73:f8:3a:0f:90:52: 14:34:51:97:fe:52:7a:d4:3e:6e:0a:7d:cf:ea:2b:0f: 13:c1:b7:f3:0e:50:02:89:96:26:7e:a7:86:af:7d:a3: 65:fa:b5:4a:ba:68:92:b6:83:b2:59:90:60:ec:41:e1: 92:da:6d:5e:a5:06:48:07:d2:57:ed:41:5f:b9:bc:36: 69:79:a2:73:50:21:b0:92:8d:c5:48:eb:4a:b9:b5:26: 03:37:08:67:c1:61:e3:0d:3f:37:af:6d:72:3f:b7:ff: 16:da:c1:19:bb:f0:51:15:1b:a6:11:7c:9d:a7:0e:8c: 28:45:73:2a:12:02:b7:1e:38:13:3d:69:7d:cd:fe:94: 0a:63:78:c2:6b:01:a0:5a:3e:3c:69:ed:c3:c7:39:93: 3c:07:36:b0:d2:15:b7:7b:50:9d:fa:40:06:73:1a:78: 8c:3b:08:a1:ca:57:94:cc:81:44:68:32:43:20:35:13: 47:71:99:19:45:81:f8:93:55:b0:52:13:3d:30:18:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ee:77:ee:d5:75:21:98:a4:f3:b3:99:c9:aa:0f:78:5d: 53:de:74:f5:21:8b:b3:87:34:cf:c8:2e:19:37:76:53: 0a:b5:29:01:5c:00:99:1f:9e:5a:8e:12:39:91:b6:61: f8:e7:b0:aa:c6:cb:82:c3:b6:c2:e3:02:7b:63:05:38: 47:2d:26:c6:e4:87:f5:78:30:48:d3:49:78:ea:10:ec: 16:35:c2:9a:36:84:a4:c1:74:8c:5e:2b:bf:1e:f1:9e: 3c:38:d4:1f:41:bd:08:7e:05:4f:a5:52:1c:a2:26:eb: bc:77:ad:1f:ca:66:6f:c7:ed:e6:80:d6:56:3a:9d:b6: 36:0f:f9:e2:c9:76:f8:44:ec:33:f9:c5:d8:69:b3:d4: 0f:f4:40:66:de:73:3e:2d:b3:3d:30:ed:0b:9d:a6:2d: 8b:90:8b:b8:c5:2b:76:41:ea:b0:ca:51:5c:3d:b4:d8: fe:c8:75:29:6d:a9:a3:26:c8:93:92:1b:6e:c8:02:de: 1d:31:b8:84:c2:89:e1:16:59:75:62:3f:ca:23:8b:d3: 72:b4:b2:f1:cc:bd:17:86:26:5e:71:26:70:e6:70:44: 91:ad:1a:c9:43:96:d3:d4:34:58:98:7d:a2:58:22:37: ce:e2:69:7f:14:b0:f5:98:5b:8b:08:53:f3:f5:c9:f9 Fingerprint (SHA-256): 60:6E:C5:50:50:61:38:9C:1E:97:D5:50:36:51:BF:B2:FD:4F:5B:7F:F0:52:35:96:52:D9:F5:8C:4F:8E:1C:8C Fingerprint (SHA1): A5:63:D6:2F:DE:A4:17:06:11:2B:81:86:E5:62:53:87:A8:4D:4B:FE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #9254: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:5b:52 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Wed May 10 12:45:59 2017 Not After : Thu Aug 10 12:45:59 2017 Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f2:1c:dd:bb:4c:48:a4:0b:b3:89:71:8d:89:d8:b0:24: ab:2d:13:c7:d1:c5:aa:bd:07:2e:b4:f8:fa:c7:1c:58: a4:70:44:15:6c:55:8a:cc:e1:a0:c0:9f:af:ad:c4:05: 34:ef:ff:52:de:19:59:61:47:21:a7:97:46:40:4a:0e: 41:11:a5:67:ab:54:05:31:6b:89:3c:67:6c:9a:d2:07: 51:de:7a:35:34:31:7c:33:37:cd:3d:28:92:a1:af:60: 34:0a:bf:4d:38:ed:57:2c:59:bd:e2:4c:a3:9c:d8:50: 6a:2c:31:a9:60:2b:f3:69:f5:bb:42:1c:21:04:bf:1e: 03:29:3d:d8:93:7b:b7:01:9e:18:72:ca:9f:78:e8:b1: ff:d9:e7:4b:bc:1d:37:88:41:a8:de:77:ca:ee:d5:e8: 40:08:ca:fe:16:4c:83:fa:d9:6b:d7:df:8b:1a:ce:20: 43:2f:ad:f5:fd:0c:fb:8e:71:50:d2:f6:9b:76:67:50: f1:ba:e5:2a:07:77:b4:68:7a:14:28:cd:49:d9:4d:13: 4a:83:e8:3a:84:1d:e5:06:55:a5:76:e1:c9:5c:f6:ab: b5:88:aa:c5:82:d9:a6:75:39:db:67:43:40:5f:bb:d5: b9:3f:fb:37:97:5f:cd:92:f9:93:66:e5:09:08:25:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:d5:b0:91:69:1d:d6:b6:b9:e2:1e:28:01:e5:fe:47: 2d:7f:1b:25:0d:7d:8b:28:c3:85:b1:f8:92:b6:4e:ae: 07:b8:b1:bb:29:61:84:58:ea:e5:4e:0f:4c:5e:03:c6: 8a:84:cd:e7:74:2a:26:00:bf:da:66:94:82:4c:fd:e3: 90:01:98:2c:27:a7:3e:76:48:76:40:14:87:3a:b3:10: d8:b2:2d:cd:4d:76:15:53:1a:b8:ab:47:5c:ce:12:9f: d9:a9:4f:cd:ef:72:ac:45:e7:64:8e:df:33:a8:09:45: 8d:32:6c:4e:4a:aa:58:5c:b8:31:7b:c0:44:99:3a:75: bd:9a:84:e3:91:c5:24:07:99:27:76:d3:98:bd:a0:81: db:10:38:9b:c7:b3:85:5e:05:eb:76:02:17:41:91:c0: ac:b9:fb:36:f2:e0:93:03:20:af:ba:03:60:95:9a:54: b6:ba:49:0a:d7:eb:0f:8b:15:23:b1:06:ce:52:aa:cf: 57:ca:99:20:82:3e:f0:36:46:7a:23:61:f6:94:12:6e: ea:57:0a:30:8c:85:fc:80:55:cf:7c:4d:49:33:79:a4: 45:74:e8:ae:a8:16:77:50:1e:15:3e:e3:8b:2a:f9:98: cf:52:61:9a:6d:d4:66:2b:ae:e5:ef:d9:55:85:a8:2b Fingerprint (SHA-256): 7A:89:8D:31:D6:21:BE:35:72:ED:B2:DC:C0:8D:E5:F0:42:CB:B7:F0:50:4C:15:CD:9C:AE:D7:7F:DE:CA:66:40 Fingerprint (SHA1): D2:1B:1B:DF:F9:54:B0:0C:27:6C:AA:CF:E0:DD:1B:F7:75:35:00:3E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #9255: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:5b:56 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Wed May 10 12:46:01 2017 Not After : Thu Aug 10 12:46:01 2017 Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:dd:ad:a6:ed:53:79:ca:cc:76:16:0e:78:ff:b8:dd: c1:15:bc:44:d2:32:a9:48:32:60:7e:1d:6e:54:bd:b0: 92:09:95:1a:73:bc:6e:7b:28:1f:bf:f0:9c:85:1b:b2: 9f:11:af:72:d8:32:50:5f:d0:6a:f9:66:b6:17:87:fd: 5b:b3:67:4e:02:cb:54:d8:5b:63:a8:30:6c:6a:06:5c: a8:0f:71:e8:2b:be:cd:d0:18:bf:17:ca:16:41:39:3c: 56:dc:0b:d8:6a:41:47:21:aa:50:48:9a:b8:18:39:92: 8f:56:af:74:33:98:e4:bc:22:8e:b3:24:d2:8a:cd:30: 15:dc:7e:90:b6:12:9a:4d:99:19:0b:f8:83:51:e4:f4: bd:a9:d3:9c:00:c7:23:7e:36:91:f5:71:87:39:31:17: 3c:4b:56:88:5d:6c:17:66:5f:76:3c:8a:eb:b1:a1:f5: f7:74:e2:c7:22:0a:dc:ae:85:1b:65:30:c1:00:32:1f: ec:44:18:cc:1a:01:c6:68:e9:1b:f1:66:8b:43:fb:2b: 86:c9:72:51:e9:14:0b:6a:bf:4b:04:59:d5:f3:6f:66: 47:47:ee:9d:25:28:85:fd:c7:6a:1d:9f:50:2a:cd:b9: 32:34:74:75:18:80:10:84:01:72:0b:80:9a:a7:3f:1b Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:25:56:4b:a2:6b:01:5c:9f:c9:e1:0f:9c:1f:7b:ef: 6a:9b:b3:75:49:66:14:ec:14:f1:f2:91:0b:3e:f8:f2: 6e:73:40:21:a3:f3:23:3d:91:95:8a:b1:68:d5:5f:c0: 6d:a9:ff:f7:50:19:0c:d8:ca:2b:f4:ce:e5:c3:ae:9a: fc:e5:72:22:1d:00:d2:ac:29:04:4d:ab:80:b7:b8:25: 2a:12:6d:59:ed:43:c2:fb:ed:7c:b1:f5:ec:92:6f:98: f7:37:20:69:7d:b5:78:84:74:10:c9:07:d8:5f:25:6b: fa:d8:c7:62:21:09:b3:21:ca:7d:34:00:9a:6c:63:9d: d2:18:76:0d:3c:10:96:6e:aa:f6:48:db:ac:8d:34:2d: 9d:6a:52:06:1b:6f:d0:3e:00:6b:4b:cb:68:44:ba:13: 22:ce:c5:44:8f:3b:9c:51:a8:82:89:43:a4:ec:f4:02: 99:ff:dc:dc:79:26:e6:b2:f7:2f:bb:bb:eb:41:9f:c5: 51:7f:f9:96:41:ac:a6:c6:92:eb:f2:93:4b:4a:61:00: fc:44:b7:70:5f:25:96:79:c6:25:45:3f:06:bf:11:11: b7:6f:fd:94:f4:e0:24:ac:ec:e7:b7:21:ad:05:f5:ab: 2c:2b:c4:8e:e9:bb:81:08:34:dc:90:a1:f4:7e:5f:c1 Fingerprint (SHA-256): 21:7D:AA:2D:8D:04:1C:69:47:41:9B:63:1D:E7:C8:B0:DE:B7:82:54:C8:BB:23:84:08:5E:5F:57:6E:27:CD:2A Fingerprint (SHA1): E9:9B:64:C2:A4:64:D3:0B:D4:F6:9E:D7:8F:99:0A:0A:37:38:69:31 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #9256: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:5b:59 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Wed May 10 12:46:03 2017 Not After : Thu Aug 10 12:46:03 2017 Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:70:d1:ba:fe:7b:2d:66:71:a7:1a:30:38:92:40:d3: 04:7a:bf:e4:49:6e:ab:9f:ae:8b:87:6e:fe:19:98:79: d4:61:bc:1d:52:ba:67:85:81:a7:72:21:60:34:03:8a: 5c:33:b3:ee:bd:17:49:f0:94:40:48:13:00:63:5e:39: 52:ad:4a:24:c9:52:00:a9:f7:ac:9d:c7:20:c9:9c:5d: 78:e0:76:cb:9e:7a:0b:1a:a0:07:7e:73:0f:7a:c2:33: 2c:ff:29:73:16:71:54:b3:fa:d2:b5:5c:8a:15:2f:74: fc:04:41:99:17:d4:7e:7f:9b:90:14:14:91:e9:6f:dd: 15:78:d3:a8:cc:93:b2:5a:ce:e8:01:25:38:b0:16:78: c6:30:78:bd:1a:11:f3:53:d5:0a:25:7a:34:0a:b2:03: da:4a:8a:87:4b:09:49:e6:6f:15:9b:97:35:13:65:fb: 0f:1b:cd:b3:47:39:46:7f:6c:a5:8a:a4:b1:2c:38:94: 47:32:43:1f:91:04:f5:ec:50:00:16:bd:0f:00:90:fd: 22:ce:be:72:4e:e8:89:c5:1f:ee:c7:47:9d:35:23:da: 1b:34:8f:6a:08:aa:85:95:b5:16:c0:33:e6:12:5c:94: 35:e5:dd:ad:75:e8:f1:a3:ee:90:96:3b:5e:ea:76:6b Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:2b:e1:4f:7d:38:4b:38:14:1e:d3:7b:68:70:5a:75: 49:52:a9:45:d2:39:43:d7:09:af:13:8f:ec:87:1f:e9: 7b:b6:5f:6b:5d:c0:54:e6:f6:96:24:3f:f2:6a:cc:ad: 13:6b:0a:75:7a:77:00:a0:40:7a:6b:fd:5a:5f:49:55: 7b:8d:a7:fd:ad:7a:88:5f:1e:c0:27:c0:a2:68:d3:53: 6e:3b:8c:90:70:6b:0b:e2:11:5d:99:a0:55:07:ff:ce: 4e:fa:d1:90:df:fd:b4:3f:38:f7:f9:a3:af:8e:23:c8: 36:85:88:45:73:fb:ea:0b:7f:88:c3:44:06:b1:3f:11: d7:22:ed:18:6c:98:ee:86:d3:76:59:38:2d:da:ad:46: 6a:68:e2:3d:da:40:0a:d8:dc:94:b7:af:59:3f:eb:a2: 63:0d:e2:4b:ea:8e:31:80:a0:39:e0:07:0e:6e:61:7f: 50:97:9e:11:c9:df:61:a0:5a:fa:eb:14:2f:da:6a:55: 02:cb:46:9a:c2:c2:47:a0:90:db:19:a9:23:d4:3a:9f: 92:fc:6b:db:d3:5c:f5:b6:2c:95:c7:24:60:61:72:39: 1b:da:fa:ca:8c:5c:09:4a:2b:16:1d:7f:cf:51:33:3c: 22:34:7e:9f:d7:58:2f:70:ad:aa:26:29:ca:89:7b:79 Fingerprint (SHA-256): 71:36:CD:89:B6:C1:79:76:A9:C6:C5:EC:78:47:20:DB:CE:47:69:2C:A7:7E:CC:B2:71:D5:0C:A7:89:35:F2:39 Fingerprint (SHA1): 25:E4:59:36:01:88:A8:9D:12:EF:A4:26:43:83:2F:FF:78:1C:7F:03 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #9257: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:5b:5d Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Wed May 10 12:46:06 2017 Not After : Thu Aug 10 12:46:06 2017 Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:be:fa:80:c5:05:ed:cf:d6:52:a7:99:49:cd:06:90: 5e:bf:bf:ff:e5:ea:c6:4f:06:ee:bc:18:b9:3d:e9:2a: 94:45:e2:be:67:60:cb:c6:31:23:f7:70:63:d4:fc:e7: 18:34:e3:33:f8:7d:ae:94:7e:be:da:5f:60:3b:85:50: cf:20:30:dd:99:f3:97:77:ae:36:e8:8b:51:3f:ed:c5: 4b:4d:1c:1a:15:8e:bf:49:ab:21:6a:a8:bf:14:df:97: 96:39:d1:52:94:43:b7:33:e6:2d:bc:99:0c:a1:15:2d: da:0b:f1:69:54:49:69:b8:ac:80:bb:ad:aa:c2:ca:f8: d8:84:51:d5:e2:12:cc:a8:ed:ed:d1:2a:07:dc:17:a7: ce:8b:91:8e:e9:e7:a9:04:19:fe:aa:b3:2f:57:a4:33: e6:65:bc:ef:8a:12:fe:9a:10:3b:ca:7f:9b:e9:40:e9: 50:4a:2e:19:5a:19:16:85:bf:11:bc:41:df:7e:0e:d4: 22:2f:de:19:43:41:88:79:35:fc:b8:3e:77:78:74:91: af:50:79:03:fb:19:6c:58:49:1e:da:25:3d:49:7d:d4: 06:03:17:1b:a9:ab:8e:9c:2a:f5:ea:ad:6e:0f:bd:a3: 69:b4:59:63:55:7b:1f:4a:1b:29:1d:db:ef:cd:78:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ae:1b:35:d4:63:76:48:5f:b7:fd:fc:f4:78:c1:d3:62: e8:de:9e:3b:a2:74:ea:61:81:52:a5:dd:0e:6c:e8:3b: bd:e8:89:9b:b4:aa:fb:ea:14:7d:fc:d6:bb:c7:d7:3f: 4b:aa:f9:39:b0:da:40:4d:93:06:be:31:cb:e6:5c:84: 88:69:16:a6:37:64:47:87:8e:f2:b0:93:dd:51:99:66: e3:45:0c:c5:71:bd:cf:b3:21:74:5e:ab:63:6b:4f:e9: 9d:47:24:c4:63:da:d7:66:fe:1e:3b:fa:6d:b5:14:9c: 76:1f:2f:03:e3:39:5a:44:50:fe:8b:c8:bf:ce:4a:0f: 06:d1:03:a0:a6:45:d4:8f:e4:b7:86:27:f6:ef:d8:b3: cb:c0:ce:13:25:50:e9:93:a1:93:36:c3:b0:6c:fd:09: ad:4d:73:17:6c:9f:d5:e9:7d:c1:ce:6b:0b:57:32:81: e9:f9:08:ce:c3:58:ac:52:5e:33:da:02:30:5f:45:e2: 74:38:e4:0e:9a:a0:05:99:cd:6c:f6:ad:ba:f0:d1:2b: 5a:a3:26:10:8b:52:9c:79:6c:08:15:fd:f4:43:c1:50: 9d:8f:8b:b2:6f:19:49:f5:44:51:ca:72:e4:33:5b:3f: 28:ca:83:a3:1e:7f:0e:c1:de:5d:d6:6a:79:f4:3e:5b Fingerprint (SHA-256): 21:7F:E2:9A:B0:9F:31:4E:AA:85:11:4C:8D:EC:74:3F:A0:7E:95:26:C5:90:30:07:91:74:C8:E6:4C:3B:B0:CD Fingerprint (SHA1): 51:43:B9:52:3A:CE:ED:62:78:72:6F:17:46:CD:4C:84:F3:4D:95:36 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #9258: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:5b:63 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed May 10 12:46:08 2017 Not After : Thu Aug 10 12:46:08 2017 Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:4b:85:66:54:7a:c3:7b:f5:c2:6e:1d:21:1c:c4:2e: 74:3c:a3:0b:df:4f:84:d6:f7:b6:63:89:21:72:46:35: 8a:1e:e9:7f:86:fc:1a:bd:8d:3b:57:1e:cb:40:2c:0c: 7c:de:64:ee:d9:94:30:89:7f:f5:62:e2:23:63:34:72: 4c:f7:51:dc:80:92:49:37:cf:0f:04:94:09:15:ca:4d: 5b:3a:f5:d7:c4:cf:67:0c:37:58:9f:33:93:fc:8b:e9: 47:3e:43:ef:95:4e:ce:7d:8f:71:43:2e:e1:27:de:d6: 6c:31:90:88:af:8b:d6:2d:ce:e8:29:f3:e4:bb:f8:37: 7d:7f:af:1b:0a:ae:62:8a:72:83:9b:3f:31:d6:2f:5d: f9:be:62:74:5d:80:99:2f:9e:bd:63:11:c2:47:a4:90: 3c:94:3e:14:85:59:ee:21:ee:75:28:a9:32:66:0a:e7: 7e:1a:a4:63:57:4b:59:b8:89:a4:ce:42:45:82:c4:dc: b0:e3:4e:6f:3f:d2:68:ae:ec:a6:59:1b:45:28:58:9c: b3:e4:c7:4c:5c:19:80:be:d9:13:8d:66:8d:7c:ff:27: d3:c6:dd:54:52:8e:e1:6c:80:d1:6d:e3:9e:6d:9c:f4: d7:fa:25:d6:51:21:0f:e9:80:3c:a6:27:7f:d4:6f:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:c4:1c:b3:99:fc:bc:d2:8a:1e:cf:84:61:63:11:1d: 1d:ca:57:65:21:98:6f:d7:60:eb:3e:e2:42:d7:55:e8: 3a:b3:70:ed:ad:3c:eb:7f:30:00:23:30:66:0d:c6:3e: 9d:45:57:c4:44:52:ba:b6:09:2c:54:68:34:14:63:40: fb:76:b2:14:18:63:65:f9:11:ad:fc:9d:67:c1:a3:8e: 02:33:e6:ad:06:65:e1:95:64:8b:42:93:5f:fe:7f:4c: e5:6b:35:7d:8e:d6:13:0d:0e:f5:c7:95:0f:92:43:db: f3:ac:10:60:d6:1e:a5:c4:d9:f4:13:7f:87:4d:06:5e: 9c:9c:b1:47:e5:cd:5a:ab:ea:71:88:90:67:72:d7:82: bc:9e:a3:e6:74:75:6c:99:7d:ad:f1:fd:24:71:9f:b8: 9f:24:3d:32:60:e5:07:1e:13:cc:c6:55:20:fb:5a:24: a1:48:49:b0:ec:eb:a8:33:5a:5e:39:13:21:28:a7:00: 8b:c9:81:54:c5:5c:e0:d2:16:75:a4:7e:d9:46:09:45: c7:1f:3c:0b:ed:d4:4c:85:fa:35:38:4f:dd:e3:fd:f4: c0:41:42:8f:ca:fb:1f:13:6e:2a:65:be:1c:07:0b:82: a4:05:ab:12:7f:98:15:2b:35:00:76:93:65:fe:c1:1c Fingerprint (SHA-256): EB:DE:BA:72:A8:A6:6C:D0:BE:4D:64:E8:03:91:EE:A0:81:F5:F1:F6:FF:30:5B:75:5B:C9:9B:34:E0:19:29:3D Fingerprint (SHA1): 96:9B:F0:A2:CA:AA:2D:00:13:DB:98:DF:CA:43:99:A9:92:3D:45:93 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #9259: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:5b:67 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed May 10 12:46:10 2017 Not After : Thu Aug 10 12:46:10 2017 Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:20:85:42:e8:88:75:ae:85:10:ec:88:fa:18:1e:88: b3:c1:e4:53:f0:39:41:1a:18:8e:8e:4e:e6:a9:16:cd: 3f:f7:27:4c:6c:bd:ad:90:47:cb:49:96:90:e3:71:a7: 3d:46:a9:b6:2a:3b:06:1e:b2:72:a6:7a:8c:91:a5:47: 78:41:77:8f:1c:70:13:3f:fb:2c:c4:1b:0d:23:44:bc: bb:f8:e3:50:9b:bf:1d:29:d5:a2:c7:85:1d:cd:2a:e9: 98:2b:09:0a:c3:a2:e5:53:27:43:4a:6f:ff:67:22:53: 57:3d:a4:3d:e7:56:70:2c:c7:05:bb:42:4b:4e:84:2e: 78:5d:0d:9e:d9:a5:5d:56:3c:99:15:fb:78:e5:c8:e7: 52:fe:01:94:ad:19:44:d5:cb:12:a9:00:17:5a:f0:19: a4:6c:43:56:09:e6:4b:52:9c:1e:b0:3b:35:0e:ae:f6: 09:fc:9c:9d:3a:22:9b:23:d7:c3:14:28:90:3e:cb:96: 97:9a:e9:b5:09:44:28:cf:49:3f:02:2a:80:3f:13:29: 66:d8:0c:50:ae:25:5e:03:e2:15:df:de:c1:92:37:64: e7:5d:ca:c6:4b:fd:5e:b2:54:b1:95:bd:f1:7f:bf:2a: c1:a1:d7:14:0e:ec:40:5a:44:36:7f:36:b6:2b:e7:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:f4:ef:0e:65:e2:3b:d6:fb:37:90:6b:f5:29:df:9f: 23:d5:37:0c:52:05:71:4f:7d:1c:49:1f:88:dc:42:cb: f1:cf:da:44:9d:d5:8a:b7:85:ff:eb:09:3f:d9:ca:12: 39:34:d1:a6:fb:51:ca:db:13:a6:45:f0:94:2d:d4:82: f8:10:73:d1:32:96:d3:3d:ce:77:c3:08:a7:9a:94:5f: c0:10:72:fd:3d:bd:a7:a2:f5:a3:63:ef:fe:9c:ba:3c: 63:ff:7e:f4:b0:17:f8:03:cf:b9:34:35:9e:e2:88:f2: f3:33:ae:d7:c9:86:bf:91:46:09:8e:2c:d7:d9:8a:9a: 05:5a:d4:e9:7d:a5:6e:c7:36:e3:8c:8f:94:30:b2:fb: 44:b7:28:e0:bd:83:41:16:79:ab:47:cc:c4:46:cb:30: 55:41:54:58:04:4f:ea:da:5e:45:64:cb:c5:fe:19:15: d7:e2:c0:7c:87:1a:fb:94:0e:be:31:ed:ac:b6:65:45: 3a:64:0b:ee:7e:5e:0e:43:46:ec:62:24:1f:d7:7e:69: 42:20:a4:7f:3b:8e:e4:65:dd:7a:e0:73:d8:58:82:16: 3f:1b:76:4b:27:68:be:72:1c:be:28:cf:cc:e9:80:b8: 43:d9:e6:b6:1a:cd:d7:45:3d:7f:2d:f9:68:8f:3c:f5 Fingerprint (SHA-256): D0:1B:20:7B:DD:53:0C:4F:BB:4D:A3:A4:E6:84:DE:61:A7:24:54:12:2B:4C:CD:75:58:DB:93:4A:3C:FD:D0:EF Fingerprint (SHA1): 2A:9B:02:B8:2D:68:C8:43:A2:07:67:D0:71:ED:FD:55:F2:07:6B:19 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #9260: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #9261: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #9262: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #9263: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:5b:71 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Wed May 10 12:46:16 2017 Not After : Thu Aug 10 12:46:16 2017 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:b6:8c:bc:c4:aa:38:83:97:57:70:55:da:ac:23:98: 67:f9:aa:3e:97:f6:14:6d:e5:65:4f:03:af:b3:a4:3c: 02:cf:f1:65:84:fa:12:36:ae:a2:f3:86:d6:73:da:24: b6:db:43:70:7a:45:99:4f:10:ea:a8:50:a7:00:a2:5e: e9:26:ff:89:16:58:ee:9c:85:1a:b8:1a:7f:fd:61:e2: 6a:18:c8:a7:4c:2b:94:37:fc:c3:64:30:10:40:43:b3: 3c:ad:2b:67:4f:1c:cb:ef:27:36:a4:de:21:84:b9:36: af:8c:fb:37:bd:4b:a8:1d:2d:92:92:2e:e9:8c:f6:b7: fe:5f:03:e5:41:b1:ea:53:08:dc:d5:86:2d:35:84:e9: 75:76:8d:9f:7b:fc:fd:b1:c6:d4:47:39:bd:f9:43:e8: 10:73:34:8a:0c:c2:99:33:22:4f:5c:19:d3:e4:01:96: ae:d6:e7:8e:89:8a:ec:e4:ab:f6:20:30:4a:f2:52:eb: 4e:f4:e0:d4:8c:45:0d:3b:5f:ab:b4:4d:08:17:ef:49: 07:14:17:92:3a:dd:ff:80:05:ca:84:3f:f4:c5:44:18: fb:7c:d2:c9:34:dd:4b:5b:7a:31:dd:f5:08:cf:7a:c4: bb:45:63:bb:47:3b:0f:28:33:f9:85:47:98:50:03:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:fd:6b:f1:04:e2:ca:4d:eb:70:0c:b9:23:6b:8b:36: 67:63:7c:08:2d:c0:6f:fd:32:ad:4b:41:ac:4d:e1:1a: 70:21:b7:2d:49:cc:62:c8:29:97:26:f7:21:4c:fb:6d: 5b:ca:29:7d:7b:59:37:ea:97:dc:21:48:d1:3c:c4:26: 65:56:ed:a7:dd:51:55:44:16:f4:5e:9f:b9:56:58:7e: 8c:7f:53:5d:4d:38:9b:de:c5:4e:65:18:70:8f:23:e5: 61:e8:3d:e3:c0:54:e0:e2:15:b1:dc:65:50:27:62:d8: b9:26:0d:d3:a3:2b:ed:72:1e:f9:b3:46:ef:b9:f1:b0: b7:03:d8:80:29:bf:7f:7a:57:a5:cf:50:27:d0:28:0d: db:b6:a6:59:8b:84:2d:29:36:43:4e:2d:48:2c:d2:ab: eb:2f:5b:97:4a:2e:ef:d4:26:99:86:64:4a:9a:b4:b9: b4:60:01:8c:ed:8e:99:af:b1:98:f3:7c:42:50:fd:3d: a0:5c:bb:36:16:94:8f:6d:e2:e2:b1:20:9e:68:89:fb: c9:09:58:2f:d1:0e:7f:43:2a:34:3a:ee:c4:0c:90:1b: 39:c0:65:53:30:57:bd:47:6d:a5:9e:5b:4c:72:7c:ce: d3:e7:0d:3f:57:7f:76:59:d8:27:dc:10:79:52:7e:f8 Fingerprint (SHA-256): D9:F2:92:AC:AB:A5:64:82:A0:11:44:D2:A7:CE:69:7A:BA:12:C0:F3:55:33:45:8D:E4:0F:AE:C2:41:73:07:2F Fingerprint (SHA1): 67:BA:EB:F3:79:C2:57:13:C4:4A:49:4A:10:A4:FB:C2:5A:0C:02:FC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #9264: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der cert.sh: #9265: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #9266: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #9267: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der: error 0: Success cert.sh: #9268: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der: error 0: Success cert.sh: #9269: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der: error 0: Success cert.sh: #9270: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #9271: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a9:e5:5b:7e Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Wed May 10 12:46:22 2017 Not After : Thu Aug 10 12:46:22 2017 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:d0:c7:44:74:20:f1:a0:a8:ff:81:7c:29:fa:c4:ae: ac:67:42:7e:f3:4e:14:ca:a7:bd:df:13:61:c4:12:b7: ee:b2:13:71:de:a5:af:73:70:15:50:01:8a:5b:94:47: e3:c0:58:41:c0:28:64:f4:85:fd:af:13:87:be:bc:dd: c5:64:22:c4:db:04:a4:73:b4:2a:fe:c7:90:8f:2b:51: 19:ac:81:4c:90:0f:64:06:0c:30:37:4f:01:e1:0b:5d: d6:2e:ad:39:be:da:62:d6:89:14:3f:77:ea:b8:45:1f: b1:18:70:4a:7a:64:6b:84:0c:03:db:09:e4:e7:51:f9: ab:e7:77:d0:1b:93:3e:d9:43:0d:78:fe:76:ee:2e:b9: ad:f1:83:76:84:e4:20:ca:7d:83:0f:7f:b1:fd:1c:b0: 70:50:97:42:f9:00:17:fb:df:f9:58:ae:55:64:10:84: 5b:55:ec:12:de:b9:bc:fb:9e:54:1c:f0:37:ee:bc:48: 33:99:03:69:05:85:d2:5f:b9:eb:ed:42:16:7d:c9:9b: 1f:d3:8c:e6:f9:9c:51:b1:57:f3:f2:e5:66:41:20:fe: a3:4c:f6:0b:a6:a2:c5:10:21:6e:ae:81:99:db:f9:7a: a8:d5:cb:b4:03:5f:79:65:42:9f:67:f6:60:9f:88:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:de:d7:2f:34:5d:0c:d6:a1:1f:cf:68:91:32:9e:ae: b0:62:b6:66:b5:45:19:fb:1f:31:3d:b1:7d:ff:d2:76: 18:9e:93:ea:8f:8b:e5:e9:46:c9:5c:ff:4e:b0:42:0b: a5:76:1d:03:cc:8e:c8:0d:40:a4:7a:80:9d:e6:1d:46: 0f:20:d7:02:eb:16:e2:da:86:35:47:fe:28:2e:d1:42: 22:ef:35:a5:6f:01:24:26:9b:9d:a9:2b:76:45:92:b1: 28:b0:e0:e9:5b:ea:c6:30:0e:35:c3:ac:19:3d:1e:d1: b6:ae:38:30:31:08:b4:31:f1:e8:49:dd:d1:fb:05:a4: c6:13:79:a5:28:0b:23:ee:4a:be:6f:9b:69:7d:41:e6: 9a:09:1e:e1:b2:44:cd:02:5c:ce:3f:4a:25:0c:05:aa: c7:64:bb:13:b9:58:d2:46:1d:28:25:1c:06:1b:17:fa: 7f:ec:18:4b:89:bc:0f:ef:80:f9:e5:46:f3:be:7c:cf: c6:30:2e:4c:6e:ed:18:58:46:2f:d7:50:0d:76:7e:f2: 49:e7:5f:fa:0e:7e:79:7f:5b:2c:aa:3e:27:f2:79:69: cf:16:0a:61:22:aa:ea:51:d0:78:41:78:5e:18:c3:9a: 44:1c:93:f2:bc:5f:51:3f:89:42:4f:6b:52:ff:31:f6 Fingerprint (SHA-256): 73:16:C4:61:D6:16:FB:93:1B:76:1F:9C:21:48:9B:4E:E5:C4:A6:BD:5E:C3:6D:F6:05:3C:38:8E:EF:62:7B:52 Fingerprint (SHA1): 75:DC:26:32:E4:8F:F4:A2:DE:18:9B:FD:A8:0F:F2:D7:15:A9:24:98 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #9272: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #9273: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #9274: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.pw cert.sh: #9275: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #9276: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #9277: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/dbpass -o root.cert cert.sh: #9278: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #9279: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9280: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #9281: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw cert.sh: #9282: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #9283: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA.ca.cert cert.sh: #9284: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #9285: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #9286: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9287: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #9288: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9289: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9290: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #9291: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9292: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9293: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #9294: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9295: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9296: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #9297: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9298: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9299: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #9300: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9301: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw cert.sh: #9302: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #9303: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/CA -o root.cert cert.sh: #9304: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #9305: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9306: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #9307: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9308: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #9309: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #9310: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #9311: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #9312: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #9313: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #9314: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #9315: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #9316: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #9317: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #9318: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #9319: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #9320: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #9321: perform selftest - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9322: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #9323: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9324: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9325: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #9326: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9327: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9328: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #9329: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9330: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9331: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #9332: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9333: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9334: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #9335: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9336: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9337: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #9338: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9339: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9340: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #9341: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9342: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9343: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #9344: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9345: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9346: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #9347: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9348: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9349: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #9350: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9351: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9352: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #9353: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9354: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9355: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #9356: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9357: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9358: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #9359: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9360: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9361: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #9362: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9363: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9364: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #9365: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9366: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9367: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #9368: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9369: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9370: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #9371: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9372: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9373: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #9374: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9375: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9376: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #9377: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9378: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9379: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #9380: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9381: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9382: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #9383: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9384: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9385: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #9386: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9387: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9388: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #9389: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9390: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9391: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #9392: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9393: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9394: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #9395: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9396: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9397: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #9398: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9399: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9400: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #9401: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9402: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9403: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #9404: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9405: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9406: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #9407: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9408: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9409: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #9410: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9411: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9412: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #9413: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9414: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9415: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #9416: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9417: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9418: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #9419: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9420: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9421: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #9422: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9423: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9424: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #9425: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9426: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9427: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #9428: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9429: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9430: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #9431: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9432: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9433: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #9434: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9435: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9436: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #9437: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9438: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9439: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #9440: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9441: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9442: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #9443: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9444: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9445: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #9446: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9447: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9448: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #9449: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9450: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9451: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #9452: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9453: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9454: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #9455: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9456: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9457: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #9458: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9459: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9460: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #9461: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9462: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9463: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #9464: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9465: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9466: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #9467: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9468: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9469: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #9470: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9471: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9472: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #9473: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9474: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9475: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #9476: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9477: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9478: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #9479: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9480: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9481: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #9482: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9483: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9484: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #9485: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9486: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9487: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #9488: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9489: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9490: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #9491: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9492: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9493: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #9494: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9495: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9496: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #9497: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9498: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9499: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #9500: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9501: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9502: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #9503: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9504: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9505: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #9506: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9507: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9508: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #9509: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9510: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9511: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #9512: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9513: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #9514: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #9515: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #9516: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #9517: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #9518: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #9519: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #9520: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #9521: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #9522: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #9523: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #9524: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #9525: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #9526: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #9527: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #9528: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #9529: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #9530: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #9531: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #9532: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #9533: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Wed May 10 12:48:03 UTC 2017 Running tests for dbtests TIMESTAMP dbtests BEGIN: Wed May 10 12:48:03 UTC 2017 dbtests.sh: CERT and Key DB Tests =============================== --------------------------------------------------------------- | test opening the database read/write in a nonexisting directory --------------------------------------------------------------- certutil: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #9534: Certutil didn't work in a nonexisting dir 255 - PASSED dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtest: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #9535: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED --------------------------------------------------------------- | test force opening the database in a nonexisting directory --------------------------------------------------------------- dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtests.sh: #9536: Dbtest force succeeded in a nonexisting dir 0 - PASSED --------------------------------------------------------------- | test opening the database readonly in an empty directory --------------------------------------------------------------- tstclnt: unable to open cert database: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #9537: Tstclnt didn't work in an empty dir 1 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/emptydir database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/emptydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #9538: Dbtest readonly didn't work in an empty dir 46 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/emptydir dbtests.sh: #9539: Dbtest logout after empty DB Init has key - PASSED dbdir selected is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/emptydir dbtests.sh: #9540: Dbtest password DB Init maintains needlogin state - PASSED certutil: could not find certificate named "xxxx": SEC_ERROR_UNRECOGNIZED_OID: Unrecognized Object Identifier. dbtests.sh: #9541: Certutil didn't work in an empty dir 255 - PASSED --------------------------------------------------------------- | test force opening the database readonly in a empty directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/emptydir database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/emptydir/key3.db" does not exist. dbtests.sh: #9542: Dbtest force readonly succeeded in an empty dir 0 - PASSED --------------------------------------------------------------- | test opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_READ_ONLY: security library: read-only database. dbtests.sh: #9543: Dbtest r/w didn't work in an readonly dir 46 - PASSED certutil: could not find certificate named "TestUser": SEC_ERROR_UNRECOGNIZED_OID: Unrecognized Object Identifier. dbtests.sh: #9544: Certutil didn't work in an readonly dir 255 - PASSED --------------------------------------------------------------- | test opening the database ronly in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir/key3.db" does not exist. dbtests.sh: #9545: Dbtest readonly succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | test force opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir/key3.db" does not exist. dbtests.sh: #9546: Dbtest force succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | ls -l /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir --------------------------------------------------------------- dr-xr-xr-x. 2 mockbuild mockbuild 4096 May 10 12:48 /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir -r--r-----. 1 mockbuild mockbuild 1221 May 10 12:48 /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-dsa.cert -r--r-----. 1 mockbuild mockbuild 1424 May 10 12:48 /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-dsamixed.cert -r--r-----. 1 mockbuild mockbuild 578 May 10 12:48 /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-ec.cert -r--r-----. 1 mockbuild mockbuild 705 May 10 12:48 /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-ecmixed.cert -r--r-----. 1 mockbuild mockbuild 870 May 10 12:48 /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir/TestUser.cert -r--------. 1 mockbuild mockbuild 233472 May 10 12:48 /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir/cert9.db -r--------. 1 mockbuild mockbuild 131072 May 10 12:48 /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir/key4.db -r--------. 1 mockbuild mockbuild 623 May 10 12:48 /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir/pkcs11.txt -r--r-----. 1 mockbuild mockbuild 393 May 10 12:48 /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/ronlydir/req --------------------------------------------------------------- | test creating a new cert with a conflicting nickname --------------------------------------------------------------- /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/conflictdir certutil: could not add certificate to token or database: SEC_ERROR_ADDING_CERT: Error adding certificate to database. dbtests.sh: #9547: Nicknane conflict test, could not import conflict nickname 255 - PASSED --------------------------------------------------------------- | test importing an old cert to a conflicting nickname --------------------------------------------------------------- Certificate: Data: Version: 3 (0x2) Serial Number: 40 (0x28) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:55 2017 Not After : Tue May 10 12:44:55 2022 Subject: "CN=Bob,E=Bob@bogus.com,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:40:42:c1:53:6c:d8:3b:e4:fa:e8:cd:18:c2:30:70: 79:bb:70:e8:bd:7e:a5:e3:c7:9f:fb:57:5d:64:5f:25: d5:ca:65:15:75:5e:8a:12:55:e0:ab:4a:69:1f:59:cd: 7a:69:42:50:2b:f4:f5:73:7b:ea:16:f2:02:c4:55:27: d4:50:6e:7d:09:f4:7b:fc:3c:f4:fe:c3:c2:5a:2c:9b: df:a9:04:08:35:fc:b7:17:9c:d9:9a:fe:ad:9d:9f:e3: 5d:60:6a:98:66:93:1a:bc:29:00:b0:b9:7c:c5:97:9f: 32:c4:3e:50:e6:4f:e0:84:ec:62:75:3b:a8:ff:0b:1a: 3b:9d:8a:27:5e:d2:5f:19:b8:a8:96:a7:fb:53:eb:24: 34:4c:0f:15:2e:f9:59:b2:47:14:1a:f2:99:d0:6d:09: 27:5f:b2:93:88:c2:1d:9e:29:4c:b7:40:4f:b9:ac:06: 8b:d3:78:b7:2e:73:45:2c:2f:46:a7:d4:e6:01:5b:e2: 23:2b:f3:a6:b6:bb:e8:1e:fe:3c:59:4c:ce:98:86:75: e4:01:91:17:60:de:a7:20:b9:22:67:28:c7:36:c0:c2: e4:94:47:6c:25:38:47:18:9f:55:cd:ed:2d:f1:8d:8d: 0a:c2:e2:93:67:b7:e7:4d:0b:b4:16:a9:82:0d:0c:cd Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a3:af:ab:5b:86:e8:e2:c1:56:07:2b:62:61:c8:15:1c: 34:4e:3d:d5:27:aa:f2:14:a2:15:89:31:e1:d0:ed:ca: 15:e3:fd:e5:fc:3d:5d:db:3d:ea:ae:6e:0b:0b:da:a4: b2:e9:28:97:ae:10:49:0f:08:83:4a:39:7c:75:1c:b8: 09:c8:cf:13:e7:81:cb:ca:5f:c8:a0:f9:fd:fa:f5:03: 34:d8:8a:2e:5d:c9:4b:ce:96:d4:f9:7a:fa:3d:fd:83: 39:8f:e4:90:11:61:22:3f:b6:de:00:0e:52:2f:45:de: 5b:7b:d5:95:72:41:fa:76:39:f1:7b:fd:22:f4:98:ad: d0:e6:5b:3b:5e:0e:28:72:a5:77:75:d0:5f:17:4b:f0: e3:02:f5:94:21:a6:30:19:22:3e:30:11:be:15:33:bc: 86:d0:d6:b7:ca:7a:4e:8e:30:08:81:6c:ec:14:b3:ab: fb:31:05:ad:1b:07:76:af:71:8f:9a:30:8d:ff:a7:ba: d8:89:8b:43:e5:49:9e:08:8a:f8:99:e8:15:bc:2d:82: 49:70:3f:99:59:5c:6c:00:e8:59:c7:de:33:4c:0b:c8: be:91:df:9d:34:f0:f5:58:e5:84:a3:f8:52:79:22:99: a2:2b:4e:4f:45:6f:52:12:8f:7c:31:00:58:5b:a1:c5 Fingerprint (SHA-256): D9:A3:8B:4B:9F:C8:86:84:89:27:BD:C6:32:4C:92:83:FB:81:34:28:B5:30:CC:13:CF:99:85:BC:CD:66:87:EC Fingerprint (SHA1): 5E:FC:CE:34:ED:1A:DC:A2:96:8C:DB:12:DD:CB:F5:62:45:62:35:61 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: dbtests.sh: #9548: Nicknane conflict test-setting nickname conflict was correctly rejected - PASSED TIMESTAMP dbtests END: Wed May 10 12:48:06 UTC 2017 Running tests for tools TIMESTAMP tools BEGIN: Wed May 10 12:48:06 UTC 2017 tools.sh: Tools Tests with ECC =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9549: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 85:3a:ba:de:23:a2:40:aa:21:a1:98:22:79:dc:32:6e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9550: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9551: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9552: Exporting Alice's email EC cert & key (pk12util -o) - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9553: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c6:ec:95:7d:39:e0:bd:af:95:cb:0c:45:72:3b:e4:30 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed May 10 12:43:54 2017 Not After : Tue May 10 12:43:54 2067 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:5b:db:a8:91:2e:44:80:5f:2e:98:f7:32:a8:b2: c2:99:ec:6e:0f:83:80:03:c4:66:7d:f1:f9:a7:86:ab: 95:71:8f:1b:89:15:62:9c:cd:1e:b0:51:2e:1f:a6:26: 0c:ee:bc:6b:c7:20:8f:50:5c:58:5d:98:93:79:b9:1e: 32:5a:d4:00:dd:83:67:8d:a8:cc:0f:bc:6c:5e:90:89: 58:5e:59:bf:f3:04:0d:74:21:34:1b:8f:26:b2:cb:a6: 15:ac:76:79:44:fd:d0:44:4b:9c:db:52:5a:28:31:e5: f6:b6:b5:fa:d3:1b:38:47:43:32:82:2b:6c:09:18:05: 66:d5:d6:f7:b5 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:87:02:41:5d:a8:a1:34:5a:5f:0a:7b:f8:09:e8: 7d:5a:f1:b8:de:d6:08:21:04:24:9d:ac:c0:c3:42:bd: 76:5a:67:39:1d:5b:38:db:2b:cc:dc:7e:b9:5c:68:cb: 9b:38:83:3a:d1:91:84:f1:d0:42:27:a8:76:ee:81:03: 08:22:78:c7:37:0d:02:42:01:8e:21:f4:b6:6d:c5:b0: 3c:c2:f1:74:a0:1c:c7:a2:21:fc:c5:d9:70:d6:c2:fa: d5:1b:9a:8c:b5:63:97:ad:7f:c4:24:88:3d:e9:85:1c: 42:4f:0b:2c:c8:c9:2a:7f:6b:15:2f:ee:4f:01:8d:3d: 16:8d:02:c1:56:cb:34:13:6c:fd Fingerprint (SHA-256): D9:73:EA:4B:44:79:6D:42:AD:45:1D:6A:C0:78:4B:A8:C1:1C:82:00:E5:37:DC:3D:66:4D:D9:F5:7D:5F:51:EE Fingerprint (SHA1): 78:FA:F9:7E:33:35:E2:B5:AF:D7:15:8D:35:58:48:F3:A4:64:F5:99 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed May 10 12:44:51 2017 Not After : Tue May 10 12:44:51 2022 Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:65:ea:48:4b:ad:5d:18:43:8e:aa:02:96:95:b2:38: b1:85:8c:25:67:95:80:1a:23:4a:f9:c6:f3:91:65:c4: 1a:ef:06:16:fa:7a:3a:ce:42:64:66:e1:ab:14:cf:62: e9:f1:fa:f9:83:c9:70:bd:99:83:73:14:91:0b:e9:41: 5b:87:5c:16:2a:94:3b:33:56:9c:65:65:24:33:04:3e: 00:18:20:9c:3f:0c:a2:41:b5:64:df:a5:60:ee:85:49: 97 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:87:02:42:00:e0:2f:da:6b:1a:db:b3:63:82:59: 5e:87:72:70:fc:4e:eb:fe:87:75:c1:e7:2b:97:3c:65: 11:48:25:4b:d4:f2:50:40:f9:25:1c:33:79:2d:92:7b: 40:5a:ed:51:90:dc:f9:9a:0d:ed:31:24:4b:19:b7:df: 48:1e:2a:8d:b0:d1:4b:02:41:1b:04:64:d0:35:2a:00: 6d:90:0c:54:98:96:28:00:79:17:44:3f:6d:62:ca:4e: 67:4a:28:b9:98:2d:3d:35:b0:7e:e4:fd:71:24:f2:b9: 53:22:04:c4:7c:b4:61:3a:13:ce:de:e8:5a:f9:fe:ed: 48:de:b7:dc:43:8f:81:d3:cc:63 Fingerprint (SHA-256): 58:95:76:66:DD:1F:C7:2D:3B:D1:90:A0:11:D7:D3:59:B0:0A:4E:9F:BE:F2:9E:3D:41:B4:59:AA:3A:A3:43:55 Fingerprint (SHA1): EE:0C:DE:21:62:47:BC:87:AA:87:7E:8B:47:44:1A:C3:2E:3F:83:8A Friendly Name: Alice-ec tools.sh: #9554: Listing Alice's pk12 EC file (pk12util -l) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9555: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 84:a5:d8:7b:97:11:9f:b4:04:4e:cd:87:bf:1b:0e:cb Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9556: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9557: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9558: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: bb:55:3e:b9:72:05:46:1d:68:be:81:bb:07:c5:d7:70 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9559: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9560: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9561: Exporting with [RC2-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 5f:17:08:7e:18:73:1f:cd:32:6e:79:91:50:0e:a4:8b Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9562: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9563: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9564: Exporting with [RC2-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 8d:c9:b0:de:d3:66:81:da:fc:d3:20:d1:68:cc:d8:33 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9565: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9566: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9567: Exporting with [RC2-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: d0:91:0d:1f:af:f7:79:75:14:56:82:fb:9f:b4:0b:bb Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9568: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9569: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9570: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 4f:aa:f7:d9:8f:dd:c5:14:38:c2:17:ff:6f:55:15:53 Iteration Count: 2000 (0x7d0) tools.sh: #9571: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9572: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9573: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 93:00:87:b4:eb:82:65:43:a2:92:3b:01:55:3a:95:c6 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9574: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9575: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9576: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fb:8a:9f:ee:a9:98:25:fa:8f:5a:90:5a:a5:8e:6d:af Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9577: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9578: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9579: Exporting with [DES-EDE3-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f3:0e:ff:ac:c3:a9:c7:04:e7:00:21:ca:f5:8f:d0:2d Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9580: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9581: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9582: Exporting with [DES-EDE3-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d9:e1:a6:95:38:45:25:d0:26:45:1f:82:f2:ff:c3:ec Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9583: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9584: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9585: Exporting with [DES-EDE3-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 78:75:3e:f1:56:96:46:0f:4d:c2:f0:b8:88:86:12:24 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9586: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9587: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9588: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5a:be:22:69:52:8b:6c:52:fb:84:1b:ee:c1:99:e6:01 Iteration Count: 2000 (0x7d0) tools.sh: #9589: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9590: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9591: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b2:d9:e5:b8:38:9d:f5:58:17:b7:b1:cd:96:13:32:10 Iteration Count: 2000 (0x7d0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:bd:13:72:50:a2:18:3c:38:f5:c0:12:a3:34:24: de:ce Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9592: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9593: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9594: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5b:98:a8:9e:f1:a6:a0:29:b1:a9:19:55:2b:b2:6a:eb Iteration Count: 2000 (0x7d0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:86:cc:02:b7:96:65:df:bb:ad:f8:f6:02:64:d7: 35:38 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9595: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9596: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9597: Exporting with [AES-128-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4c:51:53:02:f3:15:29:f9:f3:d6:54:56:e1:b7:6c:57 Iteration Count: 2000 (0x7d0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:17:a3:48:7c:ee:88:4e:be:f3:68:57:fd:9b:fe: da:6f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9598: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9599: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9600: Exporting with [AES-128-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 88:80:69:59:a8:d2:53:db:9a:1c:65:f6:98:a8:f6:72 Iteration Count: 2000 (0x7d0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:ee:8c:a7:98:f6:89:b2:e2:fe:17:a6:52:62:5e: d5:d7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9601: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9602: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9603: Exporting with [AES-128-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c5:4f:64:cd:9c:77:f3:02:b6:b4:14:0d:42:4a:bf:b5 Iteration Count: 2000 (0x7d0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:19:ba:e2:79:2d:5c:42:83:5e:a4:9b:cf:17:84: cd:9f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9604: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9605: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9606: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 81:d5:13:04:23:76:af:a4:61:7d:56:58:98:7e:77:b6 Iteration Count: 2000 (0x7d0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:df:cf:8c:40:f1:0b:ac:56:fb:4d:91:42:83:c6: d6:7d tools.sh: #9607: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9608: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9609: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 49:b0:db:9c:ab:8d:f3:24:37:8d:5e:d4:27:27:d4:0e Iteration Count: 2000 (0x7d0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:2f:a9:f4:d9:48:b9:08:0a:05:ff:12:ba:7b:1b: 57:d9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9610: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9611: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9612: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b7:45:6d:ab:b0:17:84:d9:34:b0:11:d4:2d:bf:cc:e3 Iteration Count: 2000 (0x7d0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:41:16:53:98:ff:b0:42:0f:7d:91:8a:92:05:b4: fb:2c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9613: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9614: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9615: Exporting with [AES-192-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 26:70:d5:8f:3f:4c:73:8f:8a:39:2c:a2:27:01:02:1b Iteration Count: 2000 (0x7d0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:8a:d8:d0:67:e1:80:d3:e0:cd:17:6f:44:0e:35: ae:8a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9616: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9617: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9618: Exporting with [AES-192-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2d:aa:3f:e6:68:69:0f:12:3a:e1:e1:58:ca:0d:7f:e1 Iteration Count: 2000 (0x7d0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:55:1f:e8:1b:96:a0:a3:5e:bb:03:81:c2:b5:12: 8b:a5 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9619: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9620: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9621: Exporting with [AES-192-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8c:c3:fd:b3:90:d5:7b:8a:e5:85:dc:87:26:ad:f1:09 Iteration Count: 2000 (0x7d0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:69:07:e3:c3:24:9d:58:92:76:54:5e:8b:15:92: ca:c7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9622: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9623: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9624: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 35:c5:46:89:63:43:09:ca:04:38:3e:91:dc:ca:a7:39 Iteration Count: 2000 (0x7d0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:ae:f3:0b:17:31:df:08:1b:b5:c5:a3:d0:f4:a5: d5:90 tools.sh: #9625: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9626: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9627: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 96:37:d7:e1:e2:d4:44:aa:25:36:c4:30:54:04:3d:cf Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:81:50:17:e6:95:5d:32:6f:d0:c4:f0:8f:c1:b0: 7e:12 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9628: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9629: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9630: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2d:45:ee:d7:24:65:c9:3e:be:5f:6a:a2:31:54:34:bf Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:f5:f2:17:f8:f7:9d:cf:19:0a:ec:97:ff:53:b8: d6:f3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9631: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9632: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9633: Exporting with [AES-256-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 17:ae:bd:ac:8c:73:37:b9:31:86:a6:48:f5:8b:6d:93 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:8d:bd:2f:48:f1:f2:99:e9:ec:42:77:ff:be:91: 3e:12 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9634: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9635: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9636: Exporting with [AES-256-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 00:49:5d:e0:d8:e3:5a:88:19:d9:0a:55:8a:d4:af:18 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:6f:df:db:ee:8b:b1:ca:7c:ea:e4:47:49:ee:23: 47:75 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9637: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9638: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9639: Exporting with [AES-256-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 24:29:92:8e:20:ee:2c:00:5a:85:99:bc:35:85:5a:31 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:46:c5:e0:a8:cb:25:d4:2a:ec:d7:b5:d5:4b:11: 3f:8f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9640: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9641: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9642: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: cb:18:3e:95:ce:f4:cf:37:c9:28:a7:34:c0:aa:8f:99 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:32:ab:8e:8a:6c:e5:23:a2:40:7b:55:a0:e0:4e: 59:ee tools.sh: #9643: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9644: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9645: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 40:b9:b7:83:43:df:d2:77:b8:b7:fd:53:8a:a3:c7:d0 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:5e:8c:c1:70:5b:bb:3e:34:1d:07:32:20:00:35: 04:4b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9646: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9647: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9648: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3f:70:a7:ba:aa:15:a0:7b:a8:df:15:f2:ef:11:2d:5e Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:97:44:bf:fa:47:49:fe:ed:6c:57:6a:96:6b:8f: 68:92 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9649: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9650: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9651: Exporting with [CAMELLIA-128-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 59:a5:d7:a0:5f:98:b4:7a:ca:51:8c:a6:08:89:4e:f0 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:c5:50:c5:e6:ff:25:4f:2d:f8:c0:8d:bf:43:aa: 3f:88 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9652: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9653: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9654: Exporting with [CAMELLIA-128-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2d:ee:fc:d2:1a:67:71:3c:f9:90:48:fa:24:ee:e3:24 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:b2:98:89:c1:1a:5c:1f:bd:04:33:e4:f9:09:dd: a5:b7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9655: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9656: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9657: Exporting with [CAMELLIA-128-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 45:d5:a6:2d:bc:f3:5c:1d:4f:46:ce:c0:68:53:85:9c Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:4c:75:ea:5b:f8:02:59:59:a5:a2:8a:3d:77:9d: 14:6e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9658: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9659: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9660: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d3:c2:2f:92:65:9a:bf:85:52:a8:2f:41:c1:13:0f:ed Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:c6:88:5e:f6:26:6c:dd:fe:66:30:f8:dd:5d:18: c3:40 tools.sh: #9661: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9662: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9663: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 68:72:b7:18:f0:36:d2:32:92:25:9a:a3:7d:69:0b:e4 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:fe:55:58:7e:48:33:56:1c:50:46:80:7c:39:7f: 12:b9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9664: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9665: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9666: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 85:54:a8:ae:a3:ad:70:5f:d2:b0:3b:7f:2c:43:90:01 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:6c:80:7b:3d:05:67:98:f6:01:74:ea:a6:0d:6a: b0:f2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9667: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9668: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9669: Exporting with [CAMELLIA-192-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f7:a9:ce:e2:00:5d:3f:08:9b:e9:39:6e:a0:4c:70:03 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:8f:7c:3c:04:a1:10:02:b0:51:3b:52:20:fa:75: 04:93 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9670: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9671: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9672: Exporting with [CAMELLIA-192-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 11:9f:42:fe:a5:5a:33:0d:d4:2b:b3:f3:0e:c5:de:f7 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:8f:e5:45:43:65:64:b5:d2:a4:dd:6c:68:3c:62: 16:da Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9673: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9674: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9675: Exporting with [CAMELLIA-192-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 96:cd:9e:fe:c9:a0:cd:66:29:26:11:b9:1d:9a:91:42 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:89:79:f7:8d:0f:85:d0:8c:e1:72:ea:f9:39:71: 8a:b6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9676: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9677: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9678: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2c:7e:30:a0:be:88:78:47:9e:a8:6b:95:af:c4:d1:d6 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:e1:4c:01:63:bb:99:e5:da:cc:e3:72:8a:5b:8f: cd:0b tools.sh: #9679: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9680: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9681: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: cd:7a:6d:a4:c6:58:13:ef:58:f8:38:9e:00:ef:12:85 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:b1:9e:0d:3d:03:b7:bf:70:34:57:8b:86:bc:1d: b7:4a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9682: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9683: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9684: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d0:2d:f7:65:36:ae:97:b2:bc:39:50:60:3f:4c:7e:0c Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:79:a7:25:04:72:45:19:0a:40:fe:c6:02:48:35: 5a:f8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9685: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9686: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C AES-128-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9687: Exporting with [CAMELLIA-256-CBC:AES-128-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d9:44:24:48:23:7c:95:43:6e:6d:68:ee:c6:63:09:4b Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:8f:01:4d:89:c7:04:a2:f5:5c:2a:27:df:1d:78: 50:a8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9688: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9689: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C AES-192-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9690: Exporting with [CAMELLIA-256-CBC:AES-192-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7e:79:5a:3b:08:12:a0:d6:dd:62:3c:7a:e3:7d:17:a9 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:c3:00:d9:2b:33:34:3c:74:f3:54:6d:22:52:df: ce:83 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9691: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9692: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C AES-256-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9693: Exporting with [CAMELLIA-256-CBC:AES-256-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 69:e2:b6:7f:22:1c:63:b6:e3:16:a4:03:4d:c6:08:bc Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:6e:20:b3:90:17:6f:79:de:07:ea:b1:bf:c7:70: e7:a9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9694: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9695: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9696: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 12:b8:c1:1a:45:f7:7c:e7:4a:61:04:51:01:68:7c:79 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:77:f2:a9:52:9b:2c:a2:ef:b7:5d:c3:e1:1d:49: ea:1f tools.sh: #9697: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9698: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9699: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 90:05:38:0f:70:51:ed:c9:d6:39:0c:90:40:da:41:57 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9700: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9701: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9702: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 1b:e4:e2:dd:ec:7d:ce:9f:0b:9c:40:ea:de:a3:e9:4f Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9703: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9704: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9705: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 5e:24:25:60:35:95:50:cc:98:0b:94:74:cb:8c:7b:fd Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9706: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9707: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9708: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 34:73:3a:e2:c4:6e:12:5a:48:de:77:9d:a4:6b:41:51 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9709: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9710: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9711: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: c4:36:9a:01:19:61:2d:a7:85:05:50:c1:ef:fe:2b:78 Iteration Count: 2000 (0x7d0) tools.sh: #9712: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9713: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9714: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 8d:fc:85:af:ca:1a:a3:87:ce:57:ed:b1:2a:cf:f1:81 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9715: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9716: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9717: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 1c:65:0b:08:a8:32:9b:61:99:a0:21:92:36:ee:61:98 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9718: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9719: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9720: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 50:bc:b7:92:a9:15:97:e1:03:7c:ff:18:f0:21:db:7e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9721: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9722: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9723: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: a5:1b:7b:29:c2:ab:a5:a1:ed:95:a0:cd:d7:0e:5f:7b Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9724: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9725: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9726: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 9f:44:ed:10:ed:7b:59:65:24:2c:74:b7:53:71:fb:af Iteration Count: 2000 (0x7d0) tools.sh: #9727: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9728: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9729: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 9d:01:62:c5:ea:8f:f4:45:97:83:3f:23:ee:6c:f1:93 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9730: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9731: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9732: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 4d:7e:ea:05:a1:f1:5e:f8:d9:64:46:7c:cb:44:68:19 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9733: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9734: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9735: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 83:83:7d:0a:24:38:85:c3:29:a9:27:6f:10:4a:99:6a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9736: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9737: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9738: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 13:cc:e3:db:e1:c1:a4:cb:5a:af:5e:96:cb:97:b9:40 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9739: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9740: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9741: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 03:e0:2e:38:c5:d2:7d:61:e0:e1:da:df:25:8b:68:f4 Iteration Count: 2000 (0x7d0) tools.sh: #9742: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9743: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9744: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 59:67:50:07:00:51:c3:68:76:41:40:80:37:ab:92:fa Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9745: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9746: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9747: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: dc:3b:e1:28:f6:cf:6f:72:b7:20:ec:83:53:06:73:91 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9748: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9749: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9750: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8f:44:d8:06:db:b2:1f:c3:ac:e0:6f:b0:4e:7b:c1:8f Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9751: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9752: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9753: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a4:99:db:20:45:8f:bf:c8:b7:3e:fd:70:a2:e6:c0:f3 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9754: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9755: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9756: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d4:37:5f:5d:f4:4f:0a:13:6f:12:b4:d7:2b:f0:c4:5c Iteration Count: 2000 (0x7d0) tools.sh: #9757: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9758: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9759: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 01:50:e5:ba:1a:c2:6f:46:43:09:88:76:84:4d:81:48 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9760: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9761: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9762: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 64:74:d5:16:79:23:34:07:ad:bd:57:48:41:13:23:37 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9763: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9764: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9765: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fb:75:a2:17:15:cc:87:d5:c6:44:85:cf:7b:fb:7b:ad Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9766: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9767: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9768: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7a:b7:a8:97:17:45:47:d3:2d:aa:64:b8:03:c1:7d:c6 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9769: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9770: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9771: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2d:72:0e:de:68:11:9f:02:ec:41:44:b5:e6:3c:43:74 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9772: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9773: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9774: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d6:cf:b8:0c:3a:34:40:7e:bd:d2:a9:57:93:5a:25:46 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9775: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9776: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9777: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2e:aa:17:fe:b4:a5:a7:d4:5d:69:d6:67:94:00:76:8c Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9778: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9779: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9780: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 08:81:e4:08:10:eb:c2:5e:b5:e1:c5:f8:ea:dd:af:8d Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9781: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9782: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9783: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3f:ff:be:74:cf:04:78:5c:c6:7c:34:63:79:ca:aa:2b Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9784: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9785: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9786: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f3:89:c1:59:3f:5d:a9:8d:f7:b7:34:49:b2:d7:98:29 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:43:36 2017 Not After : Tue May 10 12:43:36 2067 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:85:a7:28:1c:45:9e:af:6a:8d:ff:4e:0c:86:d8:4a: 5b:f8:45:7b:45:5e:54:fc:79:6d:6d:78:eb:05:6b:6a: 7a:38:00:36:b9:f5:0a:3f:6e:41:1b:ab:9c:c2:52:40: c3:db:75:15:2a:bb:20:53:68:3f:91:64:d0:a4:b4:f2: 75:46:81:6b:dd:1f:7c:a6:b6:3a:c4:62:27:d1:3c:52: b2:a4:45:97:f1:f0:f1:4b:75:e0:91:09:55:ff:e6:8b: f5:ae:e2:cb:00:b9:cd:3b:bd:fa:30:b2:45:d4:49:59: 5e:45:00:98:02:20:2e:70:27:29:3f:41:39:fc:54:ff: 97:0f:b2:3f:5d:2b:bf:12:0f:ab:93:97:88:02:6d:86: 61:d5:df:b6:ab:ce:04:4f:7c:0e:62:ca:7a:1a:e4:31: 80:a4:c4:cd:4e:2d:f9:53:ab:a6:e1:20:a8:85:84:47: 83:17:48:02:0d:f4:5d:aa:f3:ac:ce:74:4e:11:fc:50: ac:18:b9:64:d8:6d:37:51:e6:92:86:34:9b:77:7d:c9: 40:9f:50:81:69:2b:61:69:b4:4f:2b:e9:08:0f:fc:b7: 3e:4e:b7:fc:7f:11:c8:5d:87:0d:13:b3:60:9b:13:3c: c5:61:cb:47:a8:18:50:49:43:98:6a:ff:63:1d:fe:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:81:14:4b:01:11:a9:1c:19:d0:da:cb:f8:50:13:ff: e6:02:4c:45:51:06:35:49:fc:cb:ad:2b:aa:ff:75:83: 1e:ac:55:d2:fb:d5:ca:c5:c7:16:b3:e4:04:06:44:75: 8f:5a:87:f9:65:60:a2:fe:0a:f3:0e:32:85:d8:2a:22: a1:b6:41:26:da:30:97:1e:9d:43:f5:f3:8c:2e:51:f0: 10:8c:49:82:8d:a8:d8:ec:f7:c5:3a:1b:c3:f4:63:52: 24:47:ac:4e:2b:f8:21:30:6e:3d:80:45:79:3e:0e:16: ba:2e:52:dd:2e:bb:76:13:9a:2e:dd:08:7a:f2:94:1a: b2:be:6d:c3:6f:1d:ec:3e:8a:d0:c6:2b:5d:d9:d5:0b: c4:f5:81:f8:88:93:2c:b9:9b:66:06:5b:74:ef:c5:d0: de:ac:0c:4a:af:f6:bf:f8:f3:a6:00:db:6f:0f:fe:74: 89:f4:93:18:90:d9:12:d9:5b:e6:14:4f:e2:6c:c0:01: e4:a3:c3:a3:46:2c:28:1c:7c:a1:c6:07:9a:83:4b:5a: d2:13:0a:d5:48:4a:e4:8d:bb:d8:50:5f:da:41:4f:ec: ff:cf:c4:70:e3:d7:c8:70:28:81:07:56:50:68:ee:8c: 90:94:4d:c7:fc:22:25:70:bc:b3:3c:b1:04:b7:8a:be Fingerprint (SHA-256): B8:8E:2B:6C:9E:DA:CC:4B:B4:22:3E:7E:2F:F4:EA:D9:B9:2E:83:77:37:EB:F1:32:61:DA:80:73:F5:FC:27:D0 Fingerprint (SHA1): 4F:24:A0:C5:3B:C3:B9:3B:36:AC:F7:11:F7:3D:90:4A:62:2A:00:06 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:44:48 2017 Not After : Tue May 10 12:44:48 2022 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d7:34:47:69:b5:1f:af:7d:19:b8:e5:f5:3e:e0:e5: 59:03:05:ca:ee:e5:92:56:2f:05:6b:f3:f5:14:e3:bf: b1:2c:df:05:21:30:52:09:51:b8:7f:e6:b1:9b:c6:ae: 9d:dc:6a:1a:df:24:42:5b:96:99:d1:41:3c:62:a8:22: 09:12:9b:f5:f5:73:2a:8a:94:ae:7f:9b:ed:4c:c1:15: d9:f6:c2:38:8b:c6:2b:63:ce:8d:dd:fd:39:65:5b:80: 99:52:f4:7a:cd:6f:4b:7c:d7:9d:98:9d:50:db:a3:d9: 84:ac:52:d3:ea:7c:d8:7c:e0:a7:54:53:f0:21:4a:49: d2:0c:58:05:a5:78:bd:99:f0:3c:65:4c:75:9e:cd:bd: f0:b2:05:66:d4:ae:6c:da:fc:ca:cd:78:83:94:50:8d: 8d:23:53:dc:7e:3a:38:96:65:32:f9:b4:71:52:94:a3: 29:d2:a5:6c:58:9a:a0:18:f3:93:db:53:92:85:fc:7b: 0c:bd:48:b1:ff:11:ec:b6:ea:29:21:44:9b:1a:4e:71: d9:5f:5c:b2:06:4f:b9:ac:f7:78:51:aa:88:20:87:ad: 2b:0f:8d:6d:59:76:35:9e:64:48:a2:bc:1c:e5:a4:ca: a6:6b:59:39:c0:15:05:61:25:33:10:a9:71:09:80:e1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:41:21:7c:be:97:a6:b5:de:a1:28:58:b0:f8:70:ff: f5:5c:2c:af:af:89:ae:1b:7c:21:0d:7e:60:4c:36:0f: 19:96:cc:8e:37:fd:a0:a5:c4:06:03:e3:b7:a7:a1:81: 61:8b:df:a7:2c:8e:56:72:ad:a8:83:4f:a4:ad:2c:fe: ec:7f:74:82:82:3c:87:8e:f4:00:8e:93:e7:f8:59:9b: 05:55:05:ac:52:c7:89:67:b3:3b:89:8c:c6:a1:3e:2e: c6:99:31:f4:27:0f:e1:cb:9a:d3:72:27:bc:8f:ab:ad: d4:bf:b6:16:48:10:86:c8:ab:86:2d:8b:8f:12:24:ba: bc:ae:45:8c:cd:27:ff:41:21:ac:bb:9c:37:f0:4d:ed: ec:99:38:56:75:21:31:5b:0a:61:d1:06:ca:76:70:0a: 39:c6:b2:12:2b:9d:a7:30:c8:4d:c1:19:41:8d:6c:5f: 3e:71:e2:b5:4a:f6:8a:52:10:06:71:62:f5:35:f8:45: dd:90:5d:65:b9:ed:94:ec:9b:2e:05:62:04:d3:98:33: 55:36:d7:14:bb:6b:e5:30:d2:e8:fb:d2:63:de:51:71: 78:cf:e4:9b:d9:5b:43:f9:8d:fd:f4:98:bf:23:20:aa: 2b:4c:32:13:b7:39:b3:54:c4:65:19:7a:1f:63:2f:53 Fingerprint (SHA-256): A0:72:A9:D8:75:B7:87:CA:7A:C3:9F:F8:72:06:6C:61:67:FA:5E:90:45:11:FB:75:AA:2D:29:C4:8E:4C:61:8D Fingerprint (SHA1): B5:46:3E:C4:8B:EB:A9:34:98:7E:40:8F:84:A5:C6:80:E1:08:1F:35 Friendly Name: Alice tools.sh: #9787: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9788: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #9789: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9790: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #9791: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 37%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) tree "../tools/html" signed successfully tools.sh: #9792: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #9793: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #9794: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html --> sign.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 37%) tree "../tools/html" signed successfully tools.sh: #9795: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #9796: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #9797: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Wed May 10 12:48:52 UTC 2017 Running tests for fips TIMESTAMP fips BEGIN: Wed May 10 12:48:52 UTC 2017 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #9798: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #9799: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 35c75dfcb5db6565e6a4efef7cf1e31ce9db9ffe NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #9800: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #9801: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #9802: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #9803: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #9804: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #9805: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #9806: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #9807: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #9808: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #9809: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #9810: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 35c75dfcb5db6565e6a4efef7cf1e31ce9db9ffe FIPS_PUB_140_Test_Certificate fips.sh: #9811: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #9812: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #9813: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #9814: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #9815: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 35c75dfcb5db6565e6a4efef7cf1e31ce9db9ffe FIPS_PUB_140_Test_Certificate fips.sh: #9816: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #9817: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #9818: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest1.so /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle/libsoftokn3.so -o -8 -b 5 cp /usr/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle Changing byte 0x00033918 (211224): from 01 (1) to 21 (33) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/fips/mangle dbtest -r -d ../fips fips.sh: #9819: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Wed May 10 12:49:19 UTC 2017 Running tests for crmf TIMESTAMP crmf BEGIN: Wed May 10 12:49:19 UTC 2017 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #9820: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #9821: CMMF test . - PASSED TIMESTAMP crmf END: Wed May 10 12:49:20 UTC 2017 Running tests for smime TIMESTAMP smime BEGIN: Wed May 10 12:49:20 UTC 2017 smime.sh: S/MIME Tests with ECC =============================== smime.sh: Signing Detached Message {SHA1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #9822: Create Detached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #9823: Verifying Alice's Detached Signature (SHA1) . - PASSED smime.sh: Signing Attached Message (SHA1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #9824: Create Attached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1 smime.sh: #9825: Decode Alice's Attached Signature (SHA1) . - PASSED diff alice.txt alice.data.SHA1 smime.sh: #9826: Compare Attached Signed Data and Original (SHA1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA1} ------------------ cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #9827: Create Detached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #9828: Verifying Alice's Detached Signature (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA1) ------------------ cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #9829: Create Attached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.SHA1 smime.sh: #9830: Decode Alice's Attached Signature (ECDSA w/ SHA1) . - PASSED diff alice.txt alice-ec.data.SHA1 smime.sh: #9831: Compare Attached Signed Data and Original (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Detached Message {SHA256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #9832: Create Detached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #9833: Verifying Alice's Detached Signature (SHA256) . - PASSED smime.sh: Signing Attached Message (SHA256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #9834: Create Attached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256 smime.sh: #9835: Decode Alice's Attached Signature (SHA256) . - PASSED diff alice.txt alice.data.SHA256 smime.sh: #9836: Compare Attached Signed Data and Original (SHA256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA256} ------------------ cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #9837: Create Detached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #9838: Verifying Alice's Detached Signature (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA256) ------------------ cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #9839: Create Attached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.SHA256 smime.sh: #9840: Decode Alice's Attached Signature (ECDSA w/ SHA256) . - PASSED diff alice.txt alice-ec.data.SHA256 smime.sh: #9841: Compare Attached Signed Data and Original (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Detached Message {SHA384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #9842: Create Detached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #9843: Verifying Alice's Detached Signature (SHA384) . - PASSED smime.sh: Signing Attached Message (SHA384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #9844: Create Attached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384 smime.sh: #9845: Decode Alice's Attached Signature (SHA384) . - PASSED diff alice.txt alice.data.SHA384 smime.sh: #9846: Compare Attached Signed Data and Original (SHA384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA384} ------------------ cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #9847: Create Detached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #9848: Verifying Alice's Detached Signature (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA384) ------------------ cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #9849: Create Attached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.SHA384 smime.sh: #9850: Decode Alice's Attached Signature (ECDSA w/ SHA384) . - PASSED diff alice.txt alice-ec.data.SHA384 smime.sh: #9851: Compare Attached Signed Data and Original (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Detached Message {SHA512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #9852: Create Detached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #9853: Verifying Alice's Detached Signature (SHA512) . - PASSED smime.sh: Signing Attached Message (SHA512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #9854: Create Attached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512 smime.sh: #9855: Decode Alice's Attached Signature (SHA512) . - PASSED diff alice.txt alice.data.SHA512 smime.sh: #9856: Compare Attached Signed Data and Original (SHA512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA512} ------------------ cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #9857: Create Detached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #9858: Verifying Alice's Detached Signature (ECDSA w/ SHA512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA512) ------------------ cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #9859: Create Attached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.SHA512 smime.sh: #9860: Decode Alice's Attached Signature (ECDSA w/ SHA512) . - PASSED diff alice.txt alice-ec.data.SHA512 smime.sh: #9861: Compare Attached Signed Data and Original (ECDSA w/ SHA512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #9862: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #9863: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #9864: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@bogus.com,dave@bogus.com smime.sh: #9865: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@bogus.net smime.sh: #9866: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #9867: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #9868: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #9869: Decrypt with a Multiple Email cert . - PASSED smime.sh: #9870: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #9871: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #9872: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \ -d ../alicedir > co.der smime.sh: #9873: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #9874: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@bogus.com" > alice.enc smime.sh: #9875: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #9876: Decode Encrypted-Data . - PASSED smime.sh: #9877: Compare Decoded and Original Data . - PASSED smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #9878: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice.env -o alice_p7.data smime.sh: #9879: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #9880: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #9881: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #9882: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Wed May 10 12:49:30 UTC 2017 Running tests for ssl TIMESTAMP ssl BEGIN: Wed May 10 12:49:30 UTC 2017 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:49:30 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:30 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 32161 >/dev/null 2>/dev/null selfserv_9208 with PID 32161 found at Wed May 10 12:49:30 UTC 2017 selfserv_9208 with PID 32161 started at Wed May 10 12:49:30 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9883: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 32161 at Wed May 10 12:49:30 UTC 2017 kill -USR1 32161 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 32161 killed at Wed May 10 12:49:30 UTC 2017 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:49:30 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:30 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 32217 >/dev/null 2>/dev/null selfserv_9208 with PID 32217 found at Wed May 10 12:49:30 UTC 2017 selfserv_9208 with PID 32217 started at Wed May 10 12:49:31 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9884: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 32217 at Wed May 10 12:49:31 UTC 2017 kill -USR1 32217 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 32217 killed at Wed May 10 12:49:31 UTC 2017 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:49:31 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:31 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 32273 >/dev/null 2>/dev/null selfserv_9208 with PID 32273 found at Wed May 10 12:49:31 UTC 2017 selfserv_9208 with PID 32273 started at Wed May 10 12:49:31 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9885: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 32273 at Wed May 10 12:49:32 UTC 2017 kill -USR1 32273 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 32273 killed at Wed May 10 12:49:32 UTC 2017 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:49:32 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:32 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 32341 >/dev/null 2>/dev/null selfserv_9208 with PID 32341 found at Wed May 10 12:49:32 UTC 2017 selfserv_9208 with PID 32341 started at Wed May 10 12:49:32 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9886: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 32341 at Wed May 10 12:49:33 UTC 2017 kill -USR1 32341 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 32341 killed at Wed May 10 12:49:33 UTC 2017 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:49:33 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:33 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 32397 >/dev/null 2>/dev/null selfserv_9208 with PID 32397 found at Wed May 10 12:49:33 UTC 2017 selfserv_9208 with PID 32397 started at Wed May 10 12:49:33 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9887: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 32397 at Wed May 10 12:49:33 UTC 2017 kill -USR1 32397 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 32397 killed at Wed May 10 12:49:33 UTC 2017 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:49:33 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:33 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 32453 >/dev/null 2>/dev/null selfserv_9208 with PID 32453 found at Wed May 10 12:49:34 UTC 2017 selfserv_9208 with PID 32453 started at Wed May 10 12:49:34 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9888: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 32453 at Wed May 10 12:49:34 UTC 2017 kill -USR1 32453 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 32453 killed at Wed May 10 12:49:34 UTC 2017 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:49:34 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:34 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 32521 >/dev/null 2>/dev/null selfserv_9208 with PID 32521 found at Wed May 10 12:49:34 UTC 2017 selfserv_9208 with PID 32521 started at Wed May 10 12:49:34 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9889: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 32521 at Wed May 10 12:49:35 UTC 2017 kill -USR1 32521 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 32521 killed at Wed May 10 12:49:35 UTC 2017 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:49:35 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:35 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 32577 >/dev/null 2>/dev/null selfserv_9208 with PID 32577 found at Wed May 10 12:49:35 UTC 2017 selfserv_9208 with PID 32577 started at Wed May 10 12:49:35 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9890: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 32577 at Wed May 10 12:49:36 UTC 2017 kill -USR1 32577 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 32577 killed at Wed May 10 12:49:36 UTC 2017 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:49:36 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:36 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 32633 >/dev/null 2>/dev/null selfserv_9208 with PID 32633 found at Wed May 10 12:49:36 UTC 2017 selfserv_9208 with PID 32633 started at Wed May 10 12:49:36 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9891: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 32633 at Wed May 10 12:49:36 UTC 2017 kill -USR1 32633 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 32633 killed at Wed May 10 12:49:36 UTC 2017 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:49:37 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:37 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 32701 >/dev/null 2>/dev/null selfserv_9208 with PID 32701 found at Wed May 10 12:49:37 UTC 2017 selfserv_9208 with PID 32701 started at Wed May 10 12:49:37 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9892: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 32701 at Wed May 10 12:49:37 UTC 2017 kill -USR1 32701 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 32701 killed at Wed May 10 12:49:37 UTC 2017 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:49:37 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:37 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 32757 >/dev/null 2>/dev/null selfserv_9208 with PID 32757 found at Wed May 10 12:49:37 UTC 2017 selfserv_9208 with PID 32757 started at Wed May 10 12:49:37 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9893: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 32757 at Wed May 10 12:49:38 UTC 2017 kill -USR1 32757 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 32757 killed at Wed May 10 12:49:38 UTC 2017 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:49:38 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:38 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 351 >/dev/null 2>/dev/null selfserv_9208 with PID 351 found at Wed May 10 12:49:38 UTC 2017 selfserv_9208 with PID 351 started at Wed May 10 12:49:38 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9894: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 351 at Wed May 10 12:49:39 UTC 2017 kill -USR1 351 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 351 killed at Wed May 10 12:49:39 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:49:39 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:39 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 422 >/dev/null 2>/dev/null selfserv_9208 with PID 422 found at Wed May 10 12:49:39 UTC 2017 selfserv_9208 with PID 422 started at Wed May 10 12:49:39 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9895: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 422 at Wed May 10 12:49:39 UTC 2017 kill -USR1 422 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 422 killed at Wed May 10 12:49:39 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:49:39 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:39 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 480 >/dev/null 2>/dev/null selfserv_9208 with PID 480 found at Wed May 10 12:49:39 UTC 2017 selfserv_9208 with PID 480 started at Wed May 10 12:49:39 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9896: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 480 at Wed May 10 12:49:40 UTC 2017 kill -USR1 480 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 480 killed at Wed May 10 12:49:40 UTC 2017 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:49:40 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:40 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 543 >/dev/null 2>/dev/null selfserv_9208 with PID 543 found at Wed May 10 12:49:40 UTC 2017 selfserv_9208 with PID 543 started at Wed May 10 12:49:40 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9897: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 543 at Wed May 10 12:49:41 UTC 2017 kill -USR1 543 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 543 killed at Wed May 10 12:49:41 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:49:41 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:41 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 616 >/dev/null 2>/dev/null selfserv_9208 with PID 616 found at Wed May 10 12:49:41 UTC 2017 selfserv_9208 with PID 616 started at Wed May 10 12:49:41 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9898: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 616 at Wed May 10 12:49:42 UTC 2017 kill -USR1 616 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 616 killed at Wed May 10 12:49:42 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:49:42 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:42 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 674 >/dev/null 2>/dev/null selfserv_9208 with PID 674 found at Wed May 10 12:49:42 UTC 2017 selfserv_9208 with PID 674 started at Wed May 10 12:49:42 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9899: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 674 at Wed May 10 12:49:42 UTC 2017 kill -USR1 674 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 674 killed at Wed May 10 12:49:42 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:49:42 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:42 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 783 >/dev/null 2>/dev/null selfserv_9208 with PID 783 found at Wed May 10 12:49:42 UTC 2017 selfserv_9208 with PID 783 started at Wed May 10 12:49:42 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9900: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 783 at Wed May 10 12:49:43 UTC 2017 kill -USR1 783 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 783 killed at Wed May 10 12:49:43 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:49:43 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:43 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 854 >/dev/null 2>/dev/null selfserv_9208 with PID 854 found at Wed May 10 12:49:43 UTC 2017 selfserv_9208 with PID 854 started at Wed May 10 12:49:43 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9901: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 854 at Wed May 10 12:49:44 UTC 2017 kill -USR1 854 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 854 killed at Wed May 10 12:49:44 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:49:44 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:44 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 910 >/dev/null 2>/dev/null selfserv_9208 with PID 910 found at Wed May 10 12:49:44 UTC 2017 selfserv_9208 with PID 910 started at Wed May 10 12:49:44 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9902: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 910 at Wed May 10 12:49:44 UTC 2017 kill -USR1 910 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 910 killed at Wed May 10 12:49:45 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:49:45 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:45 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 966 >/dev/null 2>/dev/null selfserv_9208 with PID 966 found at Wed May 10 12:49:45 UTC 2017 selfserv_9208 with PID 966 started at Wed May 10 12:49:45 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9903: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 966 at Wed May 10 12:49:45 UTC 2017 kill -USR1 966 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 966 killed at Wed May 10 12:49:45 UTC 2017 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:49:45 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:45 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1034 >/dev/null 2>/dev/null selfserv_9208 with PID 1034 found at Wed May 10 12:49:45 UTC 2017 selfserv_9208 with PID 1034 started at Wed May 10 12:49:45 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9904: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 1034 at Wed May 10 12:49:46 UTC 2017 kill -USR1 1034 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1034 killed at Wed May 10 12:49:46 UTC 2017 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:49:46 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:46 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1090 >/dev/null 2>/dev/null selfserv_9208 with PID 1090 found at Wed May 10 12:49:46 UTC 2017 selfserv_9208 with PID 1090 started at Wed May 10 12:49:46 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9905: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 1090 at Wed May 10 12:49:47 UTC 2017 kill -USR1 1090 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1090 killed at Wed May 10 12:49:47 UTC 2017 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:49:47 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:47 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1146 >/dev/null 2>/dev/null selfserv_9208 with PID 1146 found at Wed May 10 12:49:47 UTC 2017 selfserv_9208 with PID 1146 started at Wed May 10 12:49:47 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9906: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 1146 at Wed May 10 12:49:47 UTC 2017 kill -USR1 1146 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1146 killed at Wed May 10 12:49:47 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:49:47 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:47 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1214 >/dev/null 2>/dev/null selfserv_9208 with PID 1214 found at Wed May 10 12:49:47 UTC 2017 selfserv_9208 with PID 1214 started at Wed May 10 12:49:47 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9907: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 1214 at Wed May 10 12:49:48 UTC 2017 kill -USR1 1214 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1214 killed at Wed May 10 12:49:48 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:49:48 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1270 >/dev/null 2>/dev/null selfserv_9208 with PID 1270 found at Wed May 10 12:49:48 UTC 2017 selfserv_9208 with PID 1270 started at Wed May 10 12:49:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9908: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 1270 at Wed May 10 12:49:49 UTC 2017 kill -USR1 1270 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1270 killed at Wed May 10 12:49:49 UTC 2017 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:49:49 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:49 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1326 >/dev/null 2>/dev/null selfserv_9208 with PID 1326 found at Wed May 10 12:49:49 UTC 2017 selfserv_9208 with PID 1326 started at Wed May 10 12:49:49 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9909: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 1326 at Wed May 10 12:49:50 UTC 2017 kill -USR1 1326 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1326 killed at Wed May 10 12:49:50 UTC 2017 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:49:50 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:50 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1396 >/dev/null 2>/dev/null selfserv_9208 with PID 1396 found at Wed May 10 12:49:50 UTC 2017 selfserv_9208 with PID 1396 started at Wed May 10 12:49:50 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9910: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 1396 at Wed May 10 12:49:50 UTC 2017 kill -USR1 1396 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1396 killed at Wed May 10 12:49:50 UTC 2017 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:49:50 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:50 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1452 >/dev/null 2>/dev/null selfserv_9208 with PID 1452 found at Wed May 10 12:49:50 UTC 2017 selfserv_9208 with PID 1452 started at Wed May 10 12:49:50 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9911: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 1452 at Wed May 10 12:49:51 UTC 2017 kill -USR1 1452 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1452 killed at Wed May 10 12:49:51 UTC 2017 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:49:51 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:51 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1508 >/dev/null 2>/dev/null selfserv_9208 with PID 1508 found at Wed May 10 12:49:51 UTC 2017 selfserv_9208 with PID 1508 started at Wed May 10 12:49:51 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9912: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 1508 at Wed May 10 12:49:52 UTC 2017 kill -USR1 1508 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1508 killed at Wed May 10 12:49:52 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:49:52 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:52 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1578 >/dev/null 2>/dev/null selfserv_9208 with PID 1578 found at Wed May 10 12:49:52 UTC 2017 selfserv_9208 with PID 1578 started at Wed May 10 12:49:52 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9913: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 1578 at Wed May 10 12:49:52 UTC 2017 kill -USR1 1578 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1578 killed at Wed May 10 12:49:52 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:49:52 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:52 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1634 >/dev/null 2>/dev/null selfserv_9208 with PID 1634 found at Wed May 10 12:49:52 UTC 2017 selfserv_9208 with PID 1634 started at Wed May 10 12:49:52 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9914: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 1634 at Wed May 10 12:49:53 UTC 2017 kill -USR1 1634 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1634 killed at Wed May 10 12:49:53 UTC 2017 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9208 starting at Wed May 10 12:49:53 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1692 >/dev/null 2>/dev/null selfserv_9208 with PID 1692 found at Wed May 10 12:49:53 UTC 2017 selfserv_9208 with PID 1692 started at Wed May 10 12:49:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9915: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 1692 at Wed May 10 12:49:54 UTC 2017 kill -USR1 1692 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1692 killed at Wed May 10 12:49:54 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:49:54 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:54 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1760 >/dev/null 2>/dev/null selfserv_9208 with PID 1760 found at Wed May 10 12:49:54 UTC 2017 selfserv_9208 with PID 1760 started at Wed May 10 12:49:54 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9916: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 1760 at Wed May 10 12:49:54 UTC 2017 kill -USR1 1760 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1760 killed at Wed May 10 12:49:54 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:49:55 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1816 >/dev/null 2>/dev/null selfserv_9208 with PID 1816 found at Wed May 10 12:49:55 UTC 2017 selfserv_9208 with PID 1816 started at Wed May 10 12:49:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9917: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 1816 at Wed May 10 12:49:55 UTC 2017 kill -USR1 1816 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1816 killed at Wed May 10 12:49:55 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:49:55 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1872 >/dev/null 2>/dev/null selfserv_9208 with PID 1872 found at Wed May 10 12:49:55 UTC 2017 selfserv_9208 with PID 1872 started at Wed May 10 12:49:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9918: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 1872 at Wed May 10 12:49:56 UTC 2017 kill -USR1 1872 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1872 killed at Wed May 10 12:49:56 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:49:56 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1940 >/dev/null 2>/dev/null selfserv_9208 with PID 1940 found at Wed May 10 12:49:56 UTC 2017 selfserv_9208 with PID 1940 started at Wed May 10 12:49:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9919: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 1940 at Wed May 10 12:49:57 UTC 2017 kill -USR1 1940 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1940 killed at Wed May 10 12:49:57 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:49:57 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 1996 >/dev/null 2>/dev/null selfserv_9208 with PID 1996 found at Wed May 10 12:49:57 UTC 2017 selfserv_9208 with PID 1996 started at Wed May 10 12:49:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9920: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 1996 at Wed May 10 12:49:58 UTC 2017 kill -USR1 1996 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 1996 killed at Wed May 10 12:49:58 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:49:58 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 2052 >/dev/null 2>/dev/null selfserv_9208 with PID 2052 found at Wed May 10 12:49:58 UTC 2017 selfserv_9208 with PID 2052 started at Wed May 10 12:49:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9921: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 2052 at Wed May 10 12:49:58 UTC 2017 kill -USR1 2052 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 2052 killed at Wed May 10 12:49:58 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:49:58 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 2120 >/dev/null 2>/dev/null selfserv_9208 with PID 2120 found at Wed May 10 12:49:58 UTC 2017 selfserv_9208 with PID 2120 started at Wed May 10 12:49:59 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9922: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 2120 at Wed May 10 12:49:59 UTC 2017 kill -USR1 2120 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 2120 killed at Wed May 10 12:49:59 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:49:59 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:49:59 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 2176 >/dev/null 2>/dev/null selfserv_9208 with PID 2176 found at Wed May 10 12:49:59 UTC 2017 selfserv_9208 with PID 2176 started at Wed May 10 12:49:59 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9923: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 2176 at Wed May 10 12:50:00 UTC 2017 kill -USR1 2176 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 2176 killed at Wed May 10 12:50:00 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:50:00 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 2232 >/dev/null 2>/dev/null selfserv_9208 with PID 2232 found at Wed May 10 12:50:00 UTC 2017 selfserv_9208 with PID 2232 started at Wed May 10 12:50:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9924: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 2232 at Wed May 10 12:50:01 UTC 2017 kill -USR1 2232 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 2232 killed at Wed May 10 12:50:01 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:50:01 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 2300 >/dev/null 2>/dev/null selfserv_9208 with PID 2300 found at Wed May 10 12:50:01 UTC 2017 selfserv_9208 with PID 2300 started at Wed May 10 12:50:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9925: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 2300 at Wed May 10 12:50:02 UTC 2017 kill -USR1 2300 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 2300 killed at Wed May 10 12:50:02 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:50:02 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 2356 >/dev/null 2>/dev/null selfserv_9208 with PID 2356 found at Wed May 10 12:50:02 UTC 2017 selfserv_9208 with PID 2356 started at Wed May 10 12:50:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9926: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 2356 at Wed May 10 12:50:02 UTC 2017 kill -USR1 2356 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 2356 killed at Wed May 10 12:50:03 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:50:03 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 2412 >/dev/null 2>/dev/null selfserv_9208 with PID 2412 found at Wed May 10 12:50:03 UTC 2017 selfserv_9208 with PID 2412 started at Wed May 10 12:50:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9927: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 2412 at Wed May 10 12:50:03 UTC 2017 kill -USR1 2412 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 2412 killed at Wed May 10 12:50:03 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:50:03 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 2480 >/dev/null 2>/dev/null selfserv_9208 with PID 2480 found at Wed May 10 12:50:03 UTC 2017 selfserv_9208 with PID 2480 started at Wed May 10 12:50:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9928: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 2480 at Wed May 10 12:50:04 UTC 2017 kill -USR1 2480 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 2480 killed at Wed May 10 12:50:04 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:50:04 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 2536 >/dev/null 2>/dev/null selfserv_9208 with PID 2536 found at Wed May 10 12:50:04 UTC 2017 selfserv_9208 with PID 2536 started at Wed May 10 12:50:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9929: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 2536 at Wed May 10 12:50:05 UTC 2017 kill -USR1 2536 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 2536 killed at Wed May 10 12:50:05 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:50:05 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:05 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 2592 >/dev/null 2>/dev/null selfserv_9208 with PID 2592 found at Wed May 10 12:50:05 UTC 2017 selfserv_9208 with PID 2592 started at Wed May 10 12:50:05 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9930: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 2592 at Wed May 10 12:50:06 UTC 2017 kill -USR1 2592 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 2592 killed at Wed May 10 12:50:06 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:50:06 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 2660 >/dev/null 2>/dev/null selfserv_9208 with PID 2660 found at Wed May 10 12:50:06 UTC 2017 selfserv_9208 with PID 2660 started at Wed May 10 12:50:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9931: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 2660 at Wed May 10 12:50:07 UTC 2017 kill -USR1 2660 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 2660 killed at Wed May 10 12:50:07 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:50:07 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 2716 >/dev/null 2>/dev/null selfserv_9208 with PID 2716 found at Wed May 10 12:50:07 UTC 2017 selfserv_9208 with PID 2716 started at Wed May 10 12:50:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9932: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 2716 at Wed May 10 12:50:07 UTC 2017 kill -USR1 2716 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 2716 killed at Wed May 10 12:50:07 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:50:07 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 2772 >/dev/null 2>/dev/null selfserv_9208 with PID 2772 found at Wed May 10 12:50:08 UTC 2017 selfserv_9208 with PID 2772 started at Wed May 10 12:50:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9933: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 2772 at Wed May 10 12:50:08 UTC 2017 kill -USR1 2772 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 2772 killed at Wed May 10 12:50:08 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:50:08 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 2840 >/dev/null 2>/dev/null selfserv_9208 with PID 2840 found at Wed May 10 12:50:08 UTC 2017 selfserv_9208 with PID 2840 started at Wed May 10 12:50:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9934: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 2840 at Wed May 10 12:50:09 UTC 2017 kill -USR1 2840 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 2840 killed at Wed May 10 12:50:09 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:50:09 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 2896 >/dev/null 2>/dev/null selfserv_9208 with PID 2896 found at Wed May 10 12:50:09 UTC 2017 selfserv_9208 with PID 2896 started at Wed May 10 12:50:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9935: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 2896 at Wed May 10 12:50:10 UTC 2017 kill -USR1 2896 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 2896 killed at Wed May 10 12:50:10 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:50:10 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 2952 >/dev/null 2>/dev/null selfserv_9208 with PID 2952 found at Wed May 10 12:50:10 UTC 2017 selfserv_9208 with PID 2952 started at Wed May 10 12:50:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9936: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 2952 at Wed May 10 12:50:11 UTC 2017 kill -USR1 2952 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 2952 killed at Wed May 10 12:50:11 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:50:11 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 3020 >/dev/null 2>/dev/null selfserv_9208 with PID 3020 found at Wed May 10 12:50:11 UTC 2017 selfserv_9208 with PID 3020 started at Wed May 10 12:50:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9937: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 3020 at Wed May 10 12:50:12 UTC 2017 kill -USR1 3020 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 3020 killed at Wed May 10 12:50:12 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:50:12 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 3076 >/dev/null 2>/dev/null selfserv_9208 with PID 3076 found at Wed May 10 12:50:12 UTC 2017 selfserv_9208 with PID 3076 started at Wed May 10 12:50:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9938: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 3076 at Wed May 10 12:50:13 UTC 2017 kill -USR1 3076 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 3076 killed at Wed May 10 12:50:13 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:50:13 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 3132 >/dev/null 2>/dev/null selfserv_9208 with PID 3132 found at Wed May 10 12:50:13 UTC 2017 selfserv_9208 with PID 3132 started at Wed May 10 12:50:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9939: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 3132 at Wed May 10 12:50:13 UTC 2017 kill -USR1 3132 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 3132 killed at Wed May 10 12:50:13 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:50:14 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 3200 >/dev/null 2>/dev/null selfserv_9208 with PID 3200 found at Wed May 10 12:50:14 UTC 2017 selfserv_9208 with PID 3200 started at Wed May 10 12:50:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9940: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 3200 at Wed May 10 12:50:14 UTC 2017 kill -USR1 3200 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 3200 killed at Wed May 10 12:50:14 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:50:14 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 3256 >/dev/null 2>/dev/null selfserv_9208 with PID 3256 found at Wed May 10 12:50:14 UTC 2017 selfserv_9208 with PID 3256 started at Wed May 10 12:50:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9941: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 3256 at Wed May 10 12:50:15 UTC 2017 kill -USR1 3256 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 3256 killed at Wed May 10 12:50:15 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:50:15 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 3312 >/dev/null 2>/dev/null selfserv_9208 with PID 3312 found at Wed May 10 12:50:15 UTC 2017 selfserv_9208 with PID 3312 started at Wed May 10 12:50:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9942: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 3312 at Wed May 10 12:50:16 UTC 2017 kill -USR1 3312 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 3312 killed at Wed May 10 12:50:16 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:50:16 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 3380 >/dev/null 2>/dev/null selfserv_9208 with PID 3380 found at Wed May 10 12:50:16 UTC 2017 selfserv_9208 with PID 3380 started at Wed May 10 12:50:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9943: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 3380 at Wed May 10 12:50:17 UTC 2017 kill -USR1 3380 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 3380 killed at Wed May 10 12:50:17 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:50:17 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:17 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 3436 >/dev/null 2>/dev/null selfserv_9208 with PID 3436 found at Wed May 10 12:50:17 UTC 2017 selfserv_9208 with PID 3436 started at Wed May 10 12:50:17 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9944: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 3436 at Wed May 10 12:50:18 UTC 2017 kill -USR1 3436 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 3436 killed at Wed May 10 12:50:18 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:50:18 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 3492 >/dev/null 2>/dev/null selfserv_9208 with PID 3492 found at Wed May 10 12:50:18 UTC 2017 selfserv_9208 with PID 3492 started at Wed May 10 12:50:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9945: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 3492 at Wed May 10 12:50:19 UTC 2017 kill -USR1 3492 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 3492 killed at Wed May 10 12:50:19 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:50:19 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:19 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 3560 >/dev/null 2>/dev/null selfserv_9208 with PID 3560 found at Wed May 10 12:50:19 UTC 2017 selfserv_9208 with PID 3560 started at Wed May 10 12:50:19 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9946: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 3560 at Wed May 10 12:50:20 UTC 2017 kill -USR1 3560 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 3560 killed at Wed May 10 12:50:20 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:50:20 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 3616 >/dev/null 2>/dev/null selfserv_9208 with PID 3616 found at Wed May 10 12:50:20 UTC 2017 selfserv_9208 with PID 3616 started at Wed May 10 12:50:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9947: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 3616 at Wed May 10 12:50:21 UTC 2017 kill -USR1 3616 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 3616 killed at Wed May 10 12:50:21 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:50:21 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 3672 >/dev/null 2>/dev/null selfserv_9208 with PID 3672 found at Wed May 10 12:50:21 UTC 2017 selfserv_9208 with PID 3672 started at Wed May 10 12:50:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9948: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 3672 at Wed May 10 12:50:21 UTC 2017 kill -USR1 3672 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 3672 killed at Wed May 10 12:50:21 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:50:22 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 3740 >/dev/null 2>/dev/null selfserv_9208 with PID 3740 found at Wed May 10 12:50:22 UTC 2017 selfserv_9208 with PID 3740 started at Wed May 10 12:50:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9949: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 3740 at Wed May 10 12:50:22 UTC 2017 kill -USR1 3740 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 3740 killed at Wed May 10 12:50:22 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:50:22 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 3796 >/dev/null 2>/dev/null selfserv_9208 with PID 3796 found at Wed May 10 12:50:22 UTC 2017 selfserv_9208 with PID 3796 started at Wed May 10 12:50:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9950: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 3796 at Wed May 10 12:50:23 UTC 2017 kill -USR1 3796 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 3796 killed at Wed May 10 12:50:23 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:50:23 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 3852 >/dev/null 2>/dev/null selfserv_9208 with PID 3852 found at Wed May 10 12:50:23 UTC 2017 selfserv_9208 with PID 3852 started at Wed May 10 12:50:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9951: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 3852 at Wed May 10 12:50:24 UTC 2017 kill -USR1 3852 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 3852 killed at Wed May 10 12:50:24 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:50:24 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:24 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 3920 >/dev/null 2>/dev/null selfserv_9208 with PID 3920 found at Wed May 10 12:50:24 UTC 2017 selfserv_9208 with PID 3920 started at Wed May 10 12:50:24 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9952: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 3920 at Wed May 10 12:50:25 UTC 2017 kill -USR1 3920 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 3920 killed at Wed May 10 12:50:25 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:50:25 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:25 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 3976 >/dev/null 2>/dev/null selfserv_9208 with PID 3976 found at Wed May 10 12:50:25 UTC 2017 selfserv_9208 with PID 3976 started at Wed May 10 12:50:25 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9953: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 3976 at Wed May 10 12:50:26 UTC 2017 kill -USR1 3976 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 3976 killed at Wed May 10 12:50:26 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:50:26 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:26 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 4032 >/dev/null 2>/dev/null selfserv_9208 with PID 4032 found at Wed May 10 12:50:26 UTC 2017 selfserv_9208 with PID 4032 started at Wed May 10 12:50:26 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9954: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 4032 at Wed May 10 12:50:27 UTC 2017 kill -USR1 4032 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 4032 killed at Wed May 10 12:50:27 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:50:27 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:27 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 4100 >/dev/null 2>/dev/null selfserv_9208 with PID 4100 found at Wed May 10 12:50:27 UTC 2017 selfserv_9208 with PID 4100 started at Wed May 10 12:50:27 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9955: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 4100 at Wed May 10 12:50:28 UTC 2017 kill -USR1 4100 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 4100 killed at Wed May 10 12:50:28 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:50:28 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:28 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 4156 >/dev/null 2>/dev/null selfserv_9208 with PID 4156 found at Wed May 10 12:50:28 UTC 2017 selfserv_9208 with PID 4156 started at Wed May 10 12:50:28 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9956: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 4156 at Wed May 10 12:50:28 UTC 2017 kill -USR1 4156 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 4156 killed at Wed May 10 12:50:28 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:50:28 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:28 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 4212 >/dev/null 2>/dev/null selfserv_9208 with PID 4212 found at Wed May 10 12:50:28 UTC 2017 selfserv_9208 with PID 4212 started at Wed May 10 12:50:28 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9957: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 4212 at Wed May 10 12:50:29 UTC 2017 kill -USR1 4212 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 4212 killed at Wed May 10 12:50:29 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:50:29 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:29 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 4280 >/dev/null 2>/dev/null selfserv_9208 with PID 4280 found at Wed May 10 12:50:29 UTC 2017 selfserv_9208 with PID 4280 started at Wed May 10 12:50:29 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9958: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 4280 at Wed May 10 12:50:30 UTC 2017 kill -USR1 4280 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 4280 killed at Wed May 10 12:50:30 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:50:30 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:30 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 4336 >/dev/null 2>/dev/null selfserv_9208 with PID 4336 found at Wed May 10 12:50:30 UTC 2017 selfserv_9208 with PID 4336 started at Wed May 10 12:50:30 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9959: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 4336 at Wed May 10 12:50:31 UTC 2017 kill -USR1 4336 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 4336 killed at Wed May 10 12:50:31 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:50:31 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:31 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 4393 >/dev/null 2>/dev/null selfserv_9208 with PID 4393 found at Wed May 10 12:50:31 UTC 2017 selfserv_9208 with PID 4393 started at Wed May 10 12:50:31 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9960: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 4393 at Wed May 10 12:50:31 UTC 2017 kill -USR1 4393 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 4393 killed at Wed May 10 12:50:31 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:50:32 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:32 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 4461 >/dev/null 2>/dev/null selfserv_9208 with PID 4461 found at Wed May 10 12:50:32 UTC 2017 selfserv_9208 with PID 4461 started at Wed May 10 12:50:32 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9961: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 4461 at Wed May 10 12:50:32 UTC 2017 kill -USR1 4461 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 4461 killed at Wed May 10 12:50:32 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:50:32 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:32 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 4517 >/dev/null 2>/dev/null selfserv_9208 with PID 4517 found at Wed May 10 12:50:32 UTC 2017 selfserv_9208 with PID 4517 started at Wed May 10 12:50:32 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9962: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 4517 at Wed May 10 12:50:33 UTC 2017 kill -USR1 4517 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 4517 killed at Wed May 10 12:50:33 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:50:33 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:33 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 4573 >/dev/null 2>/dev/null selfserv_9208 with PID 4573 found at Wed May 10 12:50:33 UTC 2017 selfserv_9208 with PID 4573 started at Wed May 10 12:50:33 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9963: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 4573 at Wed May 10 12:50:34 UTC 2017 kill -USR1 4573 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 4573 killed at Wed May 10 12:50:34 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:50:34 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:34 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 4641 >/dev/null 2>/dev/null selfserv_9208 with PID 4641 found at Wed May 10 12:50:34 UTC 2017 selfserv_9208 with PID 4641 started at Wed May 10 12:50:34 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9964: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 4641 at Wed May 10 12:50:35 UTC 2017 kill -USR1 4641 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 4641 killed at Wed May 10 12:50:35 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:50:35 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:35 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 4697 >/dev/null 2>/dev/null selfserv_9208 with PID 4697 found at Wed May 10 12:50:35 UTC 2017 selfserv_9208 with PID 4697 started at Wed May 10 12:50:35 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9965: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 4697 at Wed May 10 12:50:36 UTC 2017 kill -USR1 4697 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 4697 killed at Wed May 10 12:50:36 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9208 starting at Wed May 10 12:50:36 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:36 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 4753 >/dev/null 2>/dev/null selfserv_9208 with PID 4753 found at Wed May 10 12:50:36 UTC 2017 selfserv_9208 with PID 4753 started at Wed May 10 12:50:36 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9966: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 4753 at Wed May 10 12:50:36 UTC 2017 kill -USR1 4753 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 4753 killed at Wed May 10 12:50:36 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:50:36 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:36 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 4821 >/dev/null 2>/dev/null selfserv_9208 with PID 4821 found at Wed May 10 12:50:36 UTC 2017 selfserv_9208 with PID 4821 started at Wed May 10 12:50:36 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9967: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 4821 at Wed May 10 12:50:37 UTC 2017 kill -USR1 4821 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 4821 killed at Wed May 10 12:50:37 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:50:37 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:37 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 4877 >/dev/null 2>/dev/null selfserv_9208 with PID 4877 found at Wed May 10 12:50:37 UTC 2017 selfserv_9208 with PID 4877 started at Wed May 10 12:50:37 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9968: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 4877 at Wed May 10 12:50:38 UTC 2017 kill -USR1 4877 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 4877 killed at Wed May 10 12:50:38 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9208 starting at Wed May 10 12:50:38 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:38 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 4933 >/dev/null 2>/dev/null selfserv_9208 with PID 4933 found at Wed May 10 12:50:38 UTC 2017 selfserv_9208 with PID 4933 started at Wed May 10 12:50:38 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9969: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 4933 at Wed May 10 12:50:39 UTC 2017 kill -USR1 4933 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 4933 killed at Wed May 10 12:50:39 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:50:39 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:39 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5001 >/dev/null 2>/dev/null selfserv_9208 with PID 5001 found at Wed May 10 12:50:39 UTC 2017 selfserv_9208 with PID 5001 started at Wed May 10 12:50:39 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9970: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 5001 at Wed May 10 12:50:39 UTC 2017 kill -USR1 5001 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5001 killed at Wed May 10 12:50:39 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:50:40 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:40 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5057 >/dev/null 2>/dev/null selfserv_9208 with PID 5057 found at Wed May 10 12:50:40 UTC 2017 selfserv_9208 with PID 5057 started at Wed May 10 12:50:40 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9971: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 5057 at Wed May 10 12:50:40 UTC 2017 kill -USR1 5057 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5057 killed at Wed May 10 12:50:40 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:50:40 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:40 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5113 >/dev/null 2>/dev/null selfserv_9208 with PID 5113 found at Wed May 10 12:50:40 UTC 2017 selfserv_9208 with PID 5113 started at Wed May 10 12:50:40 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9972: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 5113 at Wed May 10 12:50:41 UTC 2017 kill -USR1 5113 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5113 killed at Wed May 10 12:50:41 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:50:41 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:41 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5190 >/dev/null 2>/dev/null selfserv_9208 with PID 5190 found at Wed May 10 12:50:41 UTC 2017 selfserv_9208 with PID 5190 started at Wed May 10 12:50:41 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9973: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 5190 at Wed May 10 12:50:42 UTC 2017 kill -USR1 5190 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5190 killed at Wed May 10 12:50:42 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:50:42 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:42 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5246 >/dev/null 2>/dev/null selfserv_9208 with PID 5246 found at Wed May 10 12:50:42 UTC 2017 selfserv_9208 with PID 5246 started at Wed May 10 12:50:42 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9974: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 5246 at Wed May 10 12:50:43 UTC 2017 kill -USR1 5246 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5246 killed at Wed May 10 12:50:43 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:50:43 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:43 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5302 >/dev/null 2>/dev/null selfserv_9208 with PID 5302 found at Wed May 10 12:50:43 UTC 2017 selfserv_9208 with PID 5302 started at Wed May 10 12:50:43 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9975: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 5302 at Wed May 10 12:50:43 UTC 2017 kill -USR1 5302 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5302 killed at Wed May 10 12:50:43 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:50:44 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:44 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5370 >/dev/null 2>/dev/null selfserv_9208 with PID 5370 found at Wed May 10 12:50:44 UTC 2017 selfserv_9208 with PID 5370 started at Wed May 10 12:50:44 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9976: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 5370 at Wed May 10 12:50:44 UTC 2017 kill -USR1 5370 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5370 killed at Wed May 10 12:50:44 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:50:44 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:44 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5426 >/dev/null 2>/dev/null selfserv_9208 with PID 5426 found at Wed May 10 12:50:44 UTC 2017 selfserv_9208 with PID 5426 started at Wed May 10 12:50:44 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9977: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 5426 at Wed May 10 12:50:45 UTC 2017 kill -USR1 5426 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5426 killed at Wed May 10 12:50:45 UTC 2017 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:50:45 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:45 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5482 >/dev/null 2>/dev/null selfserv_9208 with PID 5482 found at Wed May 10 12:50:45 UTC 2017 selfserv_9208 with PID 5482 started at Wed May 10 12:50:45 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9978: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 5482 at Wed May 10 12:50:46 UTC 2017 kill -USR1 5482 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5482 killed at Wed May 10 12:50:46 UTC 2017 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:50:46 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:46 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5550 >/dev/null 2>/dev/null selfserv_9208 with PID 5550 found at Wed May 10 12:50:46 UTC 2017 selfserv_9208 with PID 5550 started at Wed May 10 12:50:46 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9979: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 5550 at Wed May 10 12:50:47 UTC 2017 kill -USR1 5550 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5550 killed at Wed May 10 12:50:47 UTC 2017 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:50:47 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:47 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5606 >/dev/null 2>/dev/null selfserv_9208 with PID 5606 found at Wed May 10 12:50:47 UTC 2017 selfserv_9208 with PID 5606 started at Wed May 10 12:50:47 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9980: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 5606 at Wed May 10 12:50:47 UTC 2017 kill -USR1 5606 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5606 killed at Wed May 10 12:50:48 UTC 2017 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:50:48 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5662 >/dev/null 2>/dev/null selfserv_9208 with PID 5662 found at Wed May 10 12:50:48 UTC 2017 selfserv_9208 with PID 5662 started at Wed May 10 12:50:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9981: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 5662 at Wed May 10 12:50:48 UTC 2017 kill -USR1 5662 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5662 killed at Wed May 10 12:50:48 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:50:48 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:48 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5730 >/dev/null 2>/dev/null selfserv_9208 with PID 5730 found at Wed May 10 12:50:48 UTC 2017 selfserv_9208 with PID 5730 started at Wed May 10 12:50:49 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9982: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 5730 at Wed May 10 12:50:49 UTC 2017 kill -USR1 5730 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5730 killed at Wed May 10 12:50:49 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:50:49 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:49 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5786 >/dev/null 2>/dev/null selfserv_9208 with PID 5786 found at Wed May 10 12:50:49 UTC 2017 selfserv_9208 with PID 5786 started at Wed May 10 12:50:49 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9983: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 5786 at Wed May 10 12:50:50 UTC 2017 kill -USR1 5786 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5786 killed at Wed May 10 12:50:50 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:50:50 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:50 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5843 >/dev/null 2>/dev/null selfserv_9208 with PID 5843 found at Wed May 10 12:50:50 UTC 2017 selfserv_9208 with PID 5843 started at Wed May 10 12:50:50 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9984: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 5843 at Wed May 10 12:50:51 UTC 2017 kill -USR1 5843 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5843 killed at Wed May 10 12:50:51 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:50:51 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:51 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5912 >/dev/null 2>/dev/null selfserv_9208 with PID 5912 found at Wed May 10 12:50:51 UTC 2017 selfserv_9208 with PID 5912 started at Wed May 10 12:50:51 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9985: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 5912 at Wed May 10 12:50:52 UTC 2017 kill -USR1 5912 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5912 killed at Wed May 10 12:50:52 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:50:52 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:52 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 5968 >/dev/null 2>/dev/null selfserv_9208 with PID 5968 found at Wed May 10 12:50:52 UTC 2017 selfserv_9208 with PID 5968 started at Wed May 10 12:50:52 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9986: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 5968 at Wed May 10 12:50:52 UTC 2017 kill -USR1 5968 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 5968 killed at Wed May 10 12:50:52 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:50:53 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6024 >/dev/null 2>/dev/null selfserv_9208 with PID 6024 found at Wed May 10 12:50:53 UTC 2017 selfserv_9208 with PID 6024 started at Wed May 10 12:50:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9987: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 6024 at Wed May 10 12:50:53 UTC 2017 kill -USR1 6024 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6024 killed at Wed May 10 12:50:53 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:50:53 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6092 >/dev/null 2>/dev/null selfserv_9208 with PID 6092 found at Wed May 10 12:50:53 UTC 2017 selfserv_9208 with PID 6092 started at Wed May 10 12:50:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9988: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 6092 at Wed May 10 12:50:54 UTC 2017 kill -USR1 6092 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6092 killed at Wed May 10 12:50:54 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:50:54 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:54 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6148 >/dev/null 2>/dev/null selfserv_9208 with PID 6148 found at Wed May 10 12:50:54 UTC 2017 selfserv_9208 with PID 6148 started at Wed May 10 12:50:54 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9989: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 6148 at Wed May 10 12:50:55 UTC 2017 kill -USR1 6148 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6148 killed at Wed May 10 12:50:55 UTC 2017 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:50:55 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6204 >/dev/null 2>/dev/null selfserv_9208 with PID 6204 found at Wed May 10 12:50:55 UTC 2017 selfserv_9208 with PID 6204 started at Wed May 10 12:50:55 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9990: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 6204 at Wed May 10 12:50:56 UTC 2017 kill -USR1 6204 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6204 killed at Wed May 10 12:50:56 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:50:56 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6272 >/dev/null 2>/dev/null selfserv_9208 with PID 6272 found at Wed May 10 12:50:56 UTC 2017 selfserv_9208 with PID 6272 started at Wed May 10 12:50:56 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9991: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 6272 at Wed May 10 12:50:56 UTC 2017 kill -USR1 6272 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6272 killed at Wed May 10 12:50:56 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:50:57 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6328 >/dev/null 2>/dev/null selfserv_9208 with PID 6328 found at Wed May 10 12:50:57 UTC 2017 selfserv_9208 with PID 6328 started at Wed May 10 12:50:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9992: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 6328 at Wed May 10 12:50:57 UTC 2017 kill -USR1 6328 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6328 killed at Wed May 10 12:50:57 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:50:57 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6384 >/dev/null 2>/dev/null selfserv_9208 with PID 6384 found at Wed May 10 12:50:57 UTC 2017 selfserv_9208 with PID 6384 started at Wed May 10 12:50:57 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #9993: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 6384 at Wed May 10 12:50:58 UTC 2017 kill -USR1 6384 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6384 killed at Wed May 10 12:50:58 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:50:58 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6452 >/dev/null 2>/dev/null selfserv_9208 with PID 6452 found at Wed May 10 12:50:58 UTC 2017 selfserv_9208 with PID 6452 started at Wed May 10 12:50:58 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9994: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 6452 at Wed May 10 12:50:59 UTC 2017 kill -USR1 6452 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6452 killed at Wed May 10 12:50:59 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:50:59 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:50:59 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6508 >/dev/null 2>/dev/null selfserv_9208 with PID 6508 found at Wed May 10 12:50:59 UTC 2017 selfserv_9208 with PID 6508 started at Wed May 10 12:50:59 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9995: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 6508 at Wed May 10 12:50:59 UTC 2017 kill -USR1 6508 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6508 killed at Wed May 10 12:51:00 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:51:00 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6564 >/dev/null 2>/dev/null selfserv_9208 with PID 6564 found at Wed May 10 12:51:00 UTC 2017 selfserv_9208 with PID 6564 started at Wed May 10 12:51:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9996: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 6564 at Wed May 10 12:51:00 UTC 2017 kill -USR1 6564 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6564 killed at Wed May 10 12:51:00 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:51:00 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6632 >/dev/null 2>/dev/null selfserv_9208 with PID 6632 found at Wed May 10 12:51:00 UTC 2017 selfserv_9208 with PID 6632 started at Wed May 10 12:51:00 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9997: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 6632 at Wed May 10 12:51:01 UTC 2017 kill -USR1 6632 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6632 killed at Wed May 10 12:51:01 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:51:01 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6688 >/dev/null 2>/dev/null selfserv_9208 with PID 6688 found at Wed May 10 12:51:01 UTC 2017 selfserv_9208 with PID 6688 started at Wed May 10 12:51:01 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9998: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 6688 at Wed May 10 12:51:02 UTC 2017 kill -USR1 6688 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6688 killed at Wed May 10 12:51:02 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:51:02 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6744 >/dev/null 2>/dev/null selfserv_9208 with PID 6744 found at Wed May 10 12:51:02 UTC 2017 selfserv_9208 with PID 6744 started at Wed May 10 12:51:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #9999: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 6744 at Wed May 10 12:51:03 UTC 2017 kill -USR1 6744 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6744 killed at Wed May 10 12:51:03 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:51:03 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6812 >/dev/null 2>/dev/null selfserv_9208 with PID 6812 found at Wed May 10 12:51:03 UTC 2017 selfserv_9208 with PID 6812 started at Wed May 10 12:51:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #10000: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 6812 at Wed May 10 12:51:04 UTC 2017 kill -USR1 6812 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6812 killed at Wed May 10 12:51:04 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:51:04 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6874 >/dev/null 2>/dev/null selfserv_9208 with PID 6874 found at Wed May 10 12:51:04 UTC 2017 selfserv_9208 with PID 6874 started at Wed May 10 12:51:04 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #10001: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 6874 at Wed May 10 12:51:05 UTC 2017 kill -USR1 6874 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6874 killed at Wed May 10 12:51:05 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:51:05 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:05 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 6932 >/dev/null 2>/dev/null selfserv_9208 with PID 6932 found at Wed May 10 12:51:05 UTC 2017 selfserv_9208 with PID 6932 started at Wed May 10 12:51:05 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #10002: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 6932 at Wed May 10 12:51:06 UTC 2017 kill -USR1 6932 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 6932 killed at Wed May 10 12:51:06 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:51:06 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7004 >/dev/null 2>/dev/null selfserv_9208 with PID 7004 found at Wed May 10 12:51:06 UTC 2017 selfserv_9208 with PID 7004 started at Wed May 10 12:51:06 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10003: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 7004 at Wed May 10 12:51:06 UTC 2017 kill -USR1 7004 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7004 killed at Wed May 10 12:51:06 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:51:07 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7060 >/dev/null 2>/dev/null selfserv_9208 with PID 7060 found at Wed May 10 12:51:07 UTC 2017 selfserv_9208 with PID 7060 started at Wed May 10 12:51:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10004: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 7060 at Wed May 10 12:51:07 UTC 2017 kill -USR1 7060 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7060 killed at Wed May 10 12:51:07 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:51:07 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7116 >/dev/null 2>/dev/null selfserv_9208 with PID 7116 found at Wed May 10 12:51:07 UTC 2017 selfserv_9208 with PID 7116 started at Wed May 10 12:51:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10005: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 7116 at Wed May 10 12:51:08 UTC 2017 kill -USR1 7116 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7116 killed at Wed May 10 12:51:08 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:51:08 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7184 >/dev/null 2>/dev/null selfserv_9208 with PID 7184 found at Wed May 10 12:51:08 UTC 2017 selfserv_9208 with PID 7184 started at Wed May 10 12:51:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #10006: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 7184 at Wed May 10 12:51:09 UTC 2017 kill -USR1 7184 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7184 killed at Wed May 10 12:51:09 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:51:09 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7240 >/dev/null 2>/dev/null selfserv_9208 with PID 7240 found at Wed May 10 12:51:09 UTC 2017 selfserv_9208 with PID 7240 started at Wed May 10 12:51:09 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #10007: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 7240 at Wed May 10 12:51:10 UTC 2017 kill -USR1 7240 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7240 killed at Wed May 10 12:51:10 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:51:10 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7296 >/dev/null 2>/dev/null selfserv_9208 with PID 7296 found at Wed May 10 12:51:10 UTC 2017 selfserv_9208 with PID 7296 started at Wed May 10 12:51:10 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #10008: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 7296 at Wed May 10 12:51:11 UTC 2017 kill -USR1 7296 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7296 killed at Wed May 10 12:51:11 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:51:11 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7364 >/dev/null 2>/dev/null selfserv_9208 with PID 7364 found at Wed May 10 12:51:11 UTC 2017 selfserv_9208 with PID 7364 started at Wed May 10 12:51:11 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #10009: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 7364 at Wed May 10 12:51:12 UTC 2017 kill -USR1 7364 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7364 killed at Wed May 10 12:51:12 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:51:12 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7420 >/dev/null 2>/dev/null selfserv_9208 with PID 7420 found at Wed May 10 12:51:12 UTC 2017 selfserv_9208 with PID 7420 started at Wed May 10 12:51:12 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #10010: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 7420 at Wed May 10 12:51:13 UTC 2017 kill -USR1 7420 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7420 killed at Wed May 10 12:51:13 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:51:13 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7476 >/dev/null 2>/dev/null selfserv_9208 with PID 7476 found at Wed May 10 12:51:13 UTC 2017 selfserv_9208 with PID 7476 started at Wed May 10 12:51:13 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #10011: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 7476 at Wed May 10 12:51:14 UTC 2017 kill -USR1 7476 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7476 killed at Wed May 10 12:51:14 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:51:14 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7544 >/dev/null 2>/dev/null selfserv_9208 with PID 7544 found at Wed May 10 12:51:14 UTC 2017 selfserv_9208 with PID 7544 started at Wed May 10 12:51:14 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #10012: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 7544 at Wed May 10 12:51:14 UTC 2017 kill -USR1 7544 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7544 killed at Wed May 10 12:51:15 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:51:15 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7600 >/dev/null 2>/dev/null selfserv_9208 with PID 7600 found at Wed May 10 12:51:15 UTC 2017 selfserv_9208 with PID 7600 started at Wed May 10 12:51:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #10013: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 7600 at Wed May 10 12:51:15 UTC 2017 kill -USR1 7600 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7600 killed at Wed May 10 12:51:15 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:51:16 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7656 >/dev/null 2>/dev/null selfserv_9208 with PID 7656 found at Wed May 10 12:51:16 UTC 2017 selfserv_9208 with PID 7656 started at Wed May 10 12:51:16 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #10014: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 7656 at Wed May 10 12:51:16 UTC 2017 kill -USR1 7656 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7656 killed at Wed May 10 12:51:16 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:51:17 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:17 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7724 >/dev/null 2>/dev/null selfserv_9208 with PID 7724 found at Wed May 10 12:51:17 UTC 2017 selfserv_9208 with PID 7724 started at Wed May 10 12:51:17 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10015: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 7724 at Wed May 10 12:51:17 UTC 2017 kill -USR1 7724 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7724 killed at Wed May 10 12:51:17 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:51:17 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:17 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7780 >/dev/null 2>/dev/null selfserv_9208 with PID 7780 found at Wed May 10 12:51:17 UTC 2017 selfserv_9208 with PID 7780 started at Wed May 10 12:51:17 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10016: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 7780 at Wed May 10 12:51:18 UTC 2017 kill -USR1 7780 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7780 killed at Wed May 10 12:51:18 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:51:18 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7836 >/dev/null 2>/dev/null selfserv_9208 with PID 7836 found at Wed May 10 12:51:18 UTC 2017 selfserv_9208 with PID 7836 started at Wed May 10 12:51:18 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10017: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 7836 at Wed May 10 12:51:19 UTC 2017 kill -USR1 7836 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7836 killed at Wed May 10 12:51:19 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:51:19 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:19 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7904 >/dev/null 2>/dev/null selfserv_9208 with PID 7904 found at Wed May 10 12:51:19 UTC 2017 selfserv_9208 with PID 7904 started at Wed May 10 12:51:19 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #10018: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 7904 at Wed May 10 12:51:20 UTC 2017 kill -USR1 7904 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7904 killed at Wed May 10 12:51:20 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:51:20 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 7960 >/dev/null 2>/dev/null selfserv_9208 with PID 7960 found at Wed May 10 12:51:20 UTC 2017 selfserv_9208 with PID 7960 started at Wed May 10 12:51:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #10019: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 7960 at Wed May 10 12:51:21 UTC 2017 kill -USR1 7960 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 7960 killed at Wed May 10 12:51:21 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:51:21 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 8016 >/dev/null 2>/dev/null selfserv_9208 with PID 8016 found at Wed May 10 12:51:21 UTC 2017 selfserv_9208 with PID 8016 started at Wed May 10 12:51:21 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #10020: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 8016 at Wed May 10 12:51:22 UTC 2017 kill -USR1 8016 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 8016 killed at Wed May 10 12:51:22 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:51:22 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 8084 >/dev/null 2>/dev/null selfserv_9208 with PID 8084 found at Wed May 10 12:51:22 UTC 2017 selfserv_9208 with PID 8084 started at Wed May 10 12:51:22 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #10021: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 8084 at Wed May 10 12:51:23 UTC 2017 kill -USR1 8084 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 8084 killed at Wed May 10 12:51:23 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:51:23 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 8140 >/dev/null 2>/dev/null selfserv_9208 with PID 8140 found at Wed May 10 12:51:23 UTC 2017 selfserv_9208 with PID 8140 started at Wed May 10 12:51:23 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #10022: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 8140 at Wed May 10 12:51:24 UTC 2017 kill -USR1 8140 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 8140 killed at Wed May 10 12:51:24 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:51:24 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:24 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 8196 >/dev/null 2>/dev/null selfserv_9208 with PID 8196 found at Wed May 10 12:51:24 UTC 2017 selfserv_9208 with PID 8196 started at Wed May 10 12:51:24 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #10023: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 8196 at Wed May 10 12:51:25 UTC 2017 kill -USR1 8196 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 8196 killed at Wed May 10 12:51:25 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:51:25 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:25 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 8264 >/dev/null 2>/dev/null selfserv_9208 with PID 8264 found at Wed May 10 12:51:25 UTC 2017 selfserv_9208 with PID 8264 started at Wed May 10 12:51:25 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #10024: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 8264 at Wed May 10 12:51:26 UTC 2017 kill -USR1 8264 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 8264 killed at Wed May 10 12:51:26 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:51:26 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:26 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 8320 >/dev/null 2>/dev/null selfserv_9208 with PID 8320 found at Wed May 10 12:51:26 UTC 2017 selfserv_9208 with PID 8320 started at Wed May 10 12:51:26 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #10025: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 8320 at Wed May 10 12:51:27 UTC 2017 kill -USR1 8320 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 8320 killed at Wed May 10 12:51:27 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:51:27 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:27 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 8376 >/dev/null 2>/dev/null selfserv_9208 with PID 8376 found at Wed May 10 12:51:27 UTC 2017 selfserv_9208 with PID 8376 started at Wed May 10 12:51:27 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #10026: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 8376 at Wed May 10 12:51:28 UTC 2017 kill -USR1 8376 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 8376 killed at Wed May 10 12:51:28 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:51:28 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:28 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 8444 >/dev/null 2>/dev/null selfserv_9208 with PID 8444 found at Wed May 10 12:51:28 UTC 2017 selfserv_9208 with PID 8444 started at Wed May 10 12:51:28 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10027: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 8444 at Wed May 10 12:51:29 UTC 2017 kill -USR1 8444 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 8444 killed at Wed May 10 12:51:29 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:51:29 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:29 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 8500 >/dev/null 2>/dev/null selfserv_9208 with PID 8500 found at Wed May 10 12:51:29 UTC 2017 selfserv_9208 with PID 8500 started at Wed May 10 12:51:29 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10028: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 8500 at Wed May 10 12:51:29 UTC 2017 kill -USR1 8500 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 8500 killed at Wed May 10 12:51:29 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9208 starting at Wed May 10 12:51:30 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:30 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 8556 >/dev/null 2>/dev/null selfserv_9208 with PID 8556 found at Wed May 10 12:51:30 UTC 2017 selfserv_9208 with PID 8556 started at Wed May 10 12:51:30 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10029: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 8556 at Wed May 10 12:51:30 UTC 2017 kill -USR1 8556 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 8556 killed at Wed May 10 12:51:30 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:51:30 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:30 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 8624 >/dev/null 2>/dev/null selfserv_9208 with PID 8624 found at Wed May 10 12:51:30 UTC 2017 selfserv_9208 with PID 8624 started at Wed May 10 12:51:30 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #10030: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 8624 at Wed May 10 12:51:31 UTC 2017 kill -USR1 8624 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 8624 killed at Wed May 10 12:51:31 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:51:31 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:31 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 8680 >/dev/null 2>/dev/null selfserv_9208 with PID 8680 found at Wed May 10 12:51:31 UTC 2017 selfserv_9208 with PID 8680 started at Wed May 10 12:51:31 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #10031: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9208 with PID 8680 at Wed May 10 12:51:32 UTC 2017 kill -USR1 8680 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 8680 killed at Wed May 10 12:51:32 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:51:32 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:32 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 8736 >/dev/null 2>/dev/null selfserv_9208 with PID 8736 found at Wed May 10 12:51:32 UTC 2017 selfserv_9208 with PID 8736 started at Wed May 10 12:51:32 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #10032: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 8736 at Wed May 10 12:51:33 UTC 2017 kill -USR1 8736 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 8736 killed at Wed May 10 12:51:33 UTC 2017 ssl.sh: Cache CRL SSL Client Tests - with ECC =============================== /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/authin.tl.tmp 0 selfserv_9208 starting at Wed May 10 12:51:33 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:33 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:33 UTC 2017 selfserv_9208 with PID 8799 started at Wed May 10 12:51:33 UTC 2017 Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:34 UTC 2017 ssl.sh: #10033: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:34 UTC 2017 ssl.sh: #10034: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:35 UTC 2017 ssl.sh: #10035: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:35 UTC 2017 ssl.sh: #10036: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:35 UTC 2017 ssl.sh: #10037: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:36 UTC 2017 ssl.sh: #10038: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:36 UTC 2017 ssl.sh: #10039: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:37 UTC 2017 ssl.sh: #10040: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:37 UTC 2017 ssl.sh: #10041: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:37 UTC 2017 ssl.sh: #10042: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:38 UTC 2017 ssl.sh: #10043: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:38 UTC 2017 ssl.sh: #10044: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:39 UTC 2017 ssl.sh: #10045: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:39 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10046: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:39 UTC 2017 ssl.sh: #10047: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:40 UTC 2017 ssl.sh: #10048: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:40 UTC 2017 ssl.sh: #10049: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:41 UTC 2017 ssl.sh: #10050: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:41 UTC 2017 ssl.sh: #10051: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:41 UTC 2017 ssl.sh: #10052: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:42 UTC 2017 ssl.sh: #10053: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:42 UTC 2017 ssl.sh: #10054: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:43 UTC 2017 ssl.sh: #10055: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:43 UTC 2017 ssl.sh: #10056: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:44 UTC 2017 ssl.sh: #10057: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:44 UTC 2017 ssl.sh: #10058: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:44 UTC 2017 ssl.sh: #10059: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:45 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10060: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:45 UTC 2017 ssl.sh: #10061: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:46 UTC 2017 ssl.sh: #10062: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:46 UTC 2017 ssl.sh: #10063: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:46 UTC 2017 ssl.sh: #10064: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:47 UTC 2017 ssl.sh: #10065: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:47 UTC 2017 ssl.sh: #10066: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:48 UTC 2017 ssl.sh: #10067: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:48 UTC 2017 ssl.sh: #10068: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:48 UTC 2017 ssl.sh: #10069: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:49 UTC 2017 ssl.sh: #10070: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:49 UTC 2017 ssl.sh: #10071: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:50 UTC 2017 ssl.sh: #10072: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8799 >/dev/null 2>/dev/null selfserv_9208 with PID 8799 found at Wed May 10 12:51:50 UTC 2017 ssl.sh: #10073: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 8799 at Wed May 10 12:51:50 UTC 2017 kill -USR1 8799 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 8799 killed at Wed May 10 12:51:50 UTC 2017 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:51:50 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:51:50 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:51:50 UTC 2017 selfserv_9208 with PID 10221 started at Wed May 10 12:51:50 UTC 2017 Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:51:51 UTC 2017 ssl.sh: #10074: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:51:51 UTC 2017 ssl.sh: #10075: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:51:52 UTC 2017 ssl.sh: #10076: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:51:52 UTC 2017 ssl.sh: #10077: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:51:53 UTC 2017 ssl.sh: #10078: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:51:53 UTC 2017 ssl.sh: #10079: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:51:53 UTC 2017 ssl.sh: #10080: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:51:54 UTC 2017 ssl.sh: #10081: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:51:54 UTC 2017 ssl.sh: #10082: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:51:55 UTC 2017 ssl.sh: #10083: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:51:55 UTC 2017 ssl.sh: #10084: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:51:55 UTC 2017 ssl.sh: #10085: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:51:56 UTC 2017 ssl.sh: #10086: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:51:56 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10087: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:51:57 UTC 2017 ssl.sh: #10088: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:51:57 UTC 2017 ssl.sh: #10089: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:51:57 UTC 2017 ssl.sh: #10090: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:51:58 UTC 2017 ssl.sh: #10091: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:51:58 UTC 2017 ssl.sh: #10092: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:51:58 UTC 2017 ssl.sh: #10093: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:51:59 UTC 2017 ssl.sh: #10094: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:51:59 UTC 2017 ssl.sh: #10095: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:52:00 UTC 2017 ssl.sh: #10096: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:52:00 UTC 2017 ssl.sh: #10097: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:52:00 UTC 2017 ssl.sh: #10098: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:52:01 UTC 2017 ssl.sh: #10099: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:52:01 UTC 2017 ssl.sh: #10100: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:52:02 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10101: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:52:02 UTC 2017 ssl.sh: #10102: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:52:02 UTC 2017 ssl.sh: #10103: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:52:03 UTC 2017 ssl.sh: #10104: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:52:03 UTC 2017 ssl.sh: #10105: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:52:04 UTC 2017 ssl.sh: #10106: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:52:04 UTC 2017 ssl.sh: #10107: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:52:04 UTC 2017 ssl.sh: #10108: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:52:05 UTC 2017 ssl.sh: #10109: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:52:05 UTC 2017 ssl.sh: #10110: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:52:05 UTC 2017 ssl.sh: #10111: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:52:06 UTC 2017 ssl.sh: #10112: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:52:06 UTC 2017 ssl.sh: #10113: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10221 >/dev/null 2>/dev/null selfserv_9208 with PID 10221 found at Wed May 10 12:52:07 UTC 2017 ssl.sh: #10114: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 10221 at Wed May 10 12:52:07 UTC 2017 kill -USR1 10221 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 10221 killed at Wed May 10 12:52:07 UTC 2017 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9208 starting at Wed May 10 12:52:07 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:52:07 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:07 UTC 2017 selfserv_9208 with PID 11643 started at Wed May 10 12:52:07 UTC 2017 Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:08 UTC 2017 ssl.sh: #10115: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:08 UTC 2017 ssl.sh: #10116: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:08 UTC 2017 ssl.sh: #10117: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:09 UTC 2017 ssl.sh: #10118: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:09 UTC 2017 ssl.sh: #10119: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:10 UTC 2017 ssl.sh: #10120: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:10 UTC 2017 ssl.sh: #10121: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:11 UTC 2017 ssl.sh: #10122: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:11 UTC 2017 ssl.sh: #10123: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:12 UTC 2017 ssl.sh: #10124: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:12 UTC 2017 ssl.sh: #10125: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:12 UTC 2017 ssl.sh: #10126: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:13 UTC 2017 ssl.sh: #10127: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:13 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10128: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:14 UTC 2017 ssl.sh: #10129: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:14 UTC 2017 ssl.sh: #10130: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:15 UTC 2017 ssl.sh: #10131: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:15 UTC 2017 ssl.sh: #10132: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:15 UTC 2017 ssl.sh: #10133: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:16 UTC 2017 ssl.sh: #10134: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:16 UTC 2017 ssl.sh: #10135: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:17 UTC 2017 ssl.sh: #10136: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:17 UTC 2017 ssl.sh: #10137: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:17 UTC 2017 ssl.sh: #10138: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:18 UTC 2017 ssl.sh: #10139: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:18 UTC 2017 ssl.sh: #10140: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:19 UTC 2017 ssl.sh: #10141: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:19 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10142: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:20 UTC 2017 ssl.sh: #10143: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:20 UTC 2017 ssl.sh: #10144: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:20 UTC 2017 ssl.sh: #10145: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:21 UTC 2017 ssl.sh: #10146: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:21 UTC 2017 ssl.sh: #10147: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:22 UTC 2017 ssl.sh: #10148: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:22 UTC 2017 ssl.sh: #10149: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:23 UTC 2017 ssl.sh: #10150: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:23 UTC 2017 ssl.sh: #10151: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:23 UTC 2017 ssl.sh: #10152: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:24 UTC 2017 ssl.sh: #10153: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:24 UTC 2017 ssl.sh: #10154: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11643 >/dev/null 2>/dev/null selfserv_9208 with PID 11643 found at Wed May 10 12:52:25 UTC 2017 ssl.sh: #10155: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 11643 at Wed May 10 12:52:25 UTC 2017 kill -USR1 11643 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 11643 killed at Wed May 10 12:52:25 UTC 2017 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:52:25 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:52:25 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:25 UTC 2017 selfserv_9208 with PID 13065 started at Wed May 10 12:52:25 UTC 2017 Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:26 UTC 2017 ssl.sh: #10156: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:26 UTC 2017 ssl.sh: #10157: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:26 UTC 2017 ssl.sh: #10158: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:27 UTC 2017 ssl.sh: #10159: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:27 UTC 2017 ssl.sh: #10160: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:28 UTC 2017 ssl.sh: #10161: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:28 UTC 2017 ssl.sh: #10162: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:28 UTC 2017 ssl.sh: #10163: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:29 UTC 2017 ssl.sh: #10164: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:29 UTC 2017 ssl.sh: #10165: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:30 UTC 2017 ssl.sh: #10166: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:30 UTC 2017 ssl.sh: #10167: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:31 UTC 2017 ssl.sh: #10168: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:31 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10169: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:32 UTC 2017 ssl.sh: #10170: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:32 UTC 2017 ssl.sh: #10171: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:32 UTC 2017 ssl.sh: #10172: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:33 UTC 2017 ssl.sh: #10173: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:33 UTC 2017 ssl.sh: #10174: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:34 UTC 2017 ssl.sh: #10175: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:34 UTC 2017 ssl.sh: #10176: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:34 UTC 2017 ssl.sh: #10177: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:35 UTC 2017 ssl.sh: #10178: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:35 UTC 2017 ssl.sh: #10179: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:36 UTC 2017 ssl.sh: #10180: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:36 UTC 2017 ssl.sh: #10181: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:37 UTC 2017 ssl.sh: #10182: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:37 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10183: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:37 UTC 2017 ssl.sh: #10184: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:38 UTC 2017 ssl.sh: #10185: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:38 UTC 2017 ssl.sh: #10186: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:39 UTC 2017 ssl.sh: #10187: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:39 UTC 2017 ssl.sh: #10188: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:39 UTC 2017 ssl.sh: #10189: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:40 UTC 2017 ssl.sh: #10190: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:40 UTC 2017 ssl.sh: #10191: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:41 UTC 2017 ssl.sh: #10192: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:41 UTC 2017 ssl.sh: #10193: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:41 UTC 2017 ssl.sh: #10194: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:42 UTC 2017 ssl.sh: #10195: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13065 >/dev/null 2>/dev/null selfserv_9208 with PID 13065 found at Wed May 10 12:52:42 UTC 2017 ssl.sh: #10196: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9208 with PID 13065 at Wed May 10 12:52:42 UTC 2017 kill -USR1 13065 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 13065 killed at Wed May 10 12:52:42 UTC 2017 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:52:42 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:52:42 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14488 >/dev/null 2>/dev/null selfserv_9208 with PID 14488 found at Wed May 10 12:52:43 UTC 2017 selfserv_9208 with PID 14488 started at Wed May 10 12:52:43 UTC 2017 trying to kill selfserv_9208 with PID 14488 at Wed May 10 12:52:43 UTC 2017 kill -USR1 14488 ./ssl.sh: line 183: 14488 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9208 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss ${sparam} -i ${R_SERVERPID} -V ssl3:tls1.2 $verbose -H 1 selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14488 killed at Wed May 10 12:52:43 UTC 2017 selfserv_9208 starting at Wed May 10 12:52:43 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:52:43 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:43 UTC 2017 selfserv_9208 with PID 14522 started at Wed May 10 12:52:43 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:43 UTC 2017 ssl.sh: #10197: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:44 UTC 2017 ssl.sh: #10198: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:44 UTC 2017 ssl.sh: #10199: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:45 UTC 2017 ssl.sh: #10200: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:45 UTC 2017 ssl.sh: #10201: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:46 UTC 2017 ssl.sh: #10202: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:46 UTC 2017 ssl.sh: #10203: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:47 UTC 2017 ssl.sh: #10204: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:47 UTC 2017 ssl.sh: #10205: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:48 UTC 2017 ssl.sh: #10206: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:48 UTC 2017 ssl.sh: #10207: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:49 UTC 2017 ssl.sh: #10208: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:49 UTC 2017 ssl.sh: #10209: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:50 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10210: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:50 UTC 2017 ssl.sh: #10211: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:51 UTC 2017 ssl.sh: #10212: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:51 UTC 2017 ssl.sh: #10213: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:52 UTC 2017 ssl.sh: #10214: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:52 UTC 2017 ssl.sh: #10215: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:53 UTC 2017 ssl.sh: #10216: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:53 UTC 2017 ssl.sh: #10217: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:54 UTC 2017 ssl.sh: #10218: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:54 UTC 2017 ssl.sh: #10219: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:55 UTC 2017 ssl.sh: #10220: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:55 UTC 2017 ssl.sh: #10221: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:56 UTC 2017 ssl.sh: #10222: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:57 UTC 2017 ssl.sh: #10223: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:57 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10224: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:57 UTC 2017 ssl.sh: #10225: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:58 UTC 2017 ssl.sh: #10226: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:58 UTC 2017 ssl.sh: #10227: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:59 UTC 2017 ssl.sh: #10228: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:52:59 UTC 2017 ssl.sh: #10229: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:53:00 UTC 2017 ssl.sh: #10230: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:53:00 UTC 2017 ssl.sh: #10231: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:53:01 UTC 2017 ssl.sh: #10232: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:53:01 UTC 2017 ssl.sh: #10233: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:53:02 UTC 2017 ssl.sh: #10234: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:53:02 UTC 2017 ssl.sh: #10235: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:53:03 UTC 2017 ssl.sh: #10236: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14522 >/dev/null 2>/dev/null selfserv_9208 with PID 14522 found at Wed May 10 12:53:03 UTC 2017 ssl.sh: #10237: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 14522 at Wed May 10 12:53:03 UTC 2017 kill -USR1 14522 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 14522 killed at Wed May 10 12:53:03 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:53:03 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:53:03 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:04 UTC 2017 selfserv_9208 with PID 15944 started at Wed May 10 12:53:04 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:04 UTC 2017 ssl.sh: #10238: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:05 UTC 2017 ssl.sh: #10239: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:05 UTC 2017 ssl.sh: #10240: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:06 UTC 2017 ssl.sh: #10241: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:07 UTC 2017 ssl.sh: #10242: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:07 UTC 2017 ssl.sh: #10243: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:08 UTC 2017 ssl.sh: #10244: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:08 UTC 2017 ssl.sh: #10245: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:09 UTC 2017 ssl.sh: #10246: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:09 UTC 2017 ssl.sh: #10247: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:10 UTC 2017 ssl.sh: #10248: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:11 UTC 2017 ssl.sh: #10249: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:11 UTC 2017 ssl.sh: #10250: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:12 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10251: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:12 UTC 2017 ssl.sh: #10252: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:13 UTC 2017 ssl.sh: #10253: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:13 UTC 2017 ssl.sh: #10254: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:14 UTC 2017 ssl.sh: #10255: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:14 UTC 2017 ssl.sh: #10256: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:15 UTC 2017 ssl.sh: #10257: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:15 UTC 2017 ssl.sh: #10258: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:16 UTC 2017 ssl.sh: #10259: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:16 UTC 2017 ssl.sh: #10260: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:17 UTC 2017 ssl.sh: #10261: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:17 UTC 2017 ssl.sh: #10262: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:18 UTC 2017 ssl.sh: #10263: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:19 UTC 2017 ssl.sh: #10264: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:19 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10265: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:20 UTC 2017 ssl.sh: #10266: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:20 UTC 2017 ssl.sh: #10267: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:21 UTC 2017 ssl.sh: #10268: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:21 UTC 2017 ssl.sh: #10269: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:22 UTC 2017 ssl.sh: #10270: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:22 UTC 2017 ssl.sh: #10271: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:23 UTC 2017 ssl.sh: #10272: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:23 UTC 2017 ssl.sh: #10273: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:24 UTC 2017 ssl.sh: #10274: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:24 UTC 2017 ssl.sh: #10275: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:25 UTC 2017 ssl.sh: #10276: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:26 UTC 2017 ssl.sh: #10277: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15944 >/dev/null 2>/dev/null selfserv_9208 with PID 15944 found at Wed May 10 12:53:26 UTC 2017 ssl.sh: #10278: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 15944 at Wed May 10 12:53:26 UTC 2017 kill -USR1 15944 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 15944 killed at Wed May 10 12:53:26 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:53:26 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:53:26 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:26 UTC 2017 selfserv_9208 with PID 17368 started at Wed May 10 12:53:26 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:27 UTC 2017 ssl.sh: #10279: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:27 UTC 2017 ssl.sh: #10280: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:28 UTC 2017 ssl.sh: #10281: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:28 UTC 2017 ssl.sh: #10282: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:29 UTC 2017 ssl.sh: #10283: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:29 UTC 2017 ssl.sh: #10284: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:30 UTC 2017 ssl.sh: #10285: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:30 UTC 2017 ssl.sh: #10286: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:31 UTC 2017 ssl.sh: #10287: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:31 UTC 2017 ssl.sh: #10288: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:32 UTC 2017 ssl.sh: #10289: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:32 UTC 2017 ssl.sh: #10290: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:33 UTC 2017 ssl.sh: #10291: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:33 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10292: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:34 UTC 2017 ssl.sh: #10293: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:34 UTC 2017 ssl.sh: #10294: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:35 UTC 2017 ssl.sh: #10295: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:35 UTC 2017 ssl.sh: #10296: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:36 UTC 2017 ssl.sh: #10297: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:36 UTC 2017 ssl.sh: #10298: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:37 UTC 2017 ssl.sh: #10299: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:37 UTC 2017 ssl.sh: #10300: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:37 UTC 2017 ssl.sh: #10301: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:38 UTC 2017 ssl.sh: #10302: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:38 UTC 2017 ssl.sh: #10303: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:39 UTC 2017 ssl.sh: #10304: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:39 UTC 2017 ssl.sh: #10305: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:40 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10306: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:40 UTC 2017 ssl.sh: #10307: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:41 UTC 2017 ssl.sh: #10308: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:41 UTC 2017 ssl.sh: #10309: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:42 UTC 2017 ssl.sh: #10310: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:42 UTC 2017 ssl.sh: #10311: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:43 UTC 2017 ssl.sh: #10312: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:43 UTC 2017 ssl.sh: #10313: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:43 UTC 2017 ssl.sh: #10314: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:44 UTC 2017 ssl.sh: #10315: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:44 UTC 2017 ssl.sh: #10316: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:45 UTC 2017 ssl.sh: #10317: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:45 UTC 2017 ssl.sh: #10318: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17368 >/dev/null 2>/dev/null selfserv_9208 with PID 17368 found at Wed May 10 12:53:46 UTC 2017 ssl.sh: #10319: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 17368 at Wed May 10 12:53:46 UTC 2017 kill -USR1 17368 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 17368 killed at Wed May 10 12:53:46 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:53:46 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:53:46 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:53:46 UTC 2017 selfserv_9208 with PID 18791 started at Wed May 10 12:53:46 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:53:47 UTC 2017 ssl.sh: #10320: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:53:47 UTC 2017 ssl.sh: #10321: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:53:48 UTC 2017 ssl.sh: #10322: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:53:48 UTC 2017 ssl.sh: #10323: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:53:49 UTC 2017 ssl.sh: #10324: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:53:49 UTC 2017 ssl.sh: #10325: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:53:50 UTC 2017 ssl.sh: #10326: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:53:50 UTC 2017 ssl.sh: #10327: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:53:51 UTC 2017 ssl.sh: #10328: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:53:52 UTC 2017 ssl.sh: #10329: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:53:52 UTC 2017 ssl.sh: #10330: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:53:53 UTC 2017 ssl.sh: #10331: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:53:53 UTC 2017 ssl.sh: #10332: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:53:54 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10333: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:53:54 UTC 2017 ssl.sh: #10334: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:53:55 UTC 2017 ssl.sh: #10335: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:53:55 UTC 2017 ssl.sh: #10336: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:53:56 UTC 2017 ssl.sh: #10337: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:53:57 UTC 2017 ssl.sh: #10338: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:53:57 UTC 2017 ssl.sh: #10339: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:53:58 UTC 2017 ssl.sh: #10340: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:53:58 UTC 2017 ssl.sh: #10341: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:53:59 UTC 2017 ssl.sh: #10342: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:53:59 UTC 2017 ssl.sh: #10343: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:54:00 UTC 2017 ssl.sh: #10344: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:54:00 UTC 2017 ssl.sh: #10345: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:54:01 UTC 2017 ssl.sh: #10346: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:54:02 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10347: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:54:02 UTC 2017 ssl.sh: #10348: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:54:03 UTC 2017 ssl.sh: #10349: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:54:03 UTC 2017 ssl.sh: #10350: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:54:04 UTC 2017 ssl.sh: #10351: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:54:04 UTC 2017 ssl.sh: #10352: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:54:04 UTC 2017 ssl.sh: #10353: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:54:05 UTC 2017 ssl.sh: #10354: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:54:05 UTC 2017 ssl.sh: #10355: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:54:06 UTC 2017 ssl.sh: #10356: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:54:07 UTC 2017 ssl.sh: #10357: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:54:07 UTC 2017 ssl.sh: #10358: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:54:08 UTC 2017 ssl.sh: #10359: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18791 >/dev/null 2>/dev/null selfserv_9208 with PID 18791 found at Wed May 10 12:54:08 UTC 2017 ssl.sh: #10360: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 18791 at Wed May 10 12:54:08 UTC 2017 kill -USR1 18791 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 18791 killed at Wed May 10 12:54:08 UTC 2017 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:54:08 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:54:08 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:08 UTC 2017 selfserv_9208 with PID 20213 started at Wed May 10 12:54:08 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:09 UTC 2017 ssl.sh: #10361: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:10 UTC 2017 ssl.sh: #10362: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:10 UTC 2017 ssl.sh: #10363: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:11 UTC 2017 ssl.sh: #10364: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:12 UTC 2017 ssl.sh: #10365: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:12 UTC 2017 ssl.sh: #10366: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:13 UTC 2017 ssl.sh: #10367: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:14 UTC 2017 ssl.sh: #10368: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:14 UTC 2017 ssl.sh: #10369: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:15 UTC 2017 ssl.sh: #10370: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:15 UTC 2017 ssl.sh: #10371: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:16 UTC 2017 ssl.sh: #10372: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:17 UTC 2017 ssl.sh: #10373: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:17 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10374: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:18 UTC 2017 ssl.sh: #10375: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:18 UTC 2017 ssl.sh: #10376: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:19 UTC 2017 ssl.sh: #10377: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:19 UTC 2017 ssl.sh: #10378: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:20 UTC 2017 ssl.sh: #10379: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:20 UTC 2017 ssl.sh: #10380: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:21 UTC 2017 ssl.sh: #10381: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:22 UTC 2017 ssl.sh: #10382: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:22 UTC 2017 ssl.sh: #10383: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:23 UTC 2017 ssl.sh: #10384: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:23 UTC 2017 ssl.sh: #10385: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:24 UTC 2017 ssl.sh: #10386: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:24 UTC 2017 ssl.sh: #10387: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:25 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10388: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:25 UTC 2017 ssl.sh: #10389: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:26 UTC 2017 ssl.sh: #10390: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:26 UTC 2017 ssl.sh: #10391: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:27 UTC 2017 ssl.sh: #10392: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:28 UTC 2017 ssl.sh: #10393: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:28 UTC 2017 ssl.sh: #10394: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:29 UTC 2017 ssl.sh: #10395: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:29 UTC 2017 ssl.sh: #10396: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:30 UTC 2017 ssl.sh: #10397: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:30 UTC 2017 ssl.sh: #10398: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:31 UTC 2017 ssl.sh: #10399: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:31 UTC 2017 ssl.sh: #10400: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20213 >/dev/null 2>/dev/null selfserv_9208 with PID 20213 found at Wed May 10 12:54:32 UTC 2017 ssl.sh: #10401: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 20213 at Wed May 10 12:54:32 UTC 2017 kill -USR1 20213 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 20213 killed at Wed May 10 12:54:32 UTC 2017 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:54:32 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:54:32 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:32 UTC 2017 selfserv_9208 with PID 21636 started at Wed May 10 12:54:32 UTC 2017 Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:33 UTC 2017 ssl.sh: #10402: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:33 UTC 2017 ssl.sh: #10403: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:34 UTC 2017 ssl.sh: #10404: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:34 UTC 2017 ssl.sh: #10405: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:35 UTC 2017 ssl.sh: #10406: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:35 UTC 2017 ssl.sh: #10407: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:36 UTC 2017 ssl.sh: #10408: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:36 UTC 2017 ssl.sh: #10409: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:37 UTC 2017 ssl.sh: #10410: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:37 UTC 2017 ssl.sh: #10411: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:38 UTC 2017 ssl.sh: #10412: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:38 UTC 2017 ssl.sh: #10413: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:39 UTC 2017 ssl.sh: #10414: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:39 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10415: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:40 UTC 2017 ssl.sh: #10416: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:40 UTC 2017 ssl.sh: #10417: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:41 UTC 2017 ssl.sh: #10418: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:41 UTC 2017 ssl.sh: #10419: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:42 UTC 2017 ssl.sh: #10420: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:42 UTC 2017 ssl.sh: #10421: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:43 UTC 2017 ssl.sh: #10422: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:43 UTC 2017 ssl.sh: #10423: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:44 UTC 2017 ssl.sh: #10424: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:44 UTC 2017 ssl.sh: #10425: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:45 UTC 2017 ssl.sh: #10426: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:45 UTC 2017 ssl.sh: #10427: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:46 UTC 2017 ssl.sh: #10428: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:46 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10429: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:47 UTC 2017 ssl.sh: #10430: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:47 UTC 2017 ssl.sh: #10431: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:48 UTC 2017 ssl.sh: #10432: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:48 UTC 2017 ssl.sh: #10433: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:49 UTC 2017 ssl.sh: #10434: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:49 UTC 2017 ssl.sh: #10435: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:50 UTC 2017 ssl.sh: #10436: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:50 UTC 2017 ssl.sh: #10437: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:51 UTC 2017 ssl.sh: #10438: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:51 UTC 2017 ssl.sh: #10439: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:52 UTC 2017 ssl.sh: #10440: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:52 UTC 2017 ssl.sh: #10441: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21636 >/dev/null 2>/dev/null selfserv_9208 with PID 21636 found at Wed May 10 12:54:53 UTC 2017 ssl.sh: #10442: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 21636 at Wed May 10 12:54:53 UTC 2017 kill -USR1 21636 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 21636 killed at Wed May 10 12:54:53 UTC 2017 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:54:53 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:54:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23063 >/dev/null 2>/dev/null selfserv_9208 with PID 23063 found at Wed May 10 12:54:53 UTC 2017 selfserv_9208 with PID 23063 started at Wed May 10 12:54:53 UTC 2017 trying to kill selfserv_9208 with PID 23063 at Wed May 10 12:54:53 UTC 2017 kill -USR1 23063 ./ssl.sh: line 183: 23063 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9208 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss ${sparam} -i ${R_SERVERPID} -V ssl3:tls1.2 $verbose -H 1 selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23063 killed at Wed May 10 12:54:53 UTC 2017 selfserv_9208 starting at Wed May 10 12:54:53 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:54:53 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:54:53 UTC 2017 selfserv_9208 with PID 23097 started at Wed May 10 12:54:53 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:54:54 UTC 2017 ssl.sh: #10443: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:54:54 UTC 2017 ssl.sh: #10444: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:54:55 UTC 2017 ssl.sh: #10445: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:54:55 UTC 2017 ssl.sh: #10446: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:54:56 UTC 2017 ssl.sh: #10447: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:54:56 UTC 2017 ssl.sh: #10448: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:54:57 UTC 2017 ssl.sh: #10449: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:54:57 UTC 2017 ssl.sh: #10450: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:54:58 UTC 2017 ssl.sh: #10451: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:54:58 UTC 2017 ssl.sh: #10452: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:54:59 UTC 2017 ssl.sh: #10453: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:00 UTC 2017 ssl.sh: #10454: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:00 UTC 2017 ssl.sh: #10455: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:00 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10456: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:01 UTC 2017 ssl.sh: #10457: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:02 UTC 2017 ssl.sh: #10458: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:02 UTC 2017 ssl.sh: #10459: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:03 UTC 2017 ssl.sh: #10460: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:03 UTC 2017 ssl.sh: #10461: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:04 UTC 2017 ssl.sh: #10462: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:04 UTC 2017 ssl.sh: #10463: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:05 UTC 2017 ssl.sh: #10464: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:05 UTC 2017 ssl.sh: #10465: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:06 UTC 2017 ssl.sh: #10466: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:06 UTC 2017 ssl.sh: #10467: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:07 UTC 2017 ssl.sh: #10468: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:07 UTC 2017 ssl.sh: #10469: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:08 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10470: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:08 UTC 2017 ssl.sh: #10471: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:09 UTC 2017 ssl.sh: #10472: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:09 UTC 2017 ssl.sh: #10473: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:10 UTC 2017 ssl.sh: #10474: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:10 UTC 2017 ssl.sh: #10475: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:11 UTC 2017 ssl.sh: #10476: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:11 UTC 2017 ssl.sh: #10477: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:12 UTC 2017 ssl.sh: #10478: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:12 UTC 2017 ssl.sh: #10479: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:13 UTC 2017 ssl.sh: #10480: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:14 UTC 2017 ssl.sh: #10481: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:14 UTC 2017 ssl.sh: #10482: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23097 >/dev/null 2>/dev/null selfserv_9208 with PID 23097 found at Wed May 10 12:55:15 UTC 2017 ssl.sh: #10483: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 23097 at Wed May 10 12:55:15 UTC 2017 kill -USR1 23097 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 23097 killed at Wed May 10 12:55:15 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:55:15 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:55:15 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:15 UTC 2017 selfserv_9208 with PID 24519 started at Wed May 10 12:55:15 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:16 UTC 2017 ssl.sh: #10484: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:16 UTC 2017 ssl.sh: #10485: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:17 UTC 2017 ssl.sh: #10486: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:18 UTC 2017 ssl.sh: #10487: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:18 UTC 2017 ssl.sh: #10488: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:19 UTC 2017 ssl.sh: #10489: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:19 UTC 2017 ssl.sh: #10490: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:20 UTC 2017 ssl.sh: #10491: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:20 UTC 2017 ssl.sh: #10492: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:21 UTC 2017 ssl.sh: #10493: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:22 UTC 2017 ssl.sh: #10494: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:22 UTC 2017 ssl.sh: #10495: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:23 UTC 2017 ssl.sh: #10496: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:23 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10497: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:24 UTC 2017 ssl.sh: #10498: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:25 UTC 2017 ssl.sh: #10499: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:25 UTC 2017 ssl.sh: #10500: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:26 UTC 2017 ssl.sh: #10501: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:26 UTC 2017 ssl.sh: #10502: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:27 UTC 2017 ssl.sh: #10503: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:27 UTC 2017 ssl.sh: #10504: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:28 UTC 2017 ssl.sh: #10505: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:28 UTC 2017 ssl.sh: #10506: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:29 UTC 2017 ssl.sh: #10507: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:29 UTC 2017 ssl.sh: #10508: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:30 UTC 2017 ssl.sh: #10509: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:31 UTC 2017 ssl.sh: #10510: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:31 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10511: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:32 UTC 2017 ssl.sh: #10512: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:32 UTC 2017 ssl.sh: #10513: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:33 UTC 2017 ssl.sh: #10514: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:33 UTC 2017 ssl.sh: #10515: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:34 UTC 2017 ssl.sh: #10516: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:34 UTC 2017 ssl.sh: #10517: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:35 UTC 2017 ssl.sh: #10518: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:35 UTC 2017 ssl.sh: #10519: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:36 UTC 2017 ssl.sh: #10520: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:37 UTC 2017 ssl.sh: #10521: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:37 UTC 2017 ssl.sh: #10522: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:38 UTC 2017 ssl.sh: #10523: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24519 >/dev/null 2>/dev/null selfserv_9208 with PID 24519 found at Wed May 10 12:55:38 UTC 2017 ssl.sh: #10524: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 24519 at Wed May 10 12:55:38 UTC 2017 kill -USR1 24519 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 24519 killed at Wed May 10 12:55:38 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:55:39 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:55:39 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:39 UTC 2017 selfserv_9208 with PID 25944 started at Wed May 10 12:55:39 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:39 UTC 2017 ssl.sh: #10525: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:40 UTC 2017 ssl.sh: #10526: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:40 UTC 2017 ssl.sh: #10527: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:41 UTC 2017 ssl.sh: #10528: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:41 UTC 2017 ssl.sh: #10529: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:42 UTC 2017 ssl.sh: #10530: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:42 UTC 2017 ssl.sh: #10531: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:43 UTC 2017 ssl.sh: #10532: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:43 UTC 2017 ssl.sh: #10533: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:44 UTC 2017 ssl.sh: #10534: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:44 UTC 2017 ssl.sh: #10535: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:45 UTC 2017 ssl.sh: #10536: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:45 UTC 2017 ssl.sh: #10537: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:46 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10538: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:46 UTC 2017 ssl.sh: #10539: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:47 UTC 2017 ssl.sh: #10540: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:47 UTC 2017 ssl.sh: #10541: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:48 UTC 2017 ssl.sh: #10542: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:48 UTC 2017 ssl.sh: #10543: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:49 UTC 2017 ssl.sh: #10544: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:49 UTC 2017 ssl.sh: #10545: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:50 UTC 2017 ssl.sh: #10546: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:51 UTC 2017 ssl.sh: #10547: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:51 UTC 2017 ssl.sh: #10548: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:52 UTC 2017 ssl.sh: #10549: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:52 UTC 2017 ssl.sh: #10550: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:53 UTC 2017 ssl.sh: #10551: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:53 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10552: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:54 UTC 2017 ssl.sh: #10553: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:54 UTC 2017 ssl.sh: #10554: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:55 UTC 2017 ssl.sh: #10555: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:55 UTC 2017 ssl.sh: #10556: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:56 UTC 2017 ssl.sh: #10557: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:56 UTC 2017 ssl.sh: #10558: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:56 UTC 2017 ssl.sh: #10559: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:57 UTC 2017 ssl.sh: #10560: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:57 UTC 2017 ssl.sh: #10561: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:58 UTC 2017 ssl.sh: #10562: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:58 UTC 2017 ssl.sh: #10563: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:59 UTC 2017 ssl.sh: #10564: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25944 >/dev/null 2>/dev/null selfserv_9208 with PID 25944 found at Wed May 10 12:55:59 UTC 2017 ssl.sh: #10565: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 25944 at Wed May 10 12:55:59 UTC 2017 kill -USR1 25944 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 25944 killed at Wed May 10 12:55:59 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9208 starting at Wed May 10 12:55:59 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:55:59 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:00 UTC 2017 selfserv_9208 with PID 27521 started at Wed May 10 12:56:00 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:00 UTC 2017 ssl.sh: #10566: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:01 UTC 2017 ssl.sh: #10567: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:01 UTC 2017 ssl.sh: #10568: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:02 UTC 2017 ssl.sh: #10569: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:02 UTC 2017 ssl.sh: #10570: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:03 UTC 2017 ssl.sh: #10571: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:03 UTC 2017 ssl.sh: #10572: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:04 UTC 2017 ssl.sh: #10573: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:04 UTC 2017 ssl.sh: #10574: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:05 UTC 2017 ssl.sh: #10575: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:05 UTC 2017 ssl.sh: #10576: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:06 UTC 2017 ssl.sh: #10577: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:06 UTC 2017 ssl.sh: #10578: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:07 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10579: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:07 UTC 2017 ssl.sh: #10580: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:08 UTC 2017 ssl.sh: #10581: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:08 UTC 2017 ssl.sh: #10582: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:09 UTC 2017 ssl.sh: #10583: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:09 UTC 2017 ssl.sh: #10584: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:10 UTC 2017 ssl.sh: #10585: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:10 UTC 2017 ssl.sh: #10586: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:11 UTC 2017 ssl.sh: #10587: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:11 UTC 2017 ssl.sh: #10588: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:12 UTC 2017 ssl.sh: #10589: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:12 UTC 2017 ssl.sh: #10590: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:13 UTC 2017 ssl.sh: #10591: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:13 UTC 2017 ssl.sh: #10592: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:14 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10593: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:14 UTC 2017 ssl.sh: #10594: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:15 UTC 2017 ssl.sh: #10595: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:15 UTC 2017 ssl.sh: #10596: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:16 UTC 2017 ssl.sh: #10597: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:16 UTC 2017 ssl.sh: #10598: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:17 UTC 2017 ssl.sh: #10599: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:17 UTC 2017 ssl.sh: #10600: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:18 UTC 2017 ssl.sh: #10601: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:18 UTC 2017 ssl.sh: #10602: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:19 UTC 2017 ssl.sh: #10603: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:19 UTC 2017 ssl.sh: #10604: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:20 UTC 2017 ssl.sh: #10605: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27521 >/dev/null 2>/dev/null selfserv_9208 with PID 27521 found at Wed May 10 12:56:20 UTC 2017 ssl.sh: #10606: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 27521 at Wed May 10 12:56:20 UTC 2017 kill -USR1 27521 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 27521 killed at Wed May 10 12:56:20 UTC 2017 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:56:20 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:56:20 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:20 UTC 2017 selfserv_9208 with PID 28944 started at Wed May 10 12:56:20 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:21 UTC 2017 ssl.sh: #10607: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:22 UTC 2017 ssl.sh: #10608: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:22 UTC 2017 ssl.sh: #10609: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:23 UTC 2017 ssl.sh: #10610: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:23 UTC 2017 ssl.sh: #10611: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:24 UTC 2017 ssl.sh: #10612: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:24 UTC 2017 ssl.sh: #10613: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:25 UTC 2017 ssl.sh: #10614: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:25 UTC 2017 ssl.sh: #10615: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:26 UTC 2017 ssl.sh: #10616: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:27 UTC 2017 ssl.sh: #10617: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:27 UTC 2017 ssl.sh: #10618: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:28 UTC 2017 ssl.sh: #10619: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:28 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10620: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:29 UTC 2017 ssl.sh: #10621: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:29 UTC 2017 ssl.sh: #10622: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:30 UTC 2017 ssl.sh: #10623: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:30 UTC 2017 ssl.sh: #10624: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:31 UTC 2017 ssl.sh: #10625: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:31 UTC 2017 ssl.sh: #10626: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:32 UTC 2017 ssl.sh: #10627: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:32 UTC 2017 ssl.sh: #10628: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:33 UTC 2017 ssl.sh: #10629: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:33 UTC 2017 ssl.sh: #10630: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:34 UTC 2017 ssl.sh: #10631: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:34 UTC 2017 ssl.sh: #10632: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:35 UTC 2017 ssl.sh: #10633: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:35 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10634: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:36 UTC 2017 ssl.sh: #10635: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:36 UTC 2017 ssl.sh: #10636: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:37 UTC 2017 ssl.sh: #10637: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:37 UTC 2017 ssl.sh: #10638: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:38 UTC 2017 ssl.sh: #10639: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:38 UTC 2017 ssl.sh: #10640: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:39 UTC 2017 ssl.sh: #10641: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:40 UTC 2017 ssl.sh: #10642: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:40 UTC 2017 ssl.sh: #10643: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:41 UTC 2017 ssl.sh: #10644: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:41 UTC 2017 ssl.sh: #10645: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:42 UTC 2017 ssl.sh: #10646: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28944 >/dev/null 2>/dev/null selfserv_9208 with PID 28944 found at Wed May 10 12:56:42 UTC 2017 ssl.sh: #10647: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 28944 at Wed May 10 12:56:42 UTC 2017 kill -USR1 28944 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 28944 killed at Wed May 10 12:56:42 UTC 2017 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:56:42 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:56:42 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:42 UTC 2017 selfserv_9208 with PID 30366 started at Wed May 10 12:56:42 UTC 2017 Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:43 UTC 2017 ssl.sh: #10648: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:44 UTC 2017 ssl.sh: #10649: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:44 UTC 2017 ssl.sh: #10650: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:45 UTC 2017 ssl.sh: #10651: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:45 UTC 2017 ssl.sh: #10652: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:45 UTC 2017 ssl.sh: #10653: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:46 UTC 2017 ssl.sh: #10654: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:46 UTC 2017 ssl.sh: #10655: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:47 UTC 2017 ssl.sh: #10656: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:47 UTC 2017 ssl.sh: #10657: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:48 UTC 2017 ssl.sh: #10658: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:48 UTC 2017 ssl.sh: #10659: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:49 UTC 2017 ssl.sh: #10660: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:49 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10661: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:50 UTC 2017 ssl.sh: #10662: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:50 UTC 2017 ssl.sh: #10663: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:51 UTC 2017 ssl.sh: #10664: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:51 UTC 2017 ssl.sh: #10665: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:52 UTC 2017 ssl.sh: #10666: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:52 UTC 2017 ssl.sh: #10667: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:52 UTC 2017 ssl.sh: #10668: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:53 UTC 2017 ssl.sh: #10669: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:53 UTC 2017 ssl.sh: #10670: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:54 UTC 2017 ssl.sh: #10671: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:54 UTC 2017 ssl.sh: #10672: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:55 UTC 2017 ssl.sh: #10673: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:55 UTC 2017 ssl.sh: #10674: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:56 UTC 2017 ================= CRL Reloaded ============= ssl.sh: #10675: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:56 UTC 2017 ssl.sh: #10676: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:57 UTC 2017 ssl.sh: #10677: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:57 UTC 2017 ssl.sh: #10678: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:58 UTC 2017 ssl.sh: #10679: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:58 UTC 2017 ssl.sh: #10680: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:59 UTC 2017 ssl.sh: #10681: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:59 UTC 2017 ssl.sh: #10682: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:56:59 UTC 2017 ssl.sh: #10683: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:57:00 UTC 2017 ssl.sh: #10684: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:57:00 UTC 2017 ssl.sh: #10685: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:57:01 UTC 2017 ssl.sh: #10686: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:57:01 UTC 2017 ssl.sh: #10687: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9208 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30366 >/dev/null 2>/dev/null selfserv_9208 with PID 30366 found at Wed May 10 12:57:02 UTC 2017 ssl.sh: #10688: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 30366 at Wed May 10 12:57:02 UTC 2017 kill -USR1 30366 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 30366 killed at Wed May 10 12:57:02 UTC 2017 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9208 starting at Wed May 10 12:57:02 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:57:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 31788 >/dev/null 2>/dev/null selfserv_9208 with PID 31788 found at Wed May 10 12:57:02 UTC 2017 selfserv_9208 with PID 31788 started at Wed May 10 12:57:02 UTC 2017 trying to kill selfserv_9208 with PID 31788 at Wed May 10 12:57:02 UTC 2017 kill -USR1 31788 ./ssl.sh: line 183: 31788 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9208 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss ${sparam} -i ${R_SERVERPID} -V ssl3:tls1.2 $verbose -H 1 selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 31788 killed at Wed May 10 12:57:02 UTC 2017 ssl.sh: SSL POLICY - server /client - with ECC =============================== Saving pkcs11.txt selfserv_9208 starting at Wed May 10 12:57:02 UTC 2017 selfserv_9208 -D -p 9208 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.1556\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9208 at Wed May 10 12:57:02 UTC 2017 tstclnt -p 9208 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat kill -0 31823 >/dev/null 2>/dev/null selfserv_9208 with PID 31823 found at Wed May 10 12:57:02 UTC 2017 selfserv_9208 with PID 31823 started at Wed May 10 12:57:02 UTC 2017 ssl.sh: running Allowed by Narrow Policy ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #10689: Allowed by Narrow Policy produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Allowed by Strict Policy ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1/ssl,ssl-key-exchange:sha256/cert-signature:rsa/ssl-key-exchange:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #10690: Allowed by Strict Policy produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Allow All Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #10691: Allow All Explicitly produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disallow All Explicitly. ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all library=/builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #10692: Disallow All Explicitly. produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Signatures Explicitly. ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256 library=/builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #10693: Disallow SHA256 Signatures Explicitly. produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Signatures Implicitly Narrow. ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:rsa/ssl-key-exchange:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #10694: Disallow SHA256 Signatures Implicitly Narrow. produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Signatures Implicitly. ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha384/all:sha512/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #10695: Disallow SHA256 Signatures Implicitly. produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=des-ede3-cbc library=/builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #10696: Disallow Cipher Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Implicitly Narrow. ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa:des-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #10697: Disallow Cipher Implicitly Narrow. produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Implicitly. ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-verion-max=tls1.2 library=/builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #10698: Disallow Cipher Implicitly. produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=hmac-sha1 library=/builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #10699: Disallow HMAC Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Implicitly Narrow. ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md5:sha256:rsa:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #10700: Disallow HMAC Implicitly Narrow. produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Signatures Implicitly. ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #10701: Disallow HMAC Signatures Implicitly. produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchange Explicitly. ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #10702: Disallow Key Exchange Explicitly. produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchange Implicitly Narrow. ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:dh-dss:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #10703: Disallow Key Exchange Implicitly Narrow. produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchnage Signatures Implicitly. ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #10704: Disallow Key Exchnage Signatures Implicitly. produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Exlicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat tstclnt: error setting SSL/TLS version range : PR_NOT_CONNECTED_ERROR: Network file descriptor is not connected ssl.sh: #10705: Disallow Version Exlicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Implicitly Narrow. ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa:des-ede3-cbc:tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat tstclnt: error setting SSL/TLS version range : PR_NOT_CONNECTED_ERROR: Network file descriptor is not connected ssl.sh: #10706: Disallow Version Implicitly Narrow. produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Implicitly. ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9208 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.30.2/nss/tests/ssl/sslreq.dat tstclnt: error setting SSL/TLS version range : PR_NOT_CONNECTED_ERROR: Network file descriptor is not connected ssl.sh: #10707: Disallow Version Implicitly. produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9208 with PID 31823 at Wed May 10 12:57:08 UTC 2017 kill -USR1 31823 selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9208 -b -p 9208 2>/dev/null; selfserv_9208 with PID 31823 killed at Wed May 10 12:57:08 UTC 2017 TIMESTAMP ssl END: Wed May 10 12:57:08 UTC 2017 Running tests for merge TIMESTAMP merge BEGIN: Wed May 10 12:57:08 UTC 2017 sdr.sh: SDR Tests =============================== sdr.sh: Creating an SDR key/SDR Encrypt - Value 1 sdrtest -d . -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests.v1.1556 -t "Test1" sdr.sh: #10708: Creating SDR Key/Encrypt - Value 1 - PASSED sdr.sh: SDR Encrypt - Value 2 sdrtest -d . -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests.v2.1556 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #10709: Encrypt - Value 2 - PASSED sdr.sh: SDR Encrypt - Value 3 sdrtest -d . -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests.v3.1556 -t "1234567" sdr.sh: #10710: Encrypt - Value 3 - PASSED sdr.sh: SDR Decrypt - Value 1 sdrtest -d . -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests.v1.1556 -t "Test1" sdr.sh: #10711: Decrypt - Value 1 - PASSED sdr.sh: SDR Decrypt - Value 2 sdrtest -d . -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests.v2.1556 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #10712: Decrypt - Value 2 - PASSED sdr.sh: SDR Decrypt - Value 3 sdrtest -d . -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests.v3.1556 -t "1234567" sdr.sh: #10713: Decrypt - Value 3 - PASSED merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests.v3.1556 -t Test2 -f ../tests.pw merge.sh: #10714: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw merge.sh: #10715: Merging Dave - PASSED merge.sh: Merging in new user certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw merge.sh: #10716: Merging server - PASSED merge.sh: Merging in new chain certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw merge.sh: #10717: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #10718: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #10719: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:47:08 2017 Not After : Tue May 10 12:47:08 2022 Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:38:ff:5a:03:ad:1d:81:5d:b3:93:ce:5d:2c:e0:9b: dd:b6:f8:41:aa:72:74:76:ef:b6:74:ed:98:f5:29:5b: df:04:33:6b:92:a6:e3:76:a4:11:b6:2a:04:ff:f5:cf: e2:b6:c6:77:d9:c0:e7:da:fe:7d:0e:e1:ba:0a:25:91: 8c:7e:16:8f:85:bb:65:d7:c9:dc:2f:4b:26:89:bb:fa: fc:12:13:b7:11:df:53:82:76:ca:3a:ab:7d:9c:75:f4: 78:0f:45:06:f1:9a:4d:f9:66:d7:f4:90:00:bb:6c:56: f3:b7:21:df:75:13:31:dc:77:19:a9:20:9f:c3:bd:c0: b1:07:d6:bc:53:ab:71:04:a8:8d:91:fc:2f:2e:3e:f0: 94:91:72:5d:3b:95:83:ca:ab:2b:7a:3a:64:af:e4:59: e1:59:55:75:df:f1:bb:42:3b:02:cd:71:ca:3a:bc:77: 81:12:ca:36:55:8a:6b:37:03:96:23:4f:0e:8b:43:3e: d8:0f:c0:af:39:e6:a1:b0:9f:f5:46:36:1e:b6:35:58: 96:69:c8:9d:df:8f:b2:06:19:f8:a0:0d:0e:67:91:f9: 6b:95:e1:d7:8c:26:a4:ec:7f:d2:01:a6:dc:86:c9:28: ba:b1:4d:13:cf:0b:b6:71:56:64:66:30:d0:96:4d:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 70:81:01:b7:60:13:3f:46:b7:52:f6:4b:67:0e:58:03: 6f:43:05:0b:10:ac:29:b3:16:2f:02:10:15:d8:c5:02: c2:a3:cd:e4:2d:13:d6:28:37:71:a5:90:f5:33:3e:61: 8e:11:e4:95:b1:0b:5f:b3:6b:7b:97:2d:78:8d:fd:18: 6e:77:c4:83:6b:0e:9f:96:44:c9:f2:4c:c5:02:be:55: 2f:20:fb:73:57:07:86:53:e3:66:86:72:aa:ef:ce:77: bc:e2:89:e6:36:82:25:72:13:21:2c:95:a1:87:e4:d1: 20:b3:ee:9f:8e:c5:bc:0d:0b:6f:f6:9b:8e:de:37:cb: 42:69:2d:60:7b:27:72:57:13:69:b1:96:8e:2f:2e:08: 69:b2:9a:80:f3:3e:9b:77:a5:81:0f:2a:d3:9a:86:a4: 12:98:72:3b:4a:36:71:c1:1e:ca:d7:8a:4c:a5:04:7d: 1d:21:b0:08:4a:ac:e5:f5:3e:3e:50:58:92:83:29:de: f5:e4:49:b9:c0:3b:9a:c3:35:26:c2:3e:72:2c:f3:00: 43:b7:68:7c:c5:6b:92:75:4b:4b:e8:f8:17:2d:96:f2: cf:f2:93:d9:5d:c0:1a:8f:fd:12:d3:e1:cb:d9:fe:69: 1a:78:d8:bd:06:a0:23:67:ec:af:fd:86:d2:fa:ff:54 Fingerprint (SHA-256): CD:30:41:A2:76:6B:84:D4:75:81:AA:2B:78:AE:FF:CE:CF:B9:A7:A3:57:33:1F:55:21:F0:47:15:1C:D3:72:92 Fingerprint (SHA1): 08:EB:DE:4E:02:68:D8:01:B4:0F:D1:04:64:15:60:B2:C4:C9:2C:64 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #10720: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed May 10 12:47:12 2017 Not After : Tue May 10 12:47:12 2022 Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:cf:01:9c:ea:76:4a:fc:7d:45:91:42:d8:59:87:73: a6:23:85:b2:31:bb:a8:32:72:3c:b8:d6:44:1f:32:d8: 11:b2:af:ea:78:a6:40:0f:25:aa:4b:a5:f2:82:d5:07: 04:58:0a:79:33:83:e4:0a:c9:ba:75:7e:ef:d5:31:c6: af:c5:68:eb:cf:63:24:d4:67:4d:01:1e:58:33:4c:88: c4:11:71:85:ed:de:ca:ce:68:98:49:57:8e:74:34:bd: de:ed:2c:eb:82:c9:fa:c8:6e:33:7b:5d:eb:4c:71:dd: c5:3c:67:33:e7:e7:72:ec:24:2e:ba:4d:c0:e8:ad:7f: cc:dd:8a:a5:0f:d3:30:56:4b:cb:1f:ac:f0:6d:af:af: 8c:ef:f4:d2:da:06:48:f6:1d:5f:9c:c5:db:94:ac:ba: e3:89:f4:79:01:68:ed:bc:c3:ff:7a:e9:e3:8f:d4:00: f3:cb:79:9a:a2:6e:12:ce:f6:b0:09:69:31:83:f4:03: 78:7a:26:23:f1:e1:b8:fe:0c:0b:fb:62:73:82:bf:a0: f6:20:71:f3:a1:24:db:05:5c:9f:8f:46:2c:ae:a8:37: db:a0:35:30:ce:6d:83:58:10:1b:36:ff:84:d0:33:6b: 91:a6:a2:ae:d9:e6:73:8a:53:97:1d:89:8d:fa:83:f3 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:6e:29:ee:1c:fc:3a:b9:26:66:6e:a0:c9:79:86:f9: 3f:3b:95:d5:0e:ea:34:9e:a5:4a:fe:68:d9:68:03:93: a1:fc:9e:29:b3:05:96:c7:13:c5:ca:60:1d:e8:eb:86: 19:0c:b2:d3:f8:9a:be:f2:11:35:1a:3b:13:13:fa:66: 19:3c:79:64:41:1f:b1:92:22:47:5d:91:98:bb:00:e2: 74:8b:35:9f:23:5a:ae:28:73:2a:2a:42:be:59:6c:d9: 90:49:ad:59:2b:fe:cb:85:99:16:4a:e9:d3:df:79:86: aa:0b:ef:d4:cd:cf:0a:39:5a:ea:06:2d:0d:e9:14:41: af:18:3d:a1:2b:0d:e2:6e:88:88:3a:e9:8c:14:5f:0a: 0e:db:86:e1:ae:42:09:d0:7a:b3:e6:34:22:c7:0e:7d: 2b:05:d4:4b:88:c6:a9:9e:9e:62:d1:d9:b9:4f:50:f0: bd:61:11:06:9e:60:0e:2a:a8:ed:68:b2:7e:09:4e:4b: 71:cb:ee:07:03:4c:10:de:7e:1c:ec:38:56:5c:22:d8: 94:ac:3e:6d:13:04:9a:dd:2b:7d:b1:9d:9d:e2:33:62: ce:f8:2e:dd:58:f8:b0:b2:1c:18:14:37:59:06:64:c9: f1:ca:cb:0d:16:48:d6:87:e2:6b:13:c9:f8:f4:0b:ed Fingerprint (SHA-256): F5:36:DF:51:FF:42:25:EE:62:B7:61:7B:AD:6E:B8:84:D7:EB:A1:89:34:7F:17:29:FF:0F:F2:EF:0F:C1:F5:0D Fingerprint (SHA1): 53:12:F1:89:56:1E:61:19:92:E8:EA:C1:49:8C:A8:72:C4:E7:3B:4D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #10721: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw merge.sh: #10722: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA CT,C,C TestCA-dsa CT,C,C TestCA-ec CT,C,C Alice u,u,u Alice-dsa u,u,u Alice-dsamixed u,u,u Alice-ec u,u,u Alice-ecmixed u,u,u bob@bogus.com ,, Dave u,u,u eve@bogus.com ,, bob-ec@bogus.com ,, Dave-ec u,u,u Dave-dsa u,u,u Dave-dsamixed u,u,u Dave-ecmixed u,u,u localhost.localdomain u,u,u localhost.localdomain-dsa u,u,u localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u localhost.localdomain-ecmixed u,u,u localhost-sni.localdomain u,u,u localhost-sni.localdomain-dsa u,u,u localhost-sni.localdomain-dsamixed u,u,u localhost-sni.localdomain-ec u,u,u localhost-sni.localdomain-ecmixed u,u,u ExtendedSSLUser u,u,u serverCA C,C,C ExtendedSSLUser-dsa u,u,u serverCA-dsa C,C,C ExtendedSSLUser-dsamixed u,u,u ExtendedSSLUser-ec u,u,u serverCA-ec C,C,C ExtendedSSLUser-ecmixed u,u,u chain-1-clientCA-ec ,, chain-2-clientCA-ec ,, chain-1-clientCA ,, chain-2-clientCA ,, chain-2-clientCA-dsa ,, clientCA T,C,C clientCA-ec T,C,C chain-1-clientCA-dsa ,, clientCA-dsa T,C,C Alice #2 ,, Alice #1 ,, Alice #99 ,, Alice #3 ,, Alice #4 ,, Alice #100 ,, CRL names CRL Type TestCA CRL TestCA-ec CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests.v3.1556 -t Test2 -f ../tests.pw merge.sh: #10723: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests.v1.1556 -t Test1 -f ../tests.pw merge.sh: #10724: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #10725: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. merge.sh: #10726: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #10727: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Wed May 10 12:47:57 2017 Entry 1 (0x1): Serial Number: 40 (0x28) Revocation Date: Wed May 10 12:43:34 2017 Entry Extensions: Name: CRL reason code Entry 2 (0x2): Serial Number: 42 (0x2a) Revocation Date: Wed May 10 12:47:52 2017 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #10728: Verifying TestCA CRL - PASSED TEST_MODE=SHARED_DB NSS_DEFAULT_DB_TYPE=sql TIMESTAMP merge END: Wed May 10 12:57:20 UTC 2017 Running tests for chains TIMESTAMP chains BEGIN: Wed May 10 12:57:20 UTC 2017 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #10729: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125721 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #10730: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #10731: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #10732: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #10733: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10734: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #10735: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10736: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #10737: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #10738: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10739: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #10740: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10741: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #10742: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #10743: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10744: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9219 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #10745: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10746: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #10747: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #10748: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10749: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #10750: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10751: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #10752: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10753: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #10754: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10755: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #10756: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10757: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #10758: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10759: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #10760: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10761: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #10762: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10763: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #10764: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10765: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9219 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #10766: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10767: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #10768: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10769: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #10770: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10771: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #10772: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10773: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #10774: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10775: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #10776: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10777: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9219 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #10778: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10779: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #10780: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10781: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #10782: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10783: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #10784: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10785: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9218/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #10786: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10787: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #10788: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10789: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9219 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #10790: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10791: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20170510125752Z nextupdate=20180510125752Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Wed May 10 12:57:52 2017 Next Update: Thu May 10 12:57:52 2018 CRL Extensions: chains.sh: #10792: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20170510125753Z addcert 2 20170510125753Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Wed May 10 12:57:53 2017 Next Update: Thu May 10 12:57:52 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed May 10 12:57:53 2017 CRL Extensions: chains.sh: #10793: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20170510125754Z nextupdate=20180510125754Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed May 10 12:57:54 2017 Next Update: Thu May 10 12:57:54 2018 CRL Extensions: chains.sh: #10794: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20170510125755Z addcert 2 20170510125755Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed May 10 12:57:55 2017 Next Update: Thu May 10 12:57:54 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed May 10 12:57:55 2017 CRL Extensions: chains.sh: #10795: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20170510125756Z addcert 4 20170510125756Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed May 10 12:57:56 2017 Next Update: Thu May 10 12:57:54 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed May 10 12:57:55 2017 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Wed May 10 12:57:56 2017 CRL Extensions: chains.sh: #10796: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20170510125756Z nextupdate=20180510125756Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed May 10 12:57:56 2017 Next Update: Thu May 10 12:57:56 2018 CRL Extensions: chains.sh: #10797: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20170510125757Z addcert 2 20170510125757Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed May 10 12:57:57 2017 Next Update: Thu May 10 12:57:56 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed May 10 12:57:57 2017 CRL Extensions: chains.sh: #10798: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20170510125758Z addcert 3 20170510125758Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed May 10 12:57:58 2017 Next Update: Thu May 10 12:57:56 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed May 10 12:57:57 2017 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Wed May 10 12:57:58 2017 CRL Extensions: chains.sh: #10799: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20170510125758Z nextupdate=20180510125758Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed May 10 12:57:58 2017 Next Update: Thu May 10 12:57:58 2018 CRL Extensions: chains.sh: #10800: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20170510125759Z addcert 2 20170510125759Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed May 10 12:57:59 2017 Next Update: Thu May 10 12:57:58 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed May 10 12:57:59 2017 CRL Extensions: chains.sh: #10801: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20170510125800Z addcert 3 20170510125800Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed May 10 12:58:00 2017 Next Update: Thu May 10 12:57:58 2018 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed May 10 12:57:59 2017 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Wed May 10 12:58:00 2017 CRL Extensions: chains.sh: #10802: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #10803: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #10804: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #10805: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #10806: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #10807: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #10808: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.30.2/dist/Linux4.10_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #10809: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #10810: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #10811: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #10812: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #10813: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #10814: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #10815: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #10816: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #10817: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #10818: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #10819: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #10820: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #10821: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #10822: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #10823: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #10824: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #10825: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #10826: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED httpserv starting at Wed May 10 12:58:06 UTC 2017 httpserv -D -p 9218 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.1556 & trying to connect to httpserv at Wed May 10 12:58:06 UTC 2017 tstclnt -p 9218 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9218 (address=::1) tstclnt: exiting with return code 0 kill -0 1958 >/dev/null 2>/dev/null httpserv with PID 1958 found at Wed May 10 12:58:06 UTC 2017 httpserv with PID 1958 started at Wed May 10 12:58:06 UTC 2017 tstclnt -h localhost.localdomain -p 9218 -q -t 20 chains.sh: #10827: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125721 (0x1e67e699) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Wed May 10 12:57:23 2017 Not After : Tue May 10 12:57:23 2067 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:5b:74:f4:d7:3c:8c:e0:1a:08:58:6f:00:ec:b3:c3: f5:1b:05:75:5c:be:2a:d6:fb:b3:56:82:93:ac:2f:7a: a0:3b:4e:e5:97:fc:16:28:84:04:90:43:af:6a:a5:c7: 50:c6:15:5a:d7:75:0b:0e:a1:4b:13:33:48:a3:fa:32: cf:46:d2:60:a6:ec:0e:02:c0:ab:3b:31:36:e2:d6:dc: 4c:5b:a7:35:68:ba:90:0b:d7:f0:91:f2:f1:2f:90:f5: 99:3a:40:3a:51:d8:0e:ca:9c:f9:0b:7e:a5:ef:ab:40: c2:93:3b:46:f8:77:eb:77:d7:35:b1:91:3c:58:be:c7: 2e:3a:4b:32:06:ec:8f:33:04:b0:49:e3:01:91:ea:1a: e8:5d:78:15:6d:d9:e0:29:07:cf:d6:a8:aa:63:68:47: d7:94:af:16:bc:dc:cd:5e:1f:0f:df:21:98:e1:70:3d: 97:66:d1:e5:02:b2:72:b2:51:18:23:93:0e:87:47:0b: 63:9c:c0:e5:19:72:38:f2:ed:02:39:ad:f1:00:69:7f: d9:94:8d:91:3c:84:12:cb:1b:c2:66:f6:9a:ce:e7:4f: 37:0a:d9:e0:bf:bf:b3:87:fc:2b:6d:82:67:9e:bc:04: 72:f4:36:9e:f5:ba:62:4a:eb:1b:d7:8f:ad:d8:66:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 75:87:c6:4c:34:6b:e3:f8:b1:4e:eb:98:93:6c:46:d7: ce:1b:f2:7e:dc:e2:be:72:4b:95:a6:76:4b:23:f4:bf: 85:ce:dc:9d:ff:9e:13:fb:b1:b9:67:2f:f1:ab:ca:2c: e4:b7:28:1d:d5:50:f5:98:58:b6:cb:40:d9:20:08:30: 78:2c:6e:32:3b:5a:a6:8f:c3:a8:5e:a7:07:76:a1:ab: e2:09:df:da:39:87:47:1f:47:cc:38:89:8d:79:ba:fd: 3f:30:bd:e1:0c:93:86:89:92:23:e2:4d:20:55:47:fe: de:1b:1c:cb:19:38:43:96:e6:c7:c0:05:b0:5a:83:fa: a9:27:9d:cc:67:e9:fe:20:d5:d0:8d:aa:2e:cb:96:af: 26:c3:47:cb:a4:05:cb:04:7a:78:2f:73:95:be:4e:a4: ae:c4:bc:58:cc:df:2d:48:f7:1c:23:14:3a:41:32:05: 8a:e8:92:9d:56:cc:2d:01:cd:ee:08:ae:b4:40:e2:f5: e5:92:f8:39:23:f0:96:29:e6:4c:be:a3:72:07:6a:1e: 08:f7:2a:66:28:a6:1a:91:bc:71:e8:f7:9f:1d:d8:2e: ee:48:c3:28:f5:4f:b2:97:de:55:03:ff:a4:87:30:0d: 25:fe:c9:93:ba:9f:19:4d:94:16:e1:fe:15:54:a4:5b Fingerprint (SHA-256): 37:5E:02:48:2F:2F:EC:CE:5E:DD:0C:0A:99:46:9A:80:8E:EF:FD:5F:F7:68:71:3C:60:50:10:76:37:16:B9:87 Fingerprint (SHA1): F4:E6:45:4A:65:64:C7:86:80:F7:16:F0:49:1E:69:AC:3B:59:56:3B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #10828: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #10829: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #10830: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 1958 at Wed May 10 12:58:07 UTC 2017 kill -USR1 1958 httpserv: normal termination httpserv -b -p 9218 2>/dev/null; httpserv with PID 1958 killed at Wed May 10 12:58:07 UTC 2017 httpserv starting at Wed May 10 12:58:07 UTC 2017 httpserv -D -p 9218 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.1556 & trying to connect to httpserv at Wed May 10 12:58:07 UTC 2017 tstclnt -p 9218 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9218 (address=::1) tstclnt: exiting with return code 0 kill -0 2127 >/dev/null 2>/dev/null httpserv with PID 2127 found at Wed May 10 12:58:07 UTC 2017 httpserv with PID 2127 started at Wed May 10 12:58:07 UTC 2017 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #10831: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. OCSPEE12OCSPCA1 : ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #10832: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #10833: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED tstclnt -h localhost.localdomain -p 9218 -q -t 20 chains.sh: #10834: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125721 (0x1e67e699) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Wed May 10 12:57:23 2017 Not After : Tue May 10 12:57:23 2067 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:5b:74:f4:d7:3c:8c:e0:1a:08:58:6f:00:ec:b3:c3: f5:1b:05:75:5c:be:2a:d6:fb:b3:56:82:93:ac:2f:7a: a0:3b:4e:e5:97:fc:16:28:84:04:90:43:af:6a:a5:c7: 50:c6:15:5a:d7:75:0b:0e:a1:4b:13:33:48:a3:fa:32: cf:46:d2:60:a6:ec:0e:02:c0:ab:3b:31:36:e2:d6:dc: 4c:5b:a7:35:68:ba:90:0b:d7:f0:91:f2:f1:2f:90:f5: 99:3a:40:3a:51:d8:0e:ca:9c:f9:0b:7e:a5:ef:ab:40: c2:93:3b:46:f8:77:eb:77:d7:35:b1:91:3c:58:be:c7: 2e:3a:4b:32:06:ec:8f:33:04:b0:49:e3:01:91:ea:1a: e8:5d:78:15:6d:d9:e0:29:07:cf:d6:a8:aa:63:68:47: d7:94:af:16:bc:dc:cd:5e:1f:0f:df:21:98:e1:70:3d: 97:66:d1:e5:02:b2:72:b2:51:18:23:93:0e:87:47:0b: 63:9c:c0:e5:19:72:38:f2:ed:02:39:ad:f1:00:69:7f: d9:94:8d:91:3c:84:12:cb:1b:c2:66:f6:9a:ce:e7:4f: 37:0a:d9:e0:bf:bf:b3:87:fc:2b:6d:82:67:9e:bc:04: 72:f4:36:9e:f5:ba:62:4a:eb:1b:d7:8f:ad:d8:66:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 75:87:c6:4c:34:6b:e3:f8:b1:4e:eb:98:93:6c:46:d7: ce:1b:f2:7e:dc:e2:be:72:4b:95:a6:76:4b:23:f4:bf: 85:ce:dc:9d:ff:9e:13:fb:b1:b9:67:2f:f1:ab:ca:2c: e4:b7:28:1d:d5:50:f5:98:58:b6:cb:40:d9:20:08:30: 78:2c:6e:32:3b:5a:a6:8f:c3:a8:5e:a7:07:76:a1:ab: e2:09:df:da:39:87:47:1f:47:cc:38:89:8d:79:ba:fd: 3f:30:bd:e1:0c:93:86:89:92:23:e2:4d:20:55:47:fe: de:1b:1c:cb:19:38:43:96:e6:c7:c0:05:b0:5a:83:fa: a9:27:9d:cc:67:e9:fe:20:d5:d0:8d:aa:2e:cb:96:af: 26:c3:47:cb:a4:05:cb:04:7a:78:2f:73:95:be:4e:a4: ae:c4:bc:58:cc:df:2d:48:f7:1c:23:14:3a:41:32:05: 8a:e8:92:9d:56:cc:2d:01:cd:ee:08:ae:b4:40:e2:f5: e5:92:f8:39:23:f0:96:29:e6:4c:be:a3:72:07:6a:1e: 08:f7:2a:66:28:a6:1a:91:bc:71:e8:f7:9f:1d:d8:2e: ee:48:c3:28:f5:4f:b2:97:de:55:03:ff:a4:87:30:0d: 25:fe:c9:93:ba:9f:19:4d:94:16:e1:fe:15:54:a4:5b Fingerprint (SHA-256): 37:5E:02:48:2F:2F:EC:CE:5E:DD:0C:0A:99:46:9A:80:8E:EF:FD:5F:F7:68:71:3C:60:50:10:76:37:16:B9:87 Fingerprint (SHA1): F4:E6:45:4A:65:64:C7:86:80:F7:16:F0:49:1E:69:AC:3B:59:56:3B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #10835: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #10836: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #10837: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 2127 at Wed May 10 12:58:09 UTC 2017 kill -USR1 2127 httpserv: normal termination httpserv -b -p 9218 2>/dev/null; httpserv with PID 2127 killed at Wed May 10 12:58:09 UTC 2017 httpserv starting at Wed May 10 12:58:09 UTC 2017 httpserv -D -p 9218 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.1556 & trying to connect to httpserv at Wed May 10 12:58:09 UTC 2017 tstclnt -p 9218 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9218 (address=::1) tstclnt: exiting with return code 0 kill -0 2374 >/dev/null 2>/dev/null httpserv with PID 2374 found at Wed May 10 12:58:09 UTC 2017 httpserv with PID 2374 started at Wed May 10 12:58:09 UTC 2017 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #10838: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #10839: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125722 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #10840: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #10841: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #10842: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125723 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #10843: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #10844: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #10845: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10846: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 510125724 -7 Bridge@Army < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #10847: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10848: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 510125725 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #10849: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10850: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #10851: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #10852: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10853: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 510125726 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #10854: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10855: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #10856: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #10857: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #10858: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125723 (0x1e67e69b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:58:13 2017 Not After : Tue May 10 12:58:13 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:9b:3d:c5:90:57:c1:2c:42:b4:34:71:e8:34:d4:f0: 87:66:56:55:b7:8e:6c:1d:80:2a:d9:78:b0:89:c7:f6: 0d:c3:11:ab:ad:10:41:58:2d:52:43:82:58:62:bf:2d: 9d:e3:80:ec:1f:50:23:9b:be:aa:f4:93:45:fb:c5:27: 27:2a:1e:33:be:9f:2f:30:9e:50:90:87:e2:e6:bc:96: 17:9a:77:eb:41:c3:f7:45:34:aa:92:26:a3:31:03:e6: 95:27:68:5f:01:25:1c:19:00:c1:1b:a8:6c:3c:35:fa: 9c:86:fa:94:55:82:25:03:84:3e:15:f0:b5:70:30:6a: 7b:d9:ce:3e:27:8c:d7:44:7b:c2:1c:61:9a:14:96:a7: a0:63:44:68:07:11:b1:16:f7:8c:78:78:a7:80:e3:2b: 28:5d:0a:29:e8:74:fc:16:35:9e:a0:27:25:e0:dc:5b: df:fc:c0:9f:1c:ea:1b:24:e6:0e:65:e7:67:66:72:65: 0f:5f:3d:40:66:1c:5c:8c:21:37:6d:cc:02:c7:cf:cd: c6:f3:27:43:fe:86:67:23:56:e6:69:34:02:f8:49:5d: d6:bd:0c:fa:80:9b:f0:98:45:3d:0c:a1:35:ba:01:7e: 4a:98:34:54:76:fc:0b:14:8f:bd:07:90:11:c3:66:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a7:7a:1f:4c:f1:7b:f7:6c:ae:52:4a:24:65:ca:4b:00: ea:65:11:ea:eb:81:a8:24:4f:1f:99:69:04:15:3a:84: e7:c4:f8:52:51:5e:e4:fc:c8:82:91:00:f3:e4:42:bc: 31:68:5f:fb:50:0c:fd:a9:6f:f1:00:af:70:d3:2b:3b: 81:99:13:b9:a3:e3:9f:e4:92:90:4c:8e:ee:0b:cf:58: 53:3c:d6:04:35:31:32:31:4c:6a:17:85:87:d5:61:3d: 28:b8:3e:a8:26:99:55:40:0e:a9:a8:44:f8:e2:9f:5c: c7:b6:0c:63:a6:94:a5:97:ee:11:f3:4f:16:0f:f4:59: 5e:6d:f7:aa:ed:e5:23:e6:22:31:f9:13:1c:1b:ac:ea: 18:ed:18:86:03:2c:d6:5a:57:f3:21:68:41:5e:c8:13: 5e:8c:67:83:01:36:e5:10:d9:6d:9b:95:28:a2:23:f4: f8:f8:5e:a5:90:fd:18:b4:eb:0c:4e:c6:2c:4c:20:e3: 1f:d3:d1:93:94:a3:6e:25:23:71:bc:44:33:01:6a:3f: 58:4d:82:3c:4c:09:a8:db:23:f5:9c:c5:fc:5d:c7:19: c5:46:10:57:9d:0c:75:8f:a7:37:85:39:9e:a3:1f:cd: dd:77:19:04:00:ec:bb:2c:48:b1:d2:28:6a:36:08:ab Fingerprint (SHA-256): 35:8B:B7:81:C7:EA:91:F8:44:FC:99:61:25:4C:42:7E:C4:F3:E5:1D:F7:3D:65:E4:DC:DF:11:BA:EC:05:77:C5 Fingerprint (SHA1): 8B:0C:83:76:CB:3B:14:CE:4F:BC:4C:65:61:57:F5:E3:9B:09:FB:0E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #10859: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125722 (0x1e67e69a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 12:58:11 2017 Not After : Tue May 10 12:58:11 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:af:78:54:2e:7a:50:2b:a3:02:20:29:06:e6:85:ff: e8:82:bd:0e:12:ee:8f:a0:e6:14:97:0e:b3:49:52:89: 32:97:75:0f:99:a5:f6:10:e5:e7:e0:77:3a:0b:1b:42: 22:2d:08:8e:47:21:ac:ee:d9:2f:cd:8d:68:26:9d:4c: 89:e6:a1:7b:86:05:c1:12:4f:3c:52:57:35:13:d9:9b: 10:13:1b:1a:c7:da:dc:56:0e:0d:ee:44:8f:17:d8:0d: db:8f:21:8b:53:58:b9:c3:f6:d0:4a:58:c8:04:be:66: 06:b4:e6:b6:31:46:69:6a:06:8c:8f:80:a2:08:45:14: d0:c7:65:15:a8:d1:13:03:f4:ef:35:a2:a7:20:52:91: d6:a1:60:ae:c9:af:9b:20:79:63:e4:c5:ae:1b:10:68: 50:ac:f4:df:45:87:0a:9f:35:bd:73:19:83:54:82:f8: a8:bb:f5:98:78:93:5c:29:df:7a:e2:95:f2:da:0f:8e: 72:2f:cb:6d:04:e6:ee:9d:a7:59:8a:13:7d:df:df:a9: ea:40:99:9b:c9:22:02:a4:ca:f8:44:9e:00:33:76:be: 51:ac:e9:f3:cf:c3:4e:9b:f5:54:56:27:ef:2a:00:d6: b6:d6:99:5a:3f:a4:f8:a7:dd:49:6d:ff:e1:36:17:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bd:61:ce:fc:ef:b8:6e:95:4d:29:e5:f3:67:f7:8d:ca: 82:da:16:d8:3e:ca:bf:72:9b:c1:0e:68:cd:d5:57:29: b1:7d:23:d8:ba:f7:85:3f:4c:0a:1a:78:a3:9a:aa:bb: 38:16:6e:ac:87:a6:3f:05:c2:7c:7c:5b:f8:61:10:16: 15:cf:23:94:f6:88:20:da:43:b7:77:08:e3:47:a7:1c: 1a:48:d7:80:59:6d:67:18:ee:1d:d0:72:4f:73:29:f1: cd:c8:ba:10:e7:02:78:aa:c6:03:b5:63:cd:62:29:00: 19:79:00:58:79:7e:e9:90:b3:e1:52:bd:f3:7a:8e:20: ef:2a:a7:a6:d9:82:c1:7a:7b:c5:f2:c5:62:87:71:5a: d9:53:ae:b8:6f:df:1f:c6:a9:43:fa:88:21:82:c2:fa: c0:e0:22:7c:f6:61:3c:26:a2:60:24:c0:17:97:04:97: ee:c5:cd:31:77:25:d3:e6:bf:f5:bf:5b:08:2a:55:19: b8:f2:1e:22:3e:7c:9c:f0:b8:0a:64:de:3a:c1:85:fa: 6b:6f:e1:d2:06:58:b4:26:a1:b6:8c:be:81:1a:22:91: 3a:c4:ad:34:3b:68:dd:30:2d:67:3b:cd:be:b2:75:3a: 97:3b:ae:88:26:dd:a0:10:e2:f1:15:e7:64:51:e8:db Fingerprint (SHA-256): 95:35:9C:EB:31:28:91:6F:72:88:C7:1A:C0:B3:74:4F:FC:99:86:5C:E3:76:90:F7:A8:B4:33:56:CB:E8:AA:78 Fingerprint (SHA1): 68:B6:F4:14:FC:2E:FE:9B:73:0F:EE:9E:C5:DE:D1:B0:4A:A2:26:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #10860: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #10861: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #10862: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #10863: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125722 (0x1e67e69a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 12:58:11 2017 Not After : Tue May 10 12:58:11 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:af:78:54:2e:7a:50:2b:a3:02:20:29:06:e6:85:ff: e8:82:bd:0e:12:ee:8f:a0:e6:14:97:0e:b3:49:52:89: 32:97:75:0f:99:a5:f6:10:e5:e7:e0:77:3a:0b:1b:42: 22:2d:08:8e:47:21:ac:ee:d9:2f:cd:8d:68:26:9d:4c: 89:e6:a1:7b:86:05:c1:12:4f:3c:52:57:35:13:d9:9b: 10:13:1b:1a:c7:da:dc:56:0e:0d:ee:44:8f:17:d8:0d: db:8f:21:8b:53:58:b9:c3:f6:d0:4a:58:c8:04:be:66: 06:b4:e6:b6:31:46:69:6a:06:8c:8f:80:a2:08:45:14: d0:c7:65:15:a8:d1:13:03:f4:ef:35:a2:a7:20:52:91: d6:a1:60:ae:c9:af:9b:20:79:63:e4:c5:ae:1b:10:68: 50:ac:f4:df:45:87:0a:9f:35:bd:73:19:83:54:82:f8: a8:bb:f5:98:78:93:5c:29:df:7a:e2:95:f2:da:0f:8e: 72:2f:cb:6d:04:e6:ee:9d:a7:59:8a:13:7d:df:df:a9: ea:40:99:9b:c9:22:02:a4:ca:f8:44:9e:00:33:76:be: 51:ac:e9:f3:cf:c3:4e:9b:f5:54:56:27:ef:2a:00:d6: b6:d6:99:5a:3f:a4:f8:a7:dd:49:6d:ff:e1:36:17:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bd:61:ce:fc:ef:b8:6e:95:4d:29:e5:f3:67:f7:8d:ca: 82:da:16:d8:3e:ca:bf:72:9b:c1:0e:68:cd:d5:57:29: b1:7d:23:d8:ba:f7:85:3f:4c:0a:1a:78:a3:9a:aa:bb: 38:16:6e:ac:87:a6:3f:05:c2:7c:7c:5b:f8:61:10:16: 15:cf:23:94:f6:88:20:da:43:b7:77:08:e3:47:a7:1c: 1a:48:d7:80:59:6d:67:18:ee:1d:d0:72:4f:73:29:f1: cd:c8:ba:10:e7:02:78:aa:c6:03:b5:63:cd:62:29:00: 19:79:00:58:79:7e:e9:90:b3:e1:52:bd:f3:7a:8e:20: ef:2a:a7:a6:d9:82:c1:7a:7b:c5:f2:c5:62:87:71:5a: d9:53:ae:b8:6f:df:1f:c6:a9:43:fa:88:21:82:c2:fa: c0:e0:22:7c:f6:61:3c:26:a2:60:24:c0:17:97:04:97: ee:c5:cd:31:77:25:d3:e6:bf:f5:bf:5b:08:2a:55:19: b8:f2:1e:22:3e:7c:9c:f0:b8:0a:64:de:3a:c1:85:fa: 6b:6f:e1:d2:06:58:b4:26:a1:b6:8c:be:81:1a:22:91: 3a:c4:ad:34:3b:68:dd:30:2d:67:3b:cd:be:b2:75:3a: 97:3b:ae:88:26:dd:a0:10:e2:f1:15:e7:64:51:e8:db Fingerprint (SHA-256): 95:35:9C:EB:31:28:91:6F:72:88:C7:1A:C0:B3:74:4F:FC:99:86:5C:E3:76:90:F7:A8:B4:33:56:CB:E8:AA:78 Fingerprint (SHA1): 68:B6:F4:14:FC:2E:FE:9B:73:0F:EE:9E:C5:DE:D1:B0:4A:A2:26:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #10864: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125723 (0x1e67e69b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:58:13 2017 Not After : Tue May 10 12:58:13 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:9b:3d:c5:90:57:c1:2c:42:b4:34:71:e8:34:d4:f0: 87:66:56:55:b7:8e:6c:1d:80:2a:d9:78:b0:89:c7:f6: 0d:c3:11:ab:ad:10:41:58:2d:52:43:82:58:62:bf:2d: 9d:e3:80:ec:1f:50:23:9b:be:aa:f4:93:45:fb:c5:27: 27:2a:1e:33:be:9f:2f:30:9e:50:90:87:e2:e6:bc:96: 17:9a:77:eb:41:c3:f7:45:34:aa:92:26:a3:31:03:e6: 95:27:68:5f:01:25:1c:19:00:c1:1b:a8:6c:3c:35:fa: 9c:86:fa:94:55:82:25:03:84:3e:15:f0:b5:70:30:6a: 7b:d9:ce:3e:27:8c:d7:44:7b:c2:1c:61:9a:14:96:a7: a0:63:44:68:07:11:b1:16:f7:8c:78:78:a7:80:e3:2b: 28:5d:0a:29:e8:74:fc:16:35:9e:a0:27:25:e0:dc:5b: df:fc:c0:9f:1c:ea:1b:24:e6:0e:65:e7:67:66:72:65: 0f:5f:3d:40:66:1c:5c:8c:21:37:6d:cc:02:c7:cf:cd: c6:f3:27:43:fe:86:67:23:56:e6:69:34:02:f8:49:5d: d6:bd:0c:fa:80:9b:f0:98:45:3d:0c:a1:35:ba:01:7e: 4a:98:34:54:76:fc:0b:14:8f:bd:07:90:11:c3:66:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a7:7a:1f:4c:f1:7b:f7:6c:ae:52:4a:24:65:ca:4b:00: ea:65:11:ea:eb:81:a8:24:4f:1f:99:69:04:15:3a:84: e7:c4:f8:52:51:5e:e4:fc:c8:82:91:00:f3:e4:42:bc: 31:68:5f:fb:50:0c:fd:a9:6f:f1:00:af:70:d3:2b:3b: 81:99:13:b9:a3:e3:9f:e4:92:90:4c:8e:ee:0b:cf:58: 53:3c:d6:04:35:31:32:31:4c:6a:17:85:87:d5:61:3d: 28:b8:3e:a8:26:99:55:40:0e:a9:a8:44:f8:e2:9f:5c: c7:b6:0c:63:a6:94:a5:97:ee:11:f3:4f:16:0f:f4:59: 5e:6d:f7:aa:ed:e5:23:e6:22:31:f9:13:1c:1b:ac:ea: 18:ed:18:86:03:2c:d6:5a:57:f3:21:68:41:5e:c8:13: 5e:8c:67:83:01:36:e5:10:d9:6d:9b:95:28:a2:23:f4: f8:f8:5e:a5:90:fd:18:b4:eb:0c:4e:c6:2c:4c:20:e3: 1f:d3:d1:93:94:a3:6e:25:23:71:bc:44:33:01:6a:3f: 58:4d:82:3c:4c:09:a8:db:23:f5:9c:c5:fc:5d:c7:19: c5:46:10:57:9d:0c:75:8f:a7:37:85:39:9e:a3:1f:cd: dd:77:19:04:00:ec:bb:2c:48:b1:d2:28:6a:36:08:ab Fingerprint (SHA-256): 35:8B:B7:81:C7:EA:91:F8:44:FC:99:61:25:4C:42:7E:C4:F3:E5:1D:F7:3D:65:E4:DC:DF:11:BA:EC:05:77:C5 Fingerprint (SHA1): 8B:0C:83:76:CB:3B:14:CE:4F:BC:4C:65:61:57:F5:E3:9B:09:FB:0E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #10865: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #10866: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #10867: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #10868: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #10869: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #10870: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125723 (0x1e67e69b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:58:13 2017 Not After : Tue May 10 12:58:13 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:9b:3d:c5:90:57:c1:2c:42:b4:34:71:e8:34:d4:f0: 87:66:56:55:b7:8e:6c:1d:80:2a:d9:78:b0:89:c7:f6: 0d:c3:11:ab:ad:10:41:58:2d:52:43:82:58:62:bf:2d: 9d:e3:80:ec:1f:50:23:9b:be:aa:f4:93:45:fb:c5:27: 27:2a:1e:33:be:9f:2f:30:9e:50:90:87:e2:e6:bc:96: 17:9a:77:eb:41:c3:f7:45:34:aa:92:26:a3:31:03:e6: 95:27:68:5f:01:25:1c:19:00:c1:1b:a8:6c:3c:35:fa: 9c:86:fa:94:55:82:25:03:84:3e:15:f0:b5:70:30:6a: 7b:d9:ce:3e:27:8c:d7:44:7b:c2:1c:61:9a:14:96:a7: a0:63:44:68:07:11:b1:16:f7:8c:78:78:a7:80:e3:2b: 28:5d:0a:29:e8:74:fc:16:35:9e:a0:27:25:e0:dc:5b: df:fc:c0:9f:1c:ea:1b:24:e6:0e:65:e7:67:66:72:65: 0f:5f:3d:40:66:1c:5c:8c:21:37:6d:cc:02:c7:cf:cd: c6:f3:27:43:fe:86:67:23:56:e6:69:34:02:f8:49:5d: d6:bd:0c:fa:80:9b:f0:98:45:3d:0c:a1:35:ba:01:7e: 4a:98:34:54:76:fc:0b:14:8f:bd:07:90:11:c3:66:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a7:7a:1f:4c:f1:7b:f7:6c:ae:52:4a:24:65:ca:4b:00: ea:65:11:ea:eb:81:a8:24:4f:1f:99:69:04:15:3a:84: e7:c4:f8:52:51:5e:e4:fc:c8:82:91:00:f3:e4:42:bc: 31:68:5f:fb:50:0c:fd:a9:6f:f1:00:af:70:d3:2b:3b: 81:99:13:b9:a3:e3:9f:e4:92:90:4c:8e:ee:0b:cf:58: 53:3c:d6:04:35:31:32:31:4c:6a:17:85:87:d5:61:3d: 28:b8:3e:a8:26:99:55:40:0e:a9:a8:44:f8:e2:9f:5c: c7:b6:0c:63:a6:94:a5:97:ee:11:f3:4f:16:0f:f4:59: 5e:6d:f7:aa:ed:e5:23:e6:22:31:f9:13:1c:1b:ac:ea: 18:ed:18:86:03:2c:d6:5a:57:f3:21:68:41:5e:c8:13: 5e:8c:67:83:01:36:e5:10:d9:6d:9b:95:28:a2:23:f4: f8:f8:5e:a5:90:fd:18:b4:eb:0c:4e:c6:2c:4c:20:e3: 1f:d3:d1:93:94:a3:6e:25:23:71:bc:44:33:01:6a:3f: 58:4d:82:3c:4c:09:a8:db:23:f5:9c:c5:fc:5d:c7:19: c5:46:10:57:9d:0c:75:8f:a7:37:85:39:9e:a3:1f:cd: dd:77:19:04:00:ec:bb:2c:48:b1:d2:28:6a:36:08:ab Fingerprint (SHA-256): 35:8B:B7:81:C7:EA:91:F8:44:FC:99:61:25:4C:42:7E:C4:F3:E5:1D:F7:3D:65:E4:DC:DF:11:BA:EC:05:77:C5 Fingerprint (SHA1): 8B:0C:83:76:CB:3B:14:CE:4F:BC:4C:65:61:57:F5:E3:9B:09:FB:0E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #10871: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125723 (0x1e67e69b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 12:58:13 2017 Not After : Tue May 10 12:58:13 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:9b:3d:c5:90:57:c1:2c:42:b4:34:71:e8:34:d4:f0: 87:66:56:55:b7:8e:6c:1d:80:2a:d9:78:b0:89:c7:f6: 0d:c3:11:ab:ad:10:41:58:2d:52:43:82:58:62:bf:2d: 9d:e3:80:ec:1f:50:23:9b:be:aa:f4:93:45:fb:c5:27: 27:2a:1e:33:be:9f:2f:30:9e:50:90:87:e2:e6:bc:96: 17:9a:77:eb:41:c3:f7:45:34:aa:92:26:a3:31:03:e6: 95:27:68:5f:01:25:1c:19:00:c1:1b:a8:6c:3c:35:fa: 9c:86:fa:94:55:82:25:03:84:3e:15:f0:b5:70:30:6a: 7b:d9:ce:3e:27:8c:d7:44:7b:c2:1c:61:9a:14:96:a7: a0:63:44:68:07:11:b1:16:f7:8c:78:78:a7:80:e3:2b: 28:5d:0a:29:e8:74:fc:16:35:9e:a0:27:25:e0:dc:5b: df:fc:c0:9f:1c:ea:1b:24:e6:0e:65:e7:67:66:72:65: 0f:5f:3d:40:66:1c:5c:8c:21:37:6d:cc:02:c7:cf:cd: c6:f3:27:43:fe:86:67:23:56:e6:69:34:02:f8:49:5d: d6:bd:0c:fa:80:9b:f0:98:45:3d:0c:a1:35:ba:01:7e: 4a:98:34:54:76:fc:0b:14:8f:bd:07:90:11:c3:66:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a7:7a:1f:4c:f1:7b:f7:6c:ae:52:4a:24:65:ca:4b:00: ea:65:11:ea:eb:81:a8:24:4f:1f:99:69:04:15:3a:84: e7:c4:f8:52:51:5e:e4:fc:c8:82:91:00:f3:e4:42:bc: 31:68:5f:fb:50:0c:fd:a9:6f:f1:00:af:70:d3:2b:3b: 81:99:13:b9:a3:e3:9f:e4:92:90:4c:8e:ee:0b:cf:58: 53:3c:d6:04:35:31:32:31:4c:6a:17:85:87:d5:61:3d: 28:b8:3e:a8:26:99:55:40:0e:a9:a8:44:f8:e2:9f:5c: c7:b6:0c:63:a6:94:a5:97:ee:11:f3:4f:16:0f:f4:59: 5e:6d:f7:aa:ed:e5:23:e6:22:31:f9:13:1c:1b:ac:ea: 18:ed:18:86:03:2c:d6:5a:57:f3:21:68:41:5e:c8:13: 5e:8c:67:83:01:36:e5:10:d9:6d:9b:95:28:a2:23:f4: f8:f8:5e:a5:90:fd:18:b4:eb:0c:4e:c6:2c:4c:20:e3: 1f:d3:d1:93:94:a3:6e:25:23:71:bc:44:33:01:6a:3f: 58:4d:82:3c:4c:09:a8:db:23:f5:9c:c5:fc:5d:c7:19: c5:46:10:57:9d:0c:75:8f:a7:37:85:39:9e:a3:1f:cd: dd:77:19:04:00:ec:bb:2c:48:b1:d2:28:6a:36:08:ab Fingerprint (SHA-256): 35:8B:B7:81:C7:EA:91:F8:44:FC:99:61:25:4C:42:7E:C4:F3:E5:1D:F7:3D:65:E4:DC:DF:11:BA:EC:05:77:C5 Fingerprint (SHA1): 8B:0C:83:76:CB:3B:14:CE:4F:BC:4C:65:61:57:F5:E3:9B:09:FB:0E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #10872: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #10873: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #10874: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #10875: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #10876: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #10877: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125722 (0x1e67e69a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 12:58:11 2017 Not After : Tue May 10 12:58:11 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:af:78:54:2e:7a:50:2b:a3:02:20:29:06:e6:85:ff: e8:82:bd:0e:12:ee:8f:a0:e6:14:97:0e:b3:49:52:89: 32:97:75:0f:99:a5:f6:10:e5:e7:e0:77:3a:0b:1b:42: 22:2d:08:8e:47:21:ac:ee:d9:2f:cd:8d:68:26:9d:4c: 89:e6:a1:7b:86:05:c1:12:4f:3c:52:57:35:13:d9:9b: 10:13:1b:1a:c7:da:dc:56:0e:0d:ee:44:8f:17:d8:0d: db:8f:21:8b:53:58:b9:c3:f6:d0:4a:58:c8:04:be:66: 06:b4:e6:b6:31:46:69:6a:06:8c:8f:80:a2:08:45:14: d0:c7:65:15:a8:d1:13:03:f4:ef:35:a2:a7:20:52:91: d6:a1:60:ae:c9:af:9b:20:79:63:e4:c5:ae:1b:10:68: 50:ac:f4:df:45:87:0a:9f:35:bd:73:19:83:54:82:f8: a8:bb:f5:98:78:93:5c:29:df:7a:e2:95:f2:da:0f:8e: 72:2f:cb:6d:04:e6:ee:9d:a7:59:8a:13:7d:df:df:a9: ea:40:99:9b:c9:22:02:a4:ca:f8:44:9e:00:33:76:be: 51:ac:e9:f3:cf:c3:4e:9b:f5:54:56:27:ef:2a:00:d6: b6:d6:99:5a:3f:a4:f8:a7:dd:49:6d:ff:e1:36:17:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bd:61:ce:fc:ef:b8:6e:95:4d:29:e5:f3:67:f7:8d:ca: 82:da:16:d8:3e:ca:bf:72:9b:c1:0e:68:cd:d5:57:29: b1:7d:23:d8:ba:f7:85:3f:4c:0a:1a:78:a3:9a:aa:bb: 38:16:6e:ac:87:a6:3f:05:c2:7c:7c:5b:f8:61:10:16: 15:cf:23:94:f6:88:20:da:43:b7:77:08:e3:47:a7:1c: 1a:48:d7:80:59:6d:67:18:ee:1d:d0:72:4f:73:29:f1: cd:c8:ba:10:e7:02:78:aa:c6:03:b5:63:cd:62:29:00: 19:79:00:58:79:7e:e9:90:b3:e1:52:bd:f3:7a:8e:20: ef:2a:a7:a6:d9:82:c1:7a:7b:c5:f2:c5:62:87:71:5a: d9:53:ae:b8:6f:df:1f:c6:a9:43:fa:88:21:82:c2:fa: c0:e0:22:7c:f6:61:3c:26:a2:60:24:c0:17:97:04:97: ee:c5:cd:31:77:25:d3:e6:bf:f5:bf:5b:08:2a:55:19: b8:f2:1e:22:3e:7c:9c:f0:b8:0a:64:de:3a:c1:85:fa: 6b:6f:e1:d2:06:58:b4:26:a1:b6:8c:be:81:1a:22:91: 3a:c4:ad:34:3b:68:dd:30:2d:67:3b:cd:be:b2:75:3a: 97:3b:ae:88:26:dd:a0:10:e2:f1:15:e7:64:51:e8:db Fingerprint (SHA-256): 95:35:9C:EB:31:28:91:6F:72:88:C7:1A:C0:B3:74:4F:FC:99:86:5C:E3:76:90:F7:A8:B4:33:56:CB:E8:AA:78 Fingerprint (SHA1): 68:B6:F4:14:FC:2E:FE:9B:73:0F:EE:9E:C5:DE:D1:B0:4A:A2:26:29 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #10878: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125722 (0x1e67e69a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 12:58:11 2017 Not After : Tue May 10 12:58:11 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:af:78:54:2e:7a:50:2b:a3:02:20:29:06:e6:85:ff: e8:82:bd:0e:12:ee:8f:a0:e6:14:97:0e:b3:49:52:89: 32:97:75:0f:99:a5:f6:10:e5:e7:e0:77:3a:0b:1b:42: 22:2d:08:8e:47:21:ac:ee:d9:2f:cd:8d:68:26:9d:4c: 89:e6:a1:7b:86:05:c1:12:4f:3c:52:57:35:13:d9:9b: 10:13:1b:1a:c7:da:dc:56:0e:0d:ee:44:8f:17:d8:0d: db:8f:21:8b:53:58:b9:c3:f6:d0:4a:58:c8:04:be:66: 06:b4:e6:b6:31:46:69:6a:06:8c:8f:80:a2:08:45:14: d0:c7:65:15:a8:d1:13:03:f4:ef:35:a2:a7:20:52:91: d6:a1:60:ae:c9:af:9b:20:79:63:e4:c5:ae:1b:10:68: 50:ac:f4:df:45:87:0a:9f:35:bd:73:19:83:54:82:f8: a8:bb:f5:98:78:93:5c:29:df:7a:e2:95:f2:da:0f:8e: 72:2f:cb:6d:04:e6:ee:9d:a7:59:8a:13:7d:df:df:a9: ea:40:99:9b:c9:22:02:a4:ca:f8:44:9e:00:33:76:be: 51:ac:e9:f3:cf:c3:4e:9b:f5:54:56:27:ef:2a:00:d6: b6:d6:99:5a:3f:a4:f8:a7:dd:49:6d:ff:e1:36:17:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bd:61:ce:fc:ef:b8:6e:95:4d:29:e5:f3:67:f7:8d:ca: 82:da:16:d8:3e:ca:bf:72:9b:c1:0e:68:cd:d5:57:29: b1:7d:23:d8:ba:f7:85:3f:4c:0a:1a:78:a3:9a:aa:bb: 38:16:6e:ac:87:a6:3f:05:c2:7c:7c:5b:f8:61:10:16: 15:cf:23:94:f6:88:20:da:43:b7:77:08:e3:47:a7:1c: 1a:48:d7:80:59:6d:67:18:ee:1d:d0:72:4f:73:29:f1: cd:c8:ba:10:e7:02:78:aa:c6:03:b5:63:cd:62:29:00: 19:79:00:58:79:7e:e9:90:b3:e1:52:bd:f3:7a:8e:20: ef:2a:a7:a6:d9:82:c1:7a:7b:c5:f2:c5:62:87:71:5a: d9:53:ae:b8:6f:df:1f:c6:a9:43:fa:88:21:82:c2:fa: c0:e0:22:7c:f6:61:3c:26:a2:60:24:c0:17:97:04:97: ee:c5:cd:31:77:25:d3:e6:bf:f5:bf:5b:08:2a:55:19: b8:f2:1e:22:3e:7c:9c:f0:b8:0a:64:de:3a:c1:85:fa: 6b:6f:e1:d2:06:58:b4:26:a1:b6:8c:be:81:1a:22:91: 3a:c4:ad:34:3b:68:dd:30:2d:67:3b:cd:be:b2:75:3a: 97:3b:ae:88:26:dd:a0:10:e2:f1:15:e7:64:51:e8:db Fingerprint (SHA-256): 95:35:9C:EB:31:28:91:6F:72:88:C7:1A:C0:B3:74:4F:FC:99:86:5C:E3:76:90:F7:A8:B4:33:56:CB:E8:AA:78 Fingerprint (SHA1): 68:B6:F4:14:FC:2E:FE:9B:73:0F:EE:9E:C5:DE:D1:B0:4A:A2:26:29 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #10879: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #10880: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125727 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #10881: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #10882: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #10883: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125728 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #10884: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #10885: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #10886: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125729 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #10887: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #10888: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #10889: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125730 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #10890: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #10891: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #10892: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125731 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #10893: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #10894: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #10895: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125732 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #10896: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #10897: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #10898: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125733 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #10899: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #10900: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #10901: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125734 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #10902: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #10903: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #10904: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125735 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #10905: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #10906: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #10907: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10908: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 510125736 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #10909: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10910: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 510125737 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #10911: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10912: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 510125738 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #10913: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10914: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #10915: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #10916: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10917: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 510125739 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #10918: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10919: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 510125740 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #10920: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10921: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 510125741 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #10922: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10923: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #10924: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #10925: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10926: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 510125742 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #10927: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10928: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 510125743 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #10929: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10930: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 510125744 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #10931: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10932: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #10933: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #10934: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10935: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 510125745 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #10936: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10937: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 510125746 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #10938: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10939: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 510125747 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #10940: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10941: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #10942: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #10943: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10944: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 510125748 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #10945: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10946: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #10947: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10948: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510125749 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #10949: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10950: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125727 (0x1e67e69f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Wed May 10 12:58:25 2017 Not After : Tue May 10 12:58:25 2067 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f7:bd:5d:93:f8:7c:8f:e3:6e:42:e7:de:f8:e9:25:52: eb:a6:93:83:66:c6:22:15:14:98:ed:18:00:9c:51:6e: 05:e8:a6:1c:dd:fc:32:f1:9b:3e:f4:c3:bb:4e:50:c9: b4:70:7d:1b:2a:8e:a1:1b:8f:f1:3d:0b:c9:1a:1e:a4: 11:c5:18:40:b6:ce:cc:d1:6c:2a:1d:4f:1d:3f:06:86: 43:17:7a:e2:5d:a5:cf:07:5a:e4:12:29:61:2e:5b:40: d2:b8:5b:c7:e1:48:e7:c0:7a:c6:82:a4:7d:7f:20:fa: b9:b5:3b:5e:87:68:ff:01:ce:4d:11:8e:ad:66:ab:f7: c1:46:8b:ee:6b:27:af:87:ca:e9:a0:10:ca:eb:b9:c0: 48:e8:3d:9d:a7:dc:70:98:fb:04:9f:97:61:e3:69:a4: 27:ea:38:c4:e4:45:f3:1c:94:66:92:f4:58:be:4d:67: 56:b9:80:3e:df:df:58:0d:12:08:c7:10:28:7c:e1:10: 28:32:49:96:21:f4:9c:15:b3:0c:0a:0e:7d:6f:6a:3e: 0f:31:57:de:0d:31:ff:6a:81:89:0d:29:3c:2c:ca:95: 9f:1d:67:30:af:85:e2:8a:9f:4a:33:b1:b8:e1:de:2a: 8e:94:57:04:bf:7f:54:23:3b:8d:32:97:de:d5:db:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: f0:a8:04:d9:ab:9d:af:30:39:c0:20:42:54:78:4d:14: 6b:45:57:94:50:86:70:b6:1e:08:f1:05:77:f2:82:3f: 55:c2:a4:8c:51:ef:f2:d2:ae:d2:72:0d:1c:f0:21:6c: 65:52:40:1f:a6:b2:8f:9b:69:89:77:4d:2c:09:66:e5: 70:3e:aa:f7:0e:9a:7d:0f:9f:aa:a9:cf:12:5b:48:5e: d7:e5:d3:d5:51:86:f5:90:0f:f6:13:b9:7c:4b:af:46: f7:56:50:a6:c1:fe:8a:d4:5d:e9:35:48:46:ee:b1:2a: af:6d:be:3a:64:80:2b:6b:47:c4:35:ea:07:e3:8f:b9: 5c:e7:32:ff:da:5b:4b:07:d8:d5:5e:f0:ef:a3:9d:a4: 0e:9e:26:6f:b6:6f:b6:af:42:17:13:21:bc:94:5b:1a: f1:05:8d:a4:5e:bc:5b:ef:96:90:17:6a:b6:ad:8b:41: 7e:9f:48:5a:5b:e6:a1:cc:b7:04:c0:6e:67:7a:24:50: ed:de:ff:3e:09:44:a9:4c:94:de:e5:0b:f8:00:74:56: a1:59:4d:0f:59:d0:fb:c3:23:f0:fd:ca:07:5e:4a:7e: 94:d2:bb:ea:36:6c:50:06:0d:b3:98:66:42:68:77:c1: bd:0f:3c:eb:5c:66:7f:40:6d:33:a9:06:9f:48:49:47 Fingerprint (SHA-256): B1:5E:45:8A:DD:B9:BB:86:F0:CB:61:41:A4:07:2F:C2:B8:C5:74:C2:CF:4C:B7:A6:64:DC:24:68:77:C0:FF:73 Fingerprint (SHA1): 42:B8:E0:E8:53:B7:FB:2D:A5:FE:14:21:21:A5:8E:88:AD:5F:DA:81 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #10951: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125728 (0x1e67e6a0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Wed May 10 12:58:27 2017 Not After : Tue May 10 12:58:27 2067 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:7b:ed:5b:3f:f8:39:09:2b:c5:20:03:0f:08:4c:b4: 87:4c:a3:c4:2e:46:15:85:37:08:af:71:c9:75:3e:35: 48:59:78:01:65:93:c1:f4:33:32:ef:f8:fa:7b:66:92: 68:ff:57:2d:19:2f:c2:c8:95:bd:1f:f4:92:51:9f:a9: 55:ed:9e:f8:9f:5f:44:4a:77:23:4a:4c:78:76:b8:b5: e7:c2:af:c1:5b:d4:67:c6:10:2c:77:fc:9e:b4:b4:0d: 71:af:03:da:d1:1c:ae:ad:08:89:96:a7:24:95:f9:9d: 68:a3:00:00:56:77:8a:2e:68:83:4b:3d:1a:82:e7:4d: 7c:e3:ae:47:db:de:91:ab:ff:2b:65:88:c1:70:93:94: 4d:94:93:10:a3:c0:de:55:51:de:69:84:6c:e5:5b:44: 48:73:bc:cb:c7:6a:12:03:b1:09:04:c2:56:6a:02:1c: 25:29:e2:3e:4d:f3:6c:36:3d:4c:f7:f3:7c:79:74:aa: 42:57:31:8a:fb:6d:bf:81:db:29:92:8d:5f:c0:d2:b5: 37:83:28:a8:8c:ac:73:73:15:dc:c9:8f:11:3e:e9:26: cc:2b:8a:bc:a9:19:8d:84:a6:22:ed:91:6e:f1:b0:56: 0a:26:90:09:0d:4e:28:9a:12:83:a2:73:a3:97:74:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:53:70:ba:ce:83:3e:a0:f6:55:bd:e0:61:a5:06:3c: e6:74:11:71:90:21:dc:08:1f:97:42:3e:3d:9f:9f:f8: 1c:4f:6d:51:00:05:70:03:d4:da:c5:bb:25:80:16:5a: 0d:c3:c8:c1:8c:0f:83:6b:a7:16:23:36:2d:90:07:db: c7:be:b4:6c:54:81:4e:91:0b:dd:c6:f9:cc:b1:c9:10: 8c:5f:87:03:84:45:1d:08:58:bd:9f:1e:3a:34:b4:73: 5e:e2:02:f7:c1:a5:5b:ff:2d:1e:05:c0:29:7f:4b:b3: f5:84:e1:4a:72:5c:50:e9:25:9a:38:85:97:49:d9:6f: 3e:2a:75:65:f6:95:e9:b4:2a:b4:93:3c:e5:d8:eb:c4: 83:02:2c:35:af:fb:3c:ce:bd:bf:f4:e0:87:8f:2a:07: f0:2d:a2:12:90:2b:d1:c7:4c:62:14:e7:9c:32:46:0c: c3:06:12:f8:40:d8:2a:b5:b6:33:6b:4d:b2:91:c8:0c: 50:8f:39:69:70:cb:02:ef:e5:40:3e:e8:7b:87:97:1e: 76:c7:48:ce:da:01:eb:31:fc:40:9c:32:d0:f1:a6:68: b4:a7:9d:c0:46:c9:36:83:a6:4c:68:09:5f:81:72:c3: 6c:91:9e:24:37:9c:ea:8a:bc:13:e7:27:aa:3a:b6:3b Fingerprint (SHA-256): CA:00:02:CD:26:17:09:93:DD:C3:F5:0B:8F:C6:8E:4D:CB:27:F1:30:29:33:E7:1D:AD:F2:5E:DF:C4:35:57:3C Fingerprint (SHA1): E5:06:8B:D1:77:BD:E4:F9:B2:7E:D1:08:42:5A:EC:83:FC:53:73:0E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #10952: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125729 (0x1e67e6a1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Wed May 10 12:58:29 2017 Not After : Tue May 10 12:58:29 2067 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:96:81:f8:96:c5:24:68:c0:1a:98:be:07:93:da:de: 6b:42:61:32:74:74:5e:37:cf:01:45:2f:21:29:e7:92: e7:f0:5a:a9:53:98:29:eb:8b:50:21:70:c4:85:51:f3: 23:23:73:c0:62:79:0e:e0:9d:a8:18:9f:32:68:f3:c9: 8e:a3:a0:14:3b:4b:c5:ee:22:a9:7f:03:98:7f:fc:73: 7b:f4:7f:fa:0c:d7:77:fb:9f:c6:e5:7a:74:2f:df:54: 5d:51:8e:ab:4c:0a:21:f7:32:07:be:42:0d:91:18:6e: 83:ec:21:f3:24:ba:d9:3c:cb:37:b6:b9:e7:82:d4:75: 25:e2:cd:ff:8c:8a:7d:3a:9a:d4:6e:a7:85:11:d5:ec: 9d:de:ac:eb:ac:52:a7:59:60:18:a2:99:fd:29:51:3b: 72:f3:f5:6b:6f:ed:58:3b:25:f9:49:e8:8b:35:18:6b: 50:04:cf:cc:94:65:72:01:a1:62:91:28:23:49:5d:94: 58:a1:cc:20:10:49:15:8a:dc:53:ba:2c:e9:b7:06:0d: 7f:88:9f:4c:a9:80:11:ad:df:93:cc:5c:b8:f8:5d:40: b4:d8:b0:99:ec:cf:af:a1:b9:05:51:04:cd:07:d3:54: d3:46:b7:10:d5:11:d3:b7:cc:63:93:42:ce:3e:b5:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c4:18:79:b9:ed:eb:3e:60:ae:d1:6a:dd:12:ce:c4:8e: 31:a5:70:f5:2e:77:75:7c:20:eb:73:71:f4:99:60:b9: df:f8:65:81:24:60:1a:28:30:69:9e:b2:c6:70:5b:bb: 8f:c9:4d:99:39:4d:06:29:e9:e3:2f:47:26:b5:c1:94: 0d:4c:85:f4:a9:24:19:0f:56:ad:54:c4:84:d8:43:d8: 58:b1:a8:3e:e2:fa:fb:09:fd:62:d5:7a:86:91:07:59: ad:e6:f7:cf:1a:a2:ef:0c:ea:2a:97:e1:05:19:c4:19: a0:d3:9d:d6:71:45:60:02:48:d2:c0:53:a6:4b:41:c3: 45:74:48:36:91:44:a7:c4:43:1e:8c:3e:e3:63:43:d6: bd:8c:02:b9:4d:3f:d9:1a:08:d9:47:e2:61:10:15:65: 74:db:46:1f:04:23:1b:01:9d:8d:65:1d:b7:40:bd:42: 8f:c9:22:b3:48:d1:f2:3f:e1:64:dc:9d:53:b7:1b:15: 3d:f9:dd:d2:4e:f6:7b:51:5c:56:ba:b1:79:d8:99:8d: a5:06:cc:79:c0:2b:71:97:f0:e7:83:c9:49:0a:68:6c: 00:7b:01:17:9e:14:5f:15:b5:85:5e:71:80:39:7e:43: 77:c4:83:19:81:3a:55:39:29:f5:3f:82:7c:04:4b:82 Fingerprint (SHA-256): 3F:8A:63:C4:84:53:EC:E2:D2:DD:5F:41:1B:04:A0:19:B2:A5:DB:97:14:A3:6C:54:E5:F7:7E:0A:6D:9C:96:9C Fingerprint (SHA1): 94:44:17:47:9D:17:21:3A:10:7D:5D:EA:43:08:47:EE:65:F5:5A:FE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #10953: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125730 (0x1e67e6a2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Wed May 10 12:58:31 2017 Not After : Tue May 10 12:58:31 2067 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:2b:cc:4e:b9:8f:28:b7:32:a1:6b:0b:42:91:c9:0c: 33:9b:b8:ec:90:3f:10:90:f8:c2:a4:cf:56:da:c7:94: 2f:9b:42:80:43:c0:24:ad:37:67:97:b1:93:95:3c:fd: 21:b4:e4:9a:3e:fa:c2:67:52:fd:c2:15:3e:d2:73:81: b8:9c:bb:ba:76:35:a9:c4:5a:9a:19:d0:fd:00:56:49: 5f:94:44:2b:b9:6a:40:bd:41:96:eb:3c:87:ce:c4:31: 38:c3:b2:3d:6c:c4:37:06:31:41:3b:e0:fb:90:90:e7: 0f:70:56:1f:a7:15:93:3f:54:65:41:0d:bd:6f:f4:7c: b2:6f:da:48:4a:33:70:9a:1d:ca:2f:44:fb:2b:c1:d7: 9a:56:a6:54:1c:b1:93:33:30:84:11:af:c0:90:35:8d: ae:6e:4c:2d:63:b1:e2:ce:79:44:46:f0:db:fc:0a:25: 23:b2:c1:b3:fd:67:d5:84:1a:71:e6:90:b3:d1:02:29: 0d:00:25:99:cd:8b:e2:2f:16:29:d4:f5:7e:0c:3f:eb: d1:67:d8:16:c9:1d:98:bb:f4:4a:29:9b:b2:32:97:e8: b7:53:55:30:b8:e6:85:2c:38:fc:8b:cc:56:d8:45:d2: c1:7b:50:f1:2f:45:12:c0:b9:77:14:29:31:2e:34:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b7:14:a2:c8:70:d5:85:d6:9c:05:96:af:4b:55:21:e5: 52:2b:a9:ab:6f:7b:39:62:88:c7:db:ce:b6:32:a3:c8: 09:9a:9d:7f:4f:dd:de:df:53:45:b6:c0:66:a2:22:40: 83:0e:dd:a4:5f:e4:4b:46:8c:4d:4c:3d:f8:d2:cf:71: 78:5f:40:28:32:1d:2e:bd:0c:99:04:c2:4f:a1:8a:1c: 3d:09:c3:87:5d:db:fb:83:f8:0f:cc:35:49:bc:a4:58: b6:d8:de:72:74:2a:8b:42:47:2a:7c:70:2a:d3:07:cd: 0f:cf:75:50:31:f0:c5:c7:81:70:9c:71:5c:be:a0:dc: e1:4e:18:ff:24:e6:7f:3e:80:b2:c4:74:3f:46:d5:49: 7c:06:71:7e:f5:5a:9e:42:18:40:c4:f1:cc:0c:3a:42: cf:07:0c:4a:64:65:d7:c5:f7:e0:32:f2:98:e6:cd:65: 47:76:98:d5:c9:ab:0b:16:ac:5e:be:95:06:1e:87:75: aa:b0:b0:52:56:11:16:e9:91:bd:28:84:20:1b:20:6c: ad:3a:77:be:98:e4:d7:53:b7:0c:48:d6:63:14:57:68: cc:ef:da:37:2c:be:7b:bf:e4:54:28:32:f1:96:05:b5: 34:57:75:26:06:4d:a2:8c:b8:df:9e:36:d0:f7:28:8b Fingerprint (SHA-256): 22:B8:B0:30:7A:7C:91:09:AF:4D:B3:5D:8C:C9:F3:B3:C3:82:41:3B:D0:08:1A:B4:9C:9A:2B:CA:48:60:A9:D5 Fingerprint (SHA1): 1B:ED:41:57:58:7D:BA:9B:41:E4:1B:C0:9F:19:70:D7:A9:E0:52:F9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #10954: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125731 (0x1e67e6a3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Wed May 10 12:58:32 2017 Not After : Tue May 10 12:58:32 2067 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:58:8e:1f:5e:14:96:24:28:9f:26:76:3a:31:c4:3f: 7a:79:43:2e:cc:8e:96:6b:b8:2f:2e:8c:2f:3f:bb:f2: ad:ba:f2:1a:f5:29:1e:75:33:f5:8b:f5:2f:98:93:91: be:7b:34:b5:1a:47:53:15:c5:44:a6:8e:a5:6e:f9:5a: c0:e5:a8:54:35:9a:b8:92:00:ce:69:cd:3e:40:b8:9e: d9:4c:5d:e8:8c:2a:a0:fc:2c:5e:22:02:2f:73:88:62: b8:a0:c2:3b:75:a0:94:a3:37:a4:75:3a:0b:d8:40:27: 46:55:93:87:ad:21:d3:c7:b1:09:ff:c7:00:0b:14:7e: 4a:99:75:6f:13:fc:5a:5a:18:06:0e:3a:37:7e:19:a6: 01:e8:e8:d1:bc:68:ad:00:fb:72:84:de:c0:04:71:73: 79:7f:a9:2a:bb:ea:ee:c4:ed:e1:df:74:dd:da:85:e9: 40:2c:8a:04:6f:9d:8d:b4:60:4a:d4:87:8e:4e:9c:7c: ef:9b:14:22:b3:34:20:43:f8:75:9d:ef:59:4a:78:65: 1d:40:75:6a:7b:bc:8d:6c:09:dd:58:b1:30:f2:e5:e4: db:48:f6:1c:46:c2:cf:a7:18:2c:e5:90:0e:5d:b3:ad: 71:61:81:3b:66:43:3e:5f:3f:6c:0f:fc:cb:e5:a4:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:2b:ea:9f:98:39:e2:a3:b2:ea:43:43:ca:c5:22:ac: d5:2f:ad:8f:46:f8:8c:c6:2d:c4:69:44:e8:6a:1d:25: 14:ff:c5:57:2c:fd:64:d1:8d:5c:7f:9d:6d:b7:32:99: c8:a5:75:ce:3b:2f:d4:9c:e9:ab:e8:94:82:2e:a3:ca: 07:c4:00:34:6e:06:b9:f4:8c:92:bd:81:51:77:bd:28: 72:52:63:b7:71:9e:38:58:6f:d6:2d:47:6c:9d:a0:1e: 36:59:7f:2d:84:ca:87:54:a1:b4:99:14:b8:f0:e4:56: cf:7a:03:0a:be:a9:85:8d:e8:73:31:f8:e7:5b:1a:48: 69:d4:01:26:7f:5a:79:55:72:a0:80:25:63:5e:a7:77: 3a:22:12:bd:d2:d0:12:c3:fd:cc:81:e6:a3:4c:f8:7b: 95:87:5a:45:a9:2a:7c:30:5d:1a:3e:71:8b:ef:29:43: 6a:ee:c1:59:38:06:60:c5:cf:4c:1f:52:4e:b1:78:61: dc:4c:60:2b:a4:2d:65:19:d0:27:2b:ec:c8:72:26:f8: bc:6f:9d:6b:14:a1:95:15:4f:ec:10:6f:6e:c1:9e:fb: 68:14:2b:b2:22:b2:da:89:47:40:55:d2:93:ed:1f:b2: 52:e6:b5:6a:43:18:21:d2:90:e6:c2:1e:4e:e6:67:ea Fingerprint (SHA-256): 75:B7:CF:17:CF:B7:5B:8B:EB:BA:66:05:F1:46:4F:5F:CD:7B:CC:67:A8:96:7C:D0:0C:1E:8A:37:7D:9D:D7:00 Fingerprint (SHA1): CA:C9:82:C6:F9:F5:C2:46:A1:03:27:B8:52:C0:8D:3C:86:C8:2B:7E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #10955: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125732 (0x1e67e6a4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Wed May 10 12:58:35 2017 Not After : Tue May 10 12:58:35 2067 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:6d:af:6f:a7:6e:91:43:70:44:f7:ac:e9:7d:7c:8c: 33:bf:27:ad:e7:04:9f:05:41:80:79:53:e5:8c:84:f4: 65:fc:db:b6:2c:62:db:59:c8:22:e3:6c:e1:b8:c6:ce: 92:24:3c:52:23:40:b0:d5:96:67:c7:e6:67:0b:74:20: 3c:2a:00:af:64:76:5a:fa:d4:93:ff:a2:7c:c1:b9:17: 13:b7:e1:7f:ee:28:a2:3b:d7:95:a8:de:eb:ae:9c:85: 32:27:91:61:49:6f:e9:5d:e3:a4:0b:1d:9f:fd:b9:fd: a8:96:8f:df:eb:b4:52:89:e2:b9:93:35:aa:37:24:b0: 38:bf:f8:a7:fc:58:e0:3d:93:4f:f4:0e:fa:9c:5a:0c: 95:d0:f6:fe:0a:58:23:59:bc:e7:33:bc:f6:ee:26:01: 54:11:48:34:e1:1e:e1:a6:22:fd:4c:75:b4:09:97:d8: 78:a1:8c:23:9d:fe:3a:e8:86:82:13:51:42:9e:a5:b0: c5:c0:39:6e:75:19:fc:52:19:0d:ee:15:4f:ec:10:d4: 4b:97:ba:1c:ec:6b:72:e8:66:c5:29:ae:c8:f8:c2:a4: ff:cd:3f:4e:f3:72:ab:cb:12:82:be:51:db:81:d0:71: 69:e5:f2:f4:25:42:99:9e:0f:db:92:25:b4:b5:b8:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c5:35:d1:24:ce:2e:b9:e2:1b:a0:43:79:65:a5:33:2d: 7c:2f:a9:eb:85:ad:eb:d0:dc:ed:23:5c:97:8e:bd:a2: 92:0c:ab:3e:7c:b6:89:98:e9:88:4d:8c:6d:06:f3:1e: b6:8b:2e:a0:4d:f4:7c:ae:91:2d:44:87:e5:ab:9d:fe: 25:59:86:93:fe:16:e8:b3:38:88:2f:1e:d7:0e:b9:58: b7:72:6a:5f:2a:f0:9f:d0:4b:5e:f5:bd:21:12:c8:b8: 4b:31:8c:ee:39:e2:2c:04:3d:78:95:9c:c3:c8:72:72: 0e:3d:a4:a5:10:45:13:59:bc:f9:f0:ff:7c:22:9c:2e: a7:e2:d4:e5:a8:7e:ef:64:58:e8:58:0d:e8:3c:d9:83: d6:9d:dc:ea:88:09:19:f1:1d:00:3f:31:67:86:0a:98: 95:10:5f:19:03:9e:69:7e:89:b0:a5:14:f8:97:2c:00: a8:50:fa:12:6c:82:53:e1:99:7e:45:ea:02:9a:33:88: 43:11:29:40:26:90:c0:91:9e:46:8e:58:08:82:18:e3: a3:4f:d3:80:26:d4:f7:e9:58:40:a8:ad:8e:f3:4b:20: d4:a6:49:0b:34:84:20:f7:60:f3:59:bf:04:40:fa:d2: 53:71:8b:40:eb:05:f4:9c:74:a7:bb:e1:a5:ef:fd:cb Fingerprint (SHA-256): 90:A7:F4:62:2E:EB:C6:89:45:0E:1F:85:1B:EF:34:4B:35:D4:B9:01:D5:B9:AC:38:CB:B8:41:85:12:92:67:45 Fingerprint (SHA1): B0:FA:92:AA:77:35:F0:67:34:E8:7A:0C:00:50:0E:4C:71:7C:1B:43 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #10956: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125733 (0x1e67e6a5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Wed May 10 12:58:36 2017 Not After : Tue May 10 12:58:36 2067 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f9:eb:5c:fd:d8:69:da:6e:9a:3e:d1:1d:fc:51:48:d0: 7a:2d:1e:d5:e4:40:5d:f4:b2:b6:62:6d:a3:67:72:b9: 18:21:24:70:e6:94:dd:63:0a:5c:f0:52:f1:e3:b4:e0: 98:85:83:dc:d9:de:47:8c:53:41:72:ff:78:99:5e:d6: 07:d1:83:e9:63:b7:49:36:2f:90:38:7e:d1:c7:a2:fa: 12:02:ea:53:d4:92:2c:14:e6:b6:fe:7a:69:d2:a3:2f: bd:99:b7:80:36:50:15:f0:3f:15:32:ba:97:92:86:e9: 61:98:f7:c6:40:4b:06:c2:93:49:0e:ba:bf:5c:c7:80: 34:8a:2c:d4:51:f5:74:93:cb:3d:3e:24:57:b0:fb:25: ee:99:d4:68:c9:94:73:1f:28:2c:b1:32:5d:e3:0d:f5: 43:5d:29:06:65:6f:95:a3:d6:40:bd:8b:bf:37:76:da: 83:3c:b0:db:95:e3:8d:ec:e9:bf:77:a9:e9:5a:a4:a0: b7:68:44:5c:4c:fa:0a:9e:bd:42:de:59:03:b6:88:50: 8a:01:ed:32:6a:3f:51:9c:3d:ae:e9:35:a5:99:3d:f8: f7:37:c7:20:a6:96:cf:f8:7b:35:55:fa:9d:bc:3f:ee: 0e:e1:ea:26:41:fc:c0:80:e3:fe:96:6b:7f:5c:97:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:cd:f3:63:22:d8:4d:0e:37:75:aa:66:90:8f:85:61: 24:15:ff:51:74:5e:77:6b:e5:ee:06:dc:ab:43:42:08: 4a:ca:b6:6a:83:fc:65:db:3d:99:61:df:64:93:a6:34: d7:75:20:61:e5:ab:b2:65:48:7b:06:e5:6e:a7:ba:e5: 9c:56:4d:d5:45:90:e9:72:80:ac:19:ea:80:a1:25:f8: 7a:7a:b8:3b:55:0a:d1:b8:2f:f0:60:2d:66:05:93:d9: 50:02:cd:49:22:f0:2f:f8:11:6c:0a:b9:1c:cd:6a:b2: 12:fe:c8:6f:21:2e:a3:2a:66:b1:cd:7c:23:6b:66:bf: b1:e1:ba:7c:f6:5f:c2:55:d2:62:25:7b:7b:78:33:19: 75:f5:8a:51:31:b4:04:fe:3b:b8:f2:22:b9:d4:d5:75: 72:02:c1:9c:78:4b:ee:bc:e9:bb:9d:79:0f:24:db:c5: a2:41:3f:53:83:f2:e0:8d:33:42:f0:51:87:c0:24:ef: 5c:f5:4c:c6:7b:f7:96:b4:b4:82:34:f9:c9:f0:d3:3f: 72:1b:e5:53:2e:70:fb:57:33:0f:3f:1c:40:e7:7f:a7: b9:56:e3:84:96:ff:0a:75:2b:8d:d8:b6:74:87:38:fe: b8:7a:4e:c9:b1:81:7f:bc:5d:72:7d:79:08:fa:d8:1e Fingerprint (SHA-256): B5:FC:0E:D3:10:80:18:85:12:57:E7:A7:C8:28:9B:C2:8C:69:6A:A2:E3:87:99:F3:25:2F:0A:45:ED:D9:2A:07 Fingerprint (SHA1): CB:5B:2F:9C:8D:24:7B:56:2C:0E:F7:A6:52:F3:E1:06:52:84:19:F6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #10957: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125734 (0x1e67e6a6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Wed May 10 12:58:38 2017 Not After : Tue May 10 12:58:38 2067 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:3d:51:8c:06:59:39:be:07:33:93:00:01:25:f4:22: c8:61:7f:5f:a2:f8:95:65:cf:0a:c2:8a:73:0e:2b:b9: cd:54:67:0b:18:26:5f:f1:67:91:c5:02:32:24:b3:ac: 95:5c:4d:31:e7:69:04:d1:35:61:d6:b7:ea:1c:4e:52: ba:24:db:43:fc:41:55:b8:df:dc:1a:ad:1a:d3:b4:ad: de:f4:8a:6d:d9:72:22:1e:5d:83:ab:73:88:b6:b5:02: 15:49:93:5d:7b:0a:1d:ca:e1:81:5f:09:83:e9:de:e9: d4:c5:37:a8:26:84:09:d1:72:aa:78:32:bc:25:d0:12: db:6b:a0:8d:e8:52:38:7c:d9:d3:a6:7b:73:0f:d2:4f: 85:fd:b9:28:df:17:43:16:b0:09:9f:52:dc:10:58:a5: 6e:59:63:0f:e8:30:a4:ab:36:5e:6c:62:24:68:16:7e: 99:ab:65:37:ce:7c:10:9c:6f:6c:99:6e:e8:aa:3d:5f: 5a:60:a5:ca:0a:bd:89:f9:f7:bb:6e:1f:ab:58:52:3b: bf:99:62:3d:6d:15:8f:ff:1e:9f:22:ac:72:59:7f:4b: 37:d7:87:3f:ae:69:da:41:1d:4c:51:14:8a:28:a4:e3: 3e:db:34:5e:78:02:06:00:f7:b9:f0:e0:12:e9:16:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ad:3a:c3:c2:9b:f5:ee:09:23:b3:2c:11:36:85:4b:66: 0f:79:ab:cd:ae:38:09:d1:31:c3:ff:a7:60:44:ac:6d: 79:25:c7:17:cd:82:7b:4e:d0:73:18:7f:44:69:22:59: 49:ee:9b:4c:9e:9a:e4:94:56:ca:62:9e:72:df:58:9d: 25:12:1d:e1:7b:d7:c7:cf:b3:1a:c3:7f:62:36:62:52: 6b:d2:b0:5c:2c:3f:28:f4:1e:48:f8:12:be:ab:a8:f6: b8:b1:57:f6:a9:34:56:82:c6:8e:f7:ea:33:9c:97:76: 49:dd:35:5e:7b:28:73:68:27:31:13:7a:6a:c2:95:0a: ac:f2:04:26:97:f1:1c:79:c0:b4:5d:42:c5:c1:77:d1: 87:18:96:4a:7d:d4:18:f8:a0:55:9e:3b:86:30:11:ea: 2d:f2:bc:d3:6a:5b:ae:71:f0:f9:76:90:31:70:1a:cf: e9:d4:11:10:7b:0e:b3:17:f5:5c:ec:55:53:f6:1f:b4: 89:f4:67:2e:9c:0e:14:51:99:46:39:a7:83:e3:8b:10: 99:71:35:fc:d3:36:2d:f2:c7:f0:05:24:53:cb:71:7c: 2b:35:14:6c:ec:35:7b:ee:9f:da:4a:f4:6b:3d:6b:f9: 6d:63:2b:52:0c:9f:3f:7d:00:5d:a6:b2:5a:57:31:c3 Fingerprint (SHA-256): DC:99:A1:6A:00:DD:D3:FA:32:8E:29:56:A1:15:82:C1:D1:A7:BD:8A:19:77:07:A8:78:46:3E:AB:BC:CF:25:BF Fingerprint (SHA1): 26:6C:1F:18:78:41:12:30:CA:5A:FB:5E:EC:6A:9C:8B:9B:0B:7B:00 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #10958: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125735 (0x1e67e6a7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Wed May 10 12:58:39 2017 Not After : Tue May 10 12:58:39 2067 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:45:83:77:88:2d:2c:27:62:a0:2c:f8:9d:59:72:11: 53:a4:6a:2c:6e:a6:1c:d7:d8:26:10:cc:73:e7:61:81: 08:a8:0b:d1:0c:6f:4d:45:4a:5f:5e:81:bf:bd:f5:f9: f0:80:b6:6c:0e:6b:f4:81:8f:5c:c4:21:51:bc:3a:3a: f2:91:67:1d:2a:2d:94:fb:0c:53:1c:3f:4a:cb:c0:92: cb:25:d6:76:08:26:d8:20:78:9d:84:c3:df:fc:94:8a: 72:38:f9:f9:8d:49:92:20:34:01:88:80:4d:73:3d:96: 30:a8:9b:ba:77:19:2d:b4:99:e7:e3:5d:dc:40:af:6f: c3:48:4e:7e:39:8c:f1:59:b4:b7:aa:9b:11:ff:08:eb: 9b:be:d9:1b:55:3b:ab:99:6c:94:23:d3:21:2a:2d:fe: da:79:0c:59:71:b5:f8:7d:2f:0f:58:8b:95:08:98:06: 16:d6:bc:3a:0a:2c:51:f3:b1:c3:27:cb:28:c9:71:4c: 09:66:b5:59:80:10:49:3c:ec:d8:e8:dd:06:27:60:30: 6f:b0:e0:4e:c7:0e:62:19:23:96:5d:c4:46:df:53:16: b7:36:47:22:f5:e8:e1:b2:1f:ba:2f:c2:82:39:2f:fd: c8:64:7b:38:a4:27:64:0a:eb:a9:69:db:c9:86:76:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 44:55:ff:98:13:fc:fa:7d:a8:db:9a:5d:ef:1a:18:84: 21:b9:5f:4b:b5:e9:3c:6c:79:8b:c0:b4:12:35:06:ad: ae:ac:48:13:6b:fd:96:8a:09:af:33:ea:f6:ae:05:71: 3d:18:71:0f:5d:75:0a:5a:d0:20:aa:d1:5f:b4:d4:ca: 66:96:ed:5d:c4:24:67:eb:35:e9:93:a0:b0:bc:58:51: 48:0c:4b:b6:c6:35:42:c2:6c:95:38:85:03:0e:f1:e8: d6:24:fd:39:44:cd:5a:f5:4d:af:32:f2:1d:c1:53:81: 02:38:71:0f:76:11:41:92:5b:dc:86:b4:da:53:c2:19: 9c:33:3c:e8:be:43:c4:65:67:5b:19:7f:bb:b4:c2:4a: 88:55:24:88:d9:13:7e:ee:2c:3a:74:7c:da:e2:a3:7e: bf:67:97:2e:32:af:0b:eb:5c:d5:32:d5:0e:2f:30:a7: 16:c4:63:66:56:db:1b:76:82:83:ed:6c:d6:7d:73:67: cd:ec:db:72:e6:d8:5e:5f:aa:6b:1e:2e:d6:34:1c:be: 42:c9:60:53:a3:03:c7:96:0f:44:6a:f3:c9:68:38:96: e1:cc:3c:89:f6:71:b9:52:37:2c:f7:2e:cd:e6:dd:87: 65:7c:20:c5:90:83:b6:70:a5:91:3c:dd:17:34:9e:4a Fingerprint (SHA-256): 7D:21:42:15:3A:89:EE:A5:2C:E0:8C:6D:C4:E1:12:1E:BD:A1:BE:37:50:E1:69:A0:0B:3B:FE:D8:A5:E5:BD:55 Fingerprint (SHA1): 47:E2:E4:5B:35:BD:70:67:1C:3D:F3:6A:34:5B:C4:8A:31:E8:A1:24 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #10959: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #10960: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125750 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #10961: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #10962: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #10963: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10964: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510125751 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #10965: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10966: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #10967: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10968: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510125752 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #10969: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10970: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #10971: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #10972: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 510125753 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #10973: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10974: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #10975: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125750 (0x1e67e6b6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:59:01 2017 Not After : Tue May 10 12:59:01 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:19:51:7f:38:e0:12:4c:c5:26:8c:4b:af:a9:47:22: bf:19:a1:0f:8e:3d:0f:0f:3f:9f:a6:9f:2a:8b:c1:a9: 04:37:15:f9:ec:18:16:74:aa:63:08:cf:a7:5a:3f:fd: d2:51:c2:67:fa:6b:83:3a:a3:f2:6c:2b:2d:93:9a:d2: 33:37:31:77:16:aa:d9:24:64:aa:8c:bb:53:27:a2:26: 64:5c:af:2f:66:8f:22:0c:1c:53:3a:55:2c:a0:da:c4: 14:3b:51:9c:08:b1:fb:09:64:7f:c8:1e:f9:6b:10:c9: 1c:9a:0a:67:8e:82:6c:8e:ab:96:0e:9d:6c:87:51:5d: 05:b3:26:dc:11:fc:0d:1b:69:bc:62:41:4a:d8:b8:41: 9b:e9:06:d1:52:9b:50:a4:f6:1e:7b:4b:53:53:c9:e4: a0:4d:e3:52:36:5f:77:30:10:a5:1d:c1:34:40:d0:65: 43:e1:cf:2c:3c:84:17:ac:e6:16:dd:47:33:56:4e:fe: 2a:35:2c:44:55:33:64:45:5b:84:ce:84:97:6b:84:cb: 7d:7e:25:d5:53:fd:d1:51:15:1e:80:b4:c8:39:b2:fc: 1f:5a:b0:43:03:ea:21:09:ef:7d:0f:91:73:fd:bb:83: 05:a2:8f:a3:c5:e1:ea:87:51:8f:61:26:80:c2:30:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e2:db:30:15:30:2f:3e:76:1b:2e:77:1e:b7:c8:c0:83: 2e:45:dc:ad:b3:b1:76:e4:4c:dd:74:a5:f1:6e:d6:05: 49:85:83:7a:a4:1a:69:fa:d1:c6:61:16:fa:5f:44:1f: d4:7b:82:73:20:9c:72:70:f5:11:6f:da:02:bd:74:b6: bc:85:eb:27:dd:9f:ef:4b:7f:1c:bc:f6:f5:1c:ea:b1: 73:71:cf:d7:92:3f:7e:43:27:d5:f4:0d:14:31:93:a2: 3f:0e:da:36:0d:c5:f3:3b:58:83:eb:68:d1:f1:1a:92: 72:5d:42:c1:0b:f7:e1:15:5b:32:08:45:61:1c:45:88: 7d:02:a9:8b:40:40:dd:b8:d6:6d:49:bc:4a:9a:6f:60: ad:6f:d0:c5:8c:ac:a9:a2:2f:6e:e2:f7:60:de:65:f2: 13:92:b1:25:71:3b:45:02:93:7b:bd:5a:09:93:82:b2: 5b:f0:1b:e4:6e:43:64:57:96:b9:ca:2e:11:0a:30:5d: ed:d6:51:a6:04:58:3c:f3:8e:47:79:e0:6b:2a:c3:b4: f4:f3:87:9e:8e:ff:0b:5a:f4:2f:cc:a1:4e:6d:4f:3a: 5c:33:69:aa:7b:d4:c5:29:74:34:50:43:b5:62:d2:d4: 15:5a:e3:8d:e8:55:3c:20:6c:6c:e1:cb:d7:35:9e:70 Fingerprint (SHA-256): 5A:92:88:A4:63:3E:12:4E:6D:AC:9A:24:75:B3:48:2E:D8:5D:86:D1:D2:51:E3:4D:59:B5:5B:D3:7E:F6:77:21 Fingerprint (SHA1): D0:ED:27:F7:AA:9C:FF:7E:90:43:5D:FE:52:76:B8:72:E9:6B:60:4D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #10976: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #10977: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125751 (0x1e67e6b7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:59:03 2017 Not After : Tue May 10 12:59:03 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:0e:4c:ce:0b:5a:b7:25:ad:47:52:5f:4d:dc:8b:99: 58:67:a3:40:66:8e:76:d7:43:84:a9:bd:fc:93:f2:c9: d6:28:d3:fd:e8:90:8d:c0:23:db:86:fa:77:da:15:73: 49:0d:47:2a:8f:b6:62:f3:db:79:27:fd:07:90:32:04: 25:09:29:2c:e7:01:d1:0f:21:eb:07:aa:29:24:44:49: 08:60:63:4c:8b:29:d8:57:62:00:50:a7:0a:1a:1e:cd: 83:22:cf:af:95:57:47:cf:5f:89:25:f2:fd:cb:3e:70: 8a:b8:3b:91:08:68:e3:88:2d:e8:f6:22:a8:5c:4a:82: 01:b4:8d:83:b2:51:5a:e4:d3:cc:8a:c4:66:fd:4e:de: a2:7a:12:47:9e:7b:02:35:d7:7e:0d:8e:20:18:f6:84: 28:30:64:3a:7c:c7:c7:14:86:34:50:03:3f:54:a8:ea: f1:92:f3:b0:cb:a0:8b:c9:6f:2f:58:e2:47:9e:43:09: 9b:55:ce:7e:fb:fa:38:8d:0c:ab:0b:d9:8e:f7:91:5d: c3:24:32:6b:0a:cb:30:4d:77:9e:ad:f4:9b:b0:b9:86: 8c:ce:16:bd:3c:36:e2:c3:c9:7e:f8:60:26:a2:d4:84: 17:0f:83:f4:eb:84:28:c5:c2:de:66:3b:b3:56:d7:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:1f:ef:d3:07:00:31:6e:44:29:84:b2:b7:32:6c:a9: 92:79:b3:f1:13:c3:ca:7a:6a:7b:38:c0:61:51:75:7a: c3:79:07:1b:24:82:13:b2:4f:1c:ae:8b:71:3f:21:20: 12:ae:1e:06:82:05:b0:73:b7:aa:72:67:a1:ae:2d:5a: a5:7f:da:3b:d5:f3:c4:cc:f6:75:53:c1:9c:9a:0d:f9: d5:ad:e1:24:44:a1:a5:1f:a6:1b:28:6b:93:cf:1c:e8: c5:91:ff:fb:2b:50:1c:ed:66:63:0b:07:28:7c:5d:02: b7:e1:9a:e3:7a:7a:16:74:7d:9c:8f:93:3e:63:95:1c: 89:e8:37:a5:93:84:7f:5d:9a:4d:1f:38:60:fd:e5:ae: db:bf:c1:18:f4:cd:61:d6:59:b1:78:c9:e6:0d:b9:cf: ea:f3:aa:d8:b1:88:1f:f4:a9:6d:ae:cd:dd:6c:8d:ce: 12:0e:2c:5a:a5:52:37:0f:c0:06:fa:13:3e:01:37:ac: b0:03:b3:68:c5:05:cd:59:66:ba:ba:4b:d7:e5:b1:bd: 53:21:c0:83:cc:f8:2f:b9:33:62:b2:33:3b:6d:c5:fd: fe:87:b8:f0:fd:ff:8e:c1:a6:24:66:83:57:74:57:29: 0a:97:44:1d:b0:ac:ef:08:8b:90:d4:d4:97:39:8e:1b Fingerprint (SHA-256): BC:45:C5:94:AF:C0:BC:F6:B2:0B:81:7D:06:92:7A:C5:07:A5:91:22:F1:0B:A8:75:11:D6:1D:D0:9E:8C:7C:DE Fingerprint (SHA1): 23:A4:C3:CE:8F:D7:79:CC:0E:79:61:10:52:CD:22:D3:DB:EF:D6:FA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #10978: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #10979: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125752 (0x1e67e6b8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:59:06 2017 Not After : Tue May 10 12:59:06 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:f9:f2:cf:64:7b:0f:11:53:dd:af:d0:42:ec:c0:14: 9f:0b:3c:49:b1:34:bf:17:bd:c7:72:9d:f9:c5:ca:9e: 1f:1a:66:2b:19:d3:10:07:1d:e7:bb:b7:87:90:e3:01: 54:8f:ce:d8:2a:d7:43:e5:45:2f:e9:45:44:b7:8a:ed: 3a:52:5c:d1:4b:d7:55:2b:57:bd:83:ed:91:cd:81:01: be:66:9b:ae:f1:16:82:7f:2e:d0:7f:ac:95:45:52:f4: db:46:67:f5:c0:01:f9:db:96:2d:40:66:8b:4f:07:98: 4f:2e:2e:12:43:ad:91:bd:e8:fd:99:a2:1d:12:cd:48: d6:ee:5a:84:1c:45:6e:74:1d:bd:0c:9d:90:85:30:7a: 54:bd:52:43:0f:18:f4:19:ce:a7:c4:8e:25:b4:14:3e: cc:e8:32:d8:e1:66:83:07:b8:0e:3c:f0:f4:b9:bd:f8: a1:ad:27:36:18:c1:54:2c:3a:67:3c:77:bd:09:eb:1a: d4:f7:71:75:b7:25:f0:bf:b8:12:24:b8:2a:3b:dd:ed: c7:9f:79:76:58:2a:fc:2f:e3:da:ed:46:ea:f0:aa:e7: d9:88:cb:2e:ab:b7:92:88:6d:97:fd:10:07:53:5d:3b: fb:74:e0:34:ef:c2:69:31:a0:5c:f2:bf:de:e6:e6:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ae:e9:db:59:90:92:d8:3a:57:45:68:b5:10:58:39:ae: 8d:3f:ec:76:19:fa:d7:99:5d:7e:22:8e:4b:92:f0:81: 2c:c3:34:01:48:28:3e:0b:00:35:66:7c:6e:52:81:7b: 09:35:91:19:78:dc:e5:20:1a:40:5a:a7:bc:06:c0:e2: 87:c0:06:0d:85:91:88:2c:9e:e2:d3:c3:97:05:0e:24: 01:7a:64:25:a6:19:40:ed:ca:2a:8d:1e:6e:c7:2d:f4: 24:25:c9:82:5b:a8:9e:3c:fc:cd:67:86:45:a0:6f:74: bc:54:d4:b2:d1:ed:6c:77:70:bd:ed:6c:d0:1e:f7:d9: 0d:03:a8:06:5c:ba:2f:f0:c9:c1:69:76:1d:46:1b:dd: 1a:a4:da:cd:2a:b3:61:20:c4:3d:f6:fb:d1:0f:6f:44: e3:f0:24:98:31:a2:05:b6:c4:d8:13:0a:89:b8:c4:51: 1f:e0:51:e6:cf:c4:dc:44:80:9a:39:bb:d5:3e:ed:eb: 44:59:f5:bc:11:f3:cd:1a:f0:58:2f:0e:c3:47:60:cb: ab:20:da:10:3c:86:ff:bd:ea:e2:ee:a5:fb:ce:55:5c: 4d:6d:1c:c8:3c:3d:52:c9:e7:97:b1:80:c3:de:6b:ee: 26:d9:04:81:d9:bd:48:f5:6b:0d:7a:47:67:b9:4c:d2 Fingerprint (SHA-256): 43:14:CE:5C:BC:26:A4:53:1C:0E:15:82:E0:A3:92:4B:62:C1:64:0B:2F:A7:2A:9A:1E:66:B6:4F:C2:DB:29:86 Fingerprint (SHA1): 80:BB:63:B6:F4:A3:E2:1E:2D:14:8D:0A:B0:41:1D:AB:3E:1A:8E:44 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #10980: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #10981: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #10982: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #10983: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #10984: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125750 (0x1e67e6b6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:59:01 2017 Not After : Tue May 10 12:59:01 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:19:51:7f:38:e0:12:4c:c5:26:8c:4b:af:a9:47:22: bf:19:a1:0f:8e:3d:0f:0f:3f:9f:a6:9f:2a:8b:c1:a9: 04:37:15:f9:ec:18:16:74:aa:63:08:cf:a7:5a:3f:fd: d2:51:c2:67:fa:6b:83:3a:a3:f2:6c:2b:2d:93:9a:d2: 33:37:31:77:16:aa:d9:24:64:aa:8c:bb:53:27:a2:26: 64:5c:af:2f:66:8f:22:0c:1c:53:3a:55:2c:a0:da:c4: 14:3b:51:9c:08:b1:fb:09:64:7f:c8:1e:f9:6b:10:c9: 1c:9a:0a:67:8e:82:6c:8e:ab:96:0e:9d:6c:87:51:5d: 05:b3:26:dc:11:fc:0d:1b:69:bc:62:41:4a:d8:b8:41: 9b:e9:06:d1:52:9b:50:a4:f6:1e:7b:4b:53:53:c9:e4: a0:4d:e3:52:36:5f:77:30:10:a5:1d:c1:34:40:d0:65: 43:e1:cf:2c:3c:84:17:ac:e6:16:dd:47:33:56:4e:fe: 2a:35:2c:44:55:33:64:45:5b:84:ce:84:97:6b:84:cb: 7d:7e:25:d5:53:fd:d1:51:15:1e:80:b4:c8:39:b2:fc: 1f:5a:b0:43:03:ea:21:09:ef:7d:0f:91:73:fd:bb:83: 05:a2:8f:a3:c5:e1:ea:87:51:8f:61:26:80:c2:30:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e2:db:30:15:30:2f:3e:76:1b:2e:77:1e:b7:c8:c0:83: 2e:45:dc:ad:b3:b1:76:e4:4c:dd:74:a5:f1:6e:d6:05: 49:85:83:7a:a4:1a:69:fa:d1:c6:61:16:fa:5f:44:1f: d4:7b:82:73:20:9c:72:70:f5:11:6f:da:02:bd:74:b6: bc:85:eb:27:dd:9f:ef:4b:7f:1c:bc:f6:f5:1c:ea:b1: 73:71:cf:d7:92:3f:7e:43:27:d5:f4:0d:14:31:93:a2: 3f:0e:da:36:0d:c5:f3:3b:58:83:eb:68:d1:f1:1a:92: 72:5d:42:c1:0b:f7:e1:15:5b:32:08:45:61:1c:45:88: 7d:02:a9:8b:40:40:dd:b8:d6:6d:49:bc:4a:9a:6f:60: ad:6f:d0:c5:8c:ac:a9:a2:2f:6e:e2:f7:60:de:65:f2: 13:92:b1:25:71:3b:45:02:93:7b:bd:5a:09:93:82:b2: 5b:f0:1b:e4:6e:43:64:57:96:b9:ca:2e:11:0a:30:5d: ed:d6:51:a6:04:58:3c:f3:8e:47:79:e0:6b:2a:c3:b4: f4:f3:87:9e:8e:ff:0b:5a:f4:2f:cc:a1:4e:6d:4f:3a: 5c:33:69:aa:7b:d4:c5:29:74:34:50:43:b5:62:d2:d4: 15:5a:e3:8d:e8:55:3c:20:6c:6c:e1:cb:d7:35:9e:70 Fingerprint (SHA-256): 5A:92:88:A4:63:3E:12:4E:6D:AC:9A:24:75:B3:48:2E:D8:5D:86:D1:D2:51:E3:4D:59:B5:5B:D3:7E:F6:77:21 Fingerprint (SHA1): D0:ED:27:F7:AA:9C:FF:7E:90:43:5D:FE:52:76:B8:72:E9:6B:60:4D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #10985: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #10986: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125751 (0x1e67e6b7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:59:03 2017 Not After : Tue May 10 12:59:03 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:0e:4c:ce:0b:5a:b7:25:ad:47:52:5f:4d:dc:8b:99: 58:67:a3:40:66:8e:76:d7:43:84:a9:bd:fc:93:f2:c9: d6:28:d3:fd:e8:90:8d:c0:23:db:86:fa:77:da:15:73: 49:0d:47:2a:8f:b6:62:f3:db:79:27:fd:07:90:32:04: 25:09:29:2c:e7:01:d1:0f:21:eb:07:aa:29:24:44:49: 08:60:63:4c:8b:29:d8:57:62:00:50:a7:0a:1a:1e:cd: 83:22:cf:af:95:57:47:cf:5f:89:25:f2:fd:cb:3e:70: 8a:b8:3b:91:08:68:e3:88:2d:e8:f6:22:a8:5c:4a:82: 01:b4:8d:83:b2:51:5a:e4:d3:cc:8a:c4:66:fd:4e:de: a2:7a:12:47:9e:7b:02:35:d7:7e:0d:8e:20:18:f6:84: 28:30:64:3a:7c:c7:c7:14:86:34:50:03:3f:54:a8:ea: f1:92:f3:b0:cb:a0:8b:c9:6f:2f:58:e2:47:9e:43:09: 9b:55:ce:7e:fb:fa:38:8d:0c:ab:0b:d9:8e:f7:91:5d: c3:24:32:6b:0a:cb:30:4d:77:9e:ad:f4:9b:b0:b9:86: 8c:ce:16:bd:3c:36:e2:c3:c9:7e:f8:60:26:a2:d4:84: 17:0f:83:f4:eb:84:28:c5:c2:de:66:3b:b3:56:d7:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:1f:ef:d3:07:00:31:6e:44:29:84:b2:b7:32:6c:a9: 92:79:b3:f1:13:c3:ca:7a:6a:7b:38:c0:61:51:75:7a: c3:79:07:1b:24:82:13:b2:4f:1c:ae:8b:71:3f:21:20: 12:ae:1e:06:82:05:b0:73:b7:aa:72:67:a1:ae:2d:5a: a5:7f:da:3b:d5:f3:c4:cc:f6:75:53:c1:9c:9a:0d:f9: d5:ad:e1:24:44:a1:a5:1f:a6:1b:28:6b:93:cf:1c:e8: c5:91:ff:fb:2b:50:1c:ed:66:63:0b:07:28:7c:5d:02: b7:e1:9a:e3:7a:7a:16:74:7d:9c:8f:93:3e:63:95:1c: 89:e8:37:a5:93:84:7f:5d:9a:4d:1f:38:60:fd:e5:ae: db:bf:c1:18:f4:cd:61:d6:59:b1:78:c9:e6:0d:b9:cf: ea:f3:aa:d8:b1:88:1f:f4:a9:6d:ae:cd:dd:6c:8d:ce: 12:0e:2c:5a:a5:52:37:0f:c0:06:fa:13:3e:01:37:ac: b0:03:b3:68:c5:05:cd:59:66:ba:ba:4b:d7:e5:b1:bd: 53:21:c0:83:cc:f8:2f:b9:33:62:b2:33:3b:6d:c5:fd: fe:87:b8:f0:fd:ff:8e:c1:a6:24:66:83:57:74:57:29: 0a:97:44:1d:b0:ac:ef:08:8b:90:d4:d4:97:39:8e:1b Fingerprint (SHA-256): BC:45:C5:94:AF:C0:BC:F6:B2:0B:81:7D:06:92:7A:C5:07:A5:91:22:F1:0B:A8:75:11:D6:1D:D0:9E:8C:7C:DE Fingerprint (SHA1): 23:A4:C3:CE:8F:D7:79:CC:0E:79:61:10:52:CD:22:D3:DB:EF:D6:FA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #10987: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #10988: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125752 (0x1e67e6b8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:59:06 2017 Not After : Tue May 10 12:59:06 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:f9:f2:cf:64:7b:0f:11:53:dd:af:d0:42:ec:c0:14: 9f:0b:3c:49:b1:34:bf:17:bd:c7:72:9d:f9:c5:ca:9e: 1f:1a:66:2b:19:d3:10:07:1d:e7:bb:b7:87:90:e3:01: 54:8f:ce:d8:2a:d7:43:e5:45:2f:e9:45:44:b7:8a:ed: 3a:52:5c:d1:4b:d7:55:2b:57:bd:83:ed:91:cd:81:01: be:66:9b:ae:f1:16:82:7f:2e:d0:7f:ac:95:45:52:f4: db:46:67:f5:c0:01:f9:db:96:2d:40:66:8b:4f:07:98: 4f:2e:2e:12:43:ad:91:bd:e8:fd:99:a2:1d:12:cd:48: d6:ee:5a:84:1c:45:6e:74:1d:bd:0c:9d:90:85:30:7a: 54:bd:52:43:0f:18:f4:19:ce:a7:c4:8e:25:b4:14:3e: cc:e8:32:d8:e1:66:83:07:b8:0e:3c:f0:f4:b9:bd:f8: a1:ad:27:36:18:c1:54:2c:3a:67:3c:77:bd:09:eb:1a: d4:f7:71:75:b7:25:f0:bf:b8:12:24:b8:2a:3b:dd:ed: c7:9f:79:76:58:2a:fc:2f:e3:da:ed:46:ea:f0:aa:e7: d9:88:cb:2e:ab:b7:92:88:6d:97:fd:10:07:53:5d:3b: fb:74:e0:34:ef:c2:69:31:a0:5c:f2:bf:de:e6:e6:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ae:e9:db:59:90:92:d8:3a:57:45:68:b5:10:58:39:ae: 8d:3f:ec:76:19:fa:d7:99:5d:7e:22:8e:4b:92:f0:81: 2c:c3:34:01:48:28:3e:0b:00:35:66:7c:6e:52:81:7b: 09:35:91:19:78:dc:e5:20:1a:40:5a:a7:bc:06:c0:e2: 87:c0:06:0d:85:91:88:2c:9e:e2:d3:c3:97:05:0e:24: 01:7a:64:25:a6:19:40:ed:ca:2a:8d:1e:6e:c7:2d:f4: 24:25:c9:82:5b:a8:9e:3c:fc:cd:67:86:45:a0:6f:74: bc:54:d4:b2:d1:ed:6c:77:70:bd:ed:6c:d0:1e:f7:d9: 0d:03:a8:06:5c:ba:2f:f0:c9:c1:69:76:1d:46:1b:dd: 1a:a4:da:cd:2a:b3:61:20:c4:3d:f6:fb:d1:0f:6f:44: e3:f0:24:98:31:a2:05:b6:c4:d8:13:0a:89:b8:c4:51: 1f:e0:51:e6:cf:c4:dc:44:80:9a:39:bb:d5:3e:ed:eb: 44:59:f5:bc:11:f3:cd:1a:f0:58:2f:0e:c3:47:60:cb: ab:20:da:10:3c:86:ff:bd:ea:e2:ee:a5:fb:ce:55:5c: 4d:6d:1c:c8:3c:3d:52:c9:e7:97:b1:80:c3:de:6b:ee: 26:d9:04:81:d9:bd:48:f5:6b:0d:7a:47:67:b9:4c:d2 Fingerprint (SHA-256): 43:14:CE:5C:BC:26:A4:53:1C:0E:15:82:E0:A3:92:4B:62:C1:64:0B:2F:A7:2A:9A:1E:66:B6:4F:C2:DB:29:86 Fingerprint (SHA1): 80:BB:63:B6:F4:A3:E2:1E:2D:14:8D:0A:B0:41:1D:AB:3E:1A:8E:44 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #10989: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #10990: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #10991: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125754 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #10992: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #10993: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #10994: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10995: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510125755 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #10996: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #10997: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #10998: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #10999: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510125756 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11000: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11001: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #11002: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11003: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 510125757 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11004: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11005: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #11006: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11007: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 510125758 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11008: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11009: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #11010: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125754 (0x1e67e6ba) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:59:14 2017 Not After : Tue May 10 12:59:14 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:cc:2b:52:7b:22:0f:a8:e1:92:8c:6d:f3:7a:10:e6: d3:23:df:2f:98:b2:be:05:2a:36:c8:88:c3:49:de:3d: cb:be:ef:a8:16:4d:0c:db:d0:fb:dd:ff:4d:bf:af:68: 99:1f:f9:cb:f7:81:3c:30:93:5b:b4:cc:ef:d8:89:c0: a6:a4:b0:c6:dd:e7:17:ca:98:0a:ac:44:2e:d5:e5:96: af:b7:2b:e6:51:6d:af:63:2e:fa:75:69:ae:ee:32:98: 9e:af:69:f6:02:d0:02:5c:b7:89:ce:d1:9a:1b:31:23: 5c:c5:fa:bd:1a:28:98:16:5e:63:bf:77:14:d0:05:8e: b7:7c:46:c5:c9:7c:39:47:bb:b2:b2:54:4c:7f:e7:08: 88:3b:7b:02:46:72:53:4d:71:a8:2b:36:a8:96:f3:d9: 0f:ae:15:6e:48:3d:2b:13:d7:22:d2:bc:a3:59:b4:89: d7:0c:b9:74:34:03:e8:88:93:25:62:86:3e:77:c8:86: 07:6c:66:5f:a6:7c:d9:d9:03:be:ed:0f:7d:8b:59:6e: de:f9:4b:7a:72:8e:b8:a9:d1:85:6c:3c:03:f2:80:aa: bf:51:16:93:2e:4e:dd:09:02:59:1a:42:8a:76:19:37: f2:de:d3:ee:28:40:43:5d:ea:51:ad:62:ee:da:35:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:82:ae:8e:62:d0:1b:5d:f5:30:64:93:d4:42:9c:f2: af:b1:41:8b:af:36:6f:ba:a7:1f:b7:c8:6e:74:7d:93: 7d:8e:2f:a2:fd:f8:74:56:05:ac:c3:2f:8f:d8:40:db: 6f:bf:43:3f:d4:f3:95:4e:db:06:ec:2f:0a:93:e0:58: 4f:ce:37:40:c0:33:e4:43:3d:37:74:4f:b6:58:c0:ec: 05:ea:a4:d0:22:79:c0:69:64:6d:4e:54:93:09:05:9a: 3d:97:44:3d:ca:e2:04:d7:f8:88:67:3e:db:65:ec:a6: 1c:19:c9:f0:63:e9:df:f0:7f:d0:07:fe:4c:6b:cf:cd: 09:5d:99:db:1b:98:2d:05:6a:18:d6:f5:2b:d4:0b:28: 67:a7:cd:22:35:c7:ed:81:66:2e:74:22:17:f4:8c:46: 0c:22:d7:0d:be:36:43:de:12:e2:7f:c1:3b:d7:31:2a: 63:ed:1e:08:9e:e8:26:b9:81:6f:31:1c:c0:4d:e0:f0: 4e:a0:53:9a:9b:2f:3c:9f:f8:2c:f2:93:53:c1:12:00: d0:aa:ce:6d:7c:08:48:81:c1:e1:1b:e1:6f:74:5c:7b: a6:d6:d7:c7:11:8c:15:a4:b6:06:f2:6f:5f:8b:2b:58: fc:a9:a8:ee:c8:9f:74:d6:a2:4a:92:0c:a4:39:5b:22 Fingerprint (SHA-256): 06:67:0C:41:0B:1D:4E:1E:66:8C:84:58:A5:4A:0A:28:04:53:48:63:65:DC:FA:34:09:FA:3B:F7:08:54:BE:A8 Fingerprint (SHA1): FD:1B:4C:D6:94:24:EA:3E:19:5E:8F:12:A1:78:76:52:E7:94:0F:D8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11011: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11012: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125755 (0x1e67e6bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:59:16 2017 Not After : Tue May 10 12:59:16 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:55:73:76:41:2a:c5:15:3a:13:ee:51:9b:dc:b6:11: 23:34:f6:9f:47:8a:10:ae:dc:ea:c6:43:19:a2:a5:7a: 2a:68:96:70:8c:05:5f:dc:44:b6:94:80:da:d9:40:c0: 36:2a:79:48:38:af:76:f1:58:34:d6:8f:b5:d3:df:e2: 5d:97:73:90:0b:d7:a5:99:c8:09:2b:4b:b9:7a:59:73: 8e:35:15:a2:ad:f5:cb:a9:76:52:f7:81:5a:81:d6:49: 08:8e:13:81:48:81:4a:50:16:a1:ab:ec:93:24:29:4c: b4:6d:92:b2:44:da:ff:bf:4e:35:24:22:55:77:11:fd: 97:b4:67:3e:16:49:28:98:ed:7e:41:6b:b8:27:91:fc: 44:9f:88:44:2f:5e:84:9f:d2:a5:7d:80:77:40:c8:1b: 4d:22:05:96:02:da:7d:49:26:74:23:0a:72:d7:9e:49: 15:19:c7:50:61:2b:55:a8:9a:0b:e6:ab:c2:96:52:7b: 6c:f2:38:6b:d2:7e:e1:8c:de:f3:4a:40:cc:43:df:cd: f6:fb:ad:15:e9:fa:ff:2e:02:2d:0e:1a:5a:bf:ab:a8: 7a:eb:0c:d3:21:48:75:aa:c9:c8:56:7a:5e:74:21:4d: fe:70:25:50:c4:dc:cd:b5:d4:90:b8:cf:32:f3:6f:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:cc:71:f1:89:33:b9:04:f5:e8:cc:6e:6f:49:26:f6: df:82:a0:e5:4e:66:12:57:bf:24:06:70:5d:e7:1e:90: 43:f4:f7:bf:ee:79:d7:eb:c4:e6:19:83:8f:f2:21:a0: e1:a5:69:32:a9:aa:e3:36:c6:76:c3:ce:03:89:15:14: 22:15:fb:9f:4f:14:56:ec:1c:e5:16:1b:93:04:e1:5e: ac:d6:77:4b:01:f5:58:2c:e7:17:c1:3a:0a:b8:fc:1f: c3:07:38:4f:35:86:98:d3:fb:4a:91:18:a1:d7:ab:89: 12:ac:88:02:83:ce:83:5f:5e:f1:f1:14:92:52:3c:24: a8:fd:5b:69:40:7d:8c:ab:dc:07:18:0e:da:b1:cc:32: 48:a9:e4:72:24:bb:bb:0e:f4:5a:a5:35:89:e4:d3:99: b9:b1:dc:84:44:24:6b:c0:a4:10:cb:79:12:80:c9:10: fb:08:fb:40:50:5a:6a:c5:77:74:a4:e8:32:55:f4:48: ef:40:7c:fc:59:aa:50:6c:04:65:3b:9c:20:e1:bb:d0: 46:01:66:25:15:29:19:b3:5c:e0:d6:b5:f5:47:67:7c: 06:88:64:96:57:ef:f1:db:8c:03:b6:77:7d:1d:f3:f1: c5:06:90:33:c5:55:62:a3:e2:2d:5b:a9:89:0a:bb:80 Fingerprint (SHA-256): 72:CB:69:EF:8E:F5:48:2B:8F:39:31:9D:E0:37:23:23:08:DF:EE:C1:03:30:11:38:78:77:A6:C2:A5:76:41:5D Fingerprint (SHA1): F6:44:42:56:89:B1:E0:B3:71:63:1E:A6:41:F1:CB:C4:D3:C3:D9:58 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #11013: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11014: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125756 (0x1e67e6bc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:59:17 2017 Not After : Tue May 10 12:59:17 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:a6:fa:0d:af:d3:a4:27:71:e3:42:fa:23:e2:1b:24: 08:ff:be:6a:30:a3:89:15:98:95:8f:16:35:ce:92:e3: e1:b9:36:26:4a:18:8e:c2:d5:f0:ec:c0:9f:f3:8d:65: d0:9a:cb:89:9d:15:0d:7c:f7:2d:38:f7:6d:0d:76:19: fa:47:24:c3:0e:dd:8d:c1:6b:3c:7b:ef:f3:64:4a:78: 3c:30:d8:be:4e:e9:e6:25:72:f7:38:b6:d8:d8:56:0d: 42:e3:08:d3:ab:65:63:0b:d0:6e:ab:bd:39:7c:6e:31: 23:ca:f5:48:06:dc:6b:31:9f:97:1b:f7:c8:3b:77:d9: ea:18:f5:d5:82:8a:c9:28:17:a7:1b:a9:0c:b7:e0:65: 3e:fc:39:d9:f6:81:db:85:a8:8b:67:32:ff:17:52:21: 74:69:cd:3c:3c:45:c8:06:5b:88:b6:5d:9c:04:b9:f1: e2:e9:89:66:76:3d:0a:99:14:f7:21:a6:63:c5:b8:c9: 34:35:81:80:7d:b6:9e:62:82:d6:6d:33:bf:de:0c:ae: ca:2a:f8:89:59:2b:66:cd:41:e8:46:40:3f:71:26:96: 59:c0:37:9a:52:0e:37:12:42:35:62:d0:6d:8d:30:d2: 1e:7c:76:19:5d:b4:b4:11:25:57:4a:cc:88:3e:1e:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:ca:2e:59:2c:4d:ab:2e:19:4e:a9:5b:1e:3b:1f:70: 96:5f:99:7d:7e:bf:4c:44:3a:a8:ea:9b:e5:cb:36:85: 83:d9:07:3f:85:1d:d3:dc:5f:74:85:00:60:6c:68:7e: e1:89:59:dc:ea:20:b0:11:d4:7d:82:5a:2a:b6:b3:e6: e4:a7:53:12:a7:07:e7:e4:a2:b6:53:5d:30:8c:5b:3b: 9c:a3:2a:fa:97:08:a4:40:14:ef:f0:6a:24:82:27:0c: b9:9f:94:50:ab:f6:e4:49:44:7c:92:1a:f9:fd:c9:38: 29:d4:81:ad:9c:01:a1:20:a9:28:33:66:26:ba:dd:99: 00:3e:34:85:73:7f:e7:73:22:a6:11:15:4b:7c:c5:26: 62:e8:d7:64:34:99:92:c3:75:95:86:a1:fe:17:67:29: fa:26:fe:d4:6e:1a:ca:25:81:c3:73:f5:76:98:6a:24: 03:b4:29:81:02:8f:ab:3c:68:a2:d9:c4:24:a1:74:d3: a9:75:fc:16:7f:29:6e:1a:b5:34:3e:ef:ce:05:20:a7: 64:2c:01:d7:49:86:98:00:5e:ee:18:4b:9f:8e:54:90: 37:65:96:59:dc:be:fa:42:54:4a:39:53:0c:3c:f0:49: bc:cb:ed:5e:ba:9d:6a:e0:65:34:77:d2:16:5d:3a:98 Fingerprint (SHA-256): 75:C5:75:3F:84:2F:60:65:36:9B:B3:E8:95:6A:DF:54:54:B5:FC:B0:59:5F:A2:0C:3A:C1:62:B0:7E:12:68:34 Fingerprint (SHA1): 84:DF:30:DB:61:C4:9D:E2:4B:DF:D9:03:A3:05:6C:DF:AE:36:9F:A8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #11015: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11016: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #11017: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #11018: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #11019: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125754 (0x1e67e6ba) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:59:14 2017 Not After : Tue May 10 12:59:14 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:cc:2b:52:7b:22:0f:a8:e1:92:8c:6d:f3:7a:10:e6: d3:23:df:2f:98:b2:be:05:2a:36:c8:88:c3:49:de:3d: cb:be:ef:a8:16:4d:0c:db:d0:fb:dd:ff:4d:bf:af:68: 99:1f:f9:cb:f7:81:3c:30:93:5b:b4:cc:ef:d8:89:c0: a6:a4:b0:c6:dd:e7:17:ca:98:0a:ac:44:2e:d5:e5:96: af:b7:2b:e6:51:6d:af:63:2e:fa:75:69:ae:ee:32:98: 9e:af:69:f6:02:d0:02:5c:b7:89:ce:d1:9a:1b:31:23: 5c:c5:fa:bd:1a:28:98:16:5e:63:bf:77:14:d0:05:8e: b7:7c:46:c5:c9:7c:39:47:bb:b2:b2:54:4c:7f:e7:08: 88:3b:7b:02:46:72:53:4d:71:a8:2b:36:a8:96:f3:d9: 0f:ae:15:6e:48:3d:2b:13:d7:22:d2:bc:a3:59:b4:89: d7:0c:b9:74:34:03:e8:88:93:25:62:86:3e:77:c8:86: 07:6c:66:5f:a6:7c:d9:d9:03:be:ed:0f:7d:8b:59:6e: de:f9:4b:7a:72:8e:b8:a9:d1:85:6c:3c:03:f2:80:aa: bf:51:16:93:2e:4e:dd:09:02:59:1a:42:8a:76:19:37: f2:de:d3:ee:28:40:43:5d:ea:51:ad:62:ee:da:35:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:82:ae:8e:62:d0:1b:5d:f5:30:64:93:d4:42:9c:f2: af:b1:41:8b:af:36:6f:ba:a7:1f:b7:c8:6e:74:7d:93: 7d:8e:2f:a2:fd:f8:74:56:05:ac:c3:2f:8f:d8:40:db: 6f:bf:43:3f:d4:f3:95:4e:db:06:ec:2f:0a:93:e0:58: 4f:ce:37:40:c0:33:e4:43:3d:37:74:4f:b6:58:c0:ec: 05:ea:a4:d0:22:79:c0:69:64:6d:4e:54:93:09:05:9a: 3d:97:44:3d:ca:e2:04:d7:f8:88:67:3e:db:65:ec:a6: 1c:19:c9:f0:63:e9:df:f0:7f:d0:07:fe:4c:6b:cf:cd: 09:5d:99:db:1b:98:2d:05:6a:18:d6:f5:2b:d4:0b:28: 67:a7:cd:22:35:c7:ed:81:66:2e:74:22:17:f4:8c:46: 0c:22:d7:0d:be:36:43:de:12:e2:7f:c1:3b:d7:31:2a: 63:ed:1e:08:9e:e8:26:b9:81:6f:31:1c:c0:4d:e0:f0: 4e:a0:53:9a:9b:2f:3c:9f:f8:2c:f2:93:53:c1:12:00: d0:aa:ce:6d:7c:08:48:81:c1:e1:1b:e1:6f:74:5c:7b: a6:d6:d7:c7:11:8c:15:a4:b6:06:f2:6f:5f:8b:2b:58: fc:a9:a8:ee:c8:9f:74:d6:a2:4a:92:0c:a4:39:5b:22 Fingerprint (SHA-256): 06:67:0C:41:0B:1D:4E:1E:66:8C:84:58:A5:4A:0A:28:04:53:48:63:65:DC:FA:34:09:FA:3B:F7:08:54:BE:A8 Fingerprint (SHA1): FD:1B:4C:D6:94:24:EA:3E:19:5E:8F:12:A1:78:76:52:E7:94:0F:D8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11020: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11021: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125755 (0x1e67e6bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:59:16 2017 Not After : Tue May 10 12:59:16 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:55:73:76:41:2a:c5:15:3a:13:ee:51:9b:dc:b6:11: 23:34:f6:9f:47:8a:10:ae:dc:ea:c6:43:19:a2:a5:7a: 2a:68:96:70:8c:05:5f:dc:44:b6:94:80:da:d9:40:c0: 36:2a:79:48:38:af:76:f1:58:34:d6:8f:b5:d3:df:e2: 5d:97:73:90:0b:d7:a5:99:c8:09:2b:4b:b9:7a:59:73: 8e:35:15:a2:ad:f5:cb:a9:76:52:f7:81:5a:81:d6:49: 08:8e:13:81:48:81:4a:50:16:a1:ab:ec:93:24:29:4c: b4:6d:92:b2:44:da:ff:bf:4e:35:24:22:55:77:11:fd: 97:b4:67:3e:16:49:28:98:ed:7e:41:6b:b8:27:91:fc: 44:9f:88:44:2f:5e:84:9f:d2:a5:7d:80:77:40:c8:1b: 4d:22:05:96:02:da:7d:49:26:74:23:0a:72:d7:9e:49: 15:19:c7:50:61:2b:55:a8:9a:0b:e6:ab:c2:96:52:7b: 6c:f2:38:6b:d2:7e:e1:8c:de:f3:4a:40:cc:43:df:cd: f6:fb:ad:15:e9:fa:ff:2e:02:2d:0e:1a:5a:bf:ab:a8: 7a:eb:0c:d3:21:48:75:aa:c9:c8:56:7a:5e:74:21:4d: fe:70:25:50:c4:dc:cd:b5:d4:90:b8:cf:32:f3:6f:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:cc:71:f1:89:33:b9:04:f5:e8:cc:6e:6f:49:26:f6: df:82:a0:e5:4e:66:12:57:bf:24:06:70:5d:e7:1e:90: 43:f4:f7:bf:ee:79:d7:eb:c4:e6:19:83:8f:f2:21:a0: e1:a5:69:32:a9:aa:e3:36:c6:76:c3:ce:03:89:15:14: 22:15:fb:9f:4f:14:56:ec:1c:e5:16:1b:93:04:e1:5e: ac:d6:77:4b:01:f5:58:2c:e7:17:c1:3a:0a:b8:fc:1f: c3:07:38:4f:35:86:98:d3:fb:4a:91:18:a1:d7:ab:89: 12:ac:88:02:83:ce:83:5f:5e:f1:f1:14:92:52:3c:24: a8:fd:5b:69:40:7d:8c:ab:dc:07:18:0e:da:b1:cc:32: 48:a9:e4:72:24:bb:bb:0e:f4:5a:a5:35:89:e4:d3:99: b9:b1:dc:84:44:24:6b:c0:a4:10:cb:79:12:80:c9:10: fb:08:fb:40:50:5a:6a:c5:77:74:a4:e8:32:55:f4:48: ef:40:7c:fc:59:aa:50:6c:04:65:3b:9c:20:e1:bb:d0: 46:01:66:25:15:29:19:b3:5c:e0:d6:b5:f5:47:67:7c: 06:88:64:96:57:ef:f1:db:8c:03:b6:77:7d:1d:f3:f1: c5:06:90:33:c5:55:62:a3:e2:2d:5b:a9:89:0a:bb:80 Fingerprint (SHA-256): 72:CB:69:EF:8E:F5:48:2B:8F:39:31:9D:E0:37:23:23:08:DF:EE:C1:03:30:11:38:78:77:A6:C2:A5:76:41:5D Fingerprint (SHA1): F6:44:42:56:89:B1:E0:B3:71:63:1E:A6:41:F1:CB:C4:D3:C3:D9:58 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #11022: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11023: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125756 (0x1e67e6bc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:59:17 2017 Not After : Tue May 10 12:59:17 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:a6:fa:0d:af:d3:a4:27:71:e3:42:fa:23:e2:1b:24: 08:ff:be:6a:30:a3:89:15:98:95:8f:16:35:ce:92:e3: e1:b9:36:26:4a:18:8e:c2:d5:f0:ec:c0:9f:f3:8d:65: d0:9a:cb:89:9d:15:0d:7c:f7:2d:38:f7:6d:0d:76:19: fa:47:24:c3:0e:dd:8d:c1:6b:3c:7b:ef:f3:64:4a:78: 3c:30:d8:be:4e:e9:e6:25:72:f7:38:b6:d8:d8:56:0d: 42:e3:08:d3:ab:65:63:0b:d0:6e:ab:bd:39:7c:6e:31: 23:ca:f5:48:06:dc:6b:31:9f:97:1b:f7:c8:3b:77:d9: ea:18:f5:d5:82:8a:c9:28:17:a7:1b:a9:0c:b7:e0:65: 3e:fc:39:d9:f6:81:db:85:a8:8b:67:32:ff:17:52:21: 74:69:cd:3c:3c:45:c8:06:5b:88:b6:5d:9c:04:b9:f1: e2:e9:89:66:76:3d:0a:99:14:f7:21:a6:63:c5:b8:c9: 34:35:81:80:7d:b6:9e:62:82:d6:6d:33:bf:de:0c:ae: ca:2a:f8:89:59:2b:66:cd:41:e8:46:40:3f:71:26:96: 59:c0:37:9a:52:0e:37:12:42:35:62:d0:6d:8d:30:d2: 1e:7c:76:19:5d:b4:b4:11:25:57:4a:cc:88:3e:1e:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:ca:2e:59:2c:4d:ab:2e:19:4e:a9:5b:1e:3b:1f:70: 96:5f:99:7d:7e:bf:4c:44:3a:a8:ea:9b:e5:cb:36:85: 83:d9:07:3f:85:1d:d3:dc:5f:74:85:00:60:6c:68:7e: e1:89:59:dc:ea:20:b0:11:d4:7d:82:5a:2a:b6:b3:e6: e4:a7:53:12:a7:07:e7:e4:a2:b6:53:5d:30:8c:5b:3b: 9c:a3:2a:fa:97:08:a4:40:14:ef:f0:6a:24:82:27:0c: b9:9f:94:50:ab:f6:e4:49:44:7c:92:1a:f9:fd:c9:38: 29:d4:81:ad:9c:01:a1:20:a9:28:33:66:26:ba:dd:99: 00:3e:34:85:73:7f:e7:73:22:a6:11:15:4b:7c:c5:26: 62:e8:d7:64:34:99:92:c3:75:95:86:a1:fe:17:67:29: fa:26:fe:d4:6e:1a:ca:25:81:c3:73:f5:76:98:6a:24: 03:b4:29:81:02:8f:ab:3c:68:a2:d9:c4:24:a1:74:d3: a9:75:fc:16:7f:29:6e:1a:b5:34:3e:ef:ce:05:20:a7: 64:2c:01:d7:49:86:98:00:5e:ee:18:4b:9f:8e:54:90: 37:65:96:59:dc:be:fa:42:54:4a:39:53:0c:3c:f0:49: bc:cb:ed:5e:ba:9d:6a:e0:65:34:77:d2:16:5d:3a:98 Fingerprint (SHA-256): 75:C5:75:3F:84:2F:60:65:36:9B:B3:E8:95:6A:DF:54:54:B5:FC:B0:59:5F:A2:0C:3A:C1:62:B0:7E:12:68:34 Fingerprint (SHA1): 84:DF:30:DB:61:C4:9D:E2:4B:DF:D9:03:A3:05:6C:DF:AE:36:9F:A8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #11024: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11025: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125754 (0x1e67e6ba) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:59:14 2017 Not After : Tue May 10 12:59:14 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:cc:2b:52:7b:22:0f:a8:e1:92:8c:6d:f3:7a:10:e6: d3:23:df:2f:98:b2:be:05:2a:36:c8:88:c3:49:de:3d: cb:be:ef:a8:16:4d:0c:db:d0:fb:dd:ff:4d:bf:af:68: 99:1f:f9:cb:f7:81:3c:30:93:5b:b4:cc:ef:d8:89:c0: a6:a4:b0:c6:dd:e7:17:ca:98:0a:ac:44:2e:d5:e5:96: af:b7:2b:e6:51:6d:af:63:2e:fa:75:69:ae:ee:32:98: 9e:af:69:f6:02:d0:02:5c:b7:89:ce:d1:9a:1b:31:23: 5c:c5:fa:bd:1a:28:98:16:5e:63:bf:77:14:d0:05:8e: b7:7c:46:c5:c9:7c:39:47:bb:b2:b2:54:4c:7f:e7:08: 88:3b:7b:02:46:72:53:4d:71:a8:2b:36:a8:96:f3:d9: 0f:ae:15:6e:48:3d:2b:13:d7:22:d2:bc:a3:59:b4:89: d7:0c:b9:74:34:03:e8:88:93:25:62:86:3e:77:c8:86: 07:6c:66:5f:a6:7c:d9:d9:03:be:ed:0f:7d:8b:59:6e: de:f9:4b:7a:72:8e:b8:a9:d1:85:6c:3c:03:f2:80:aa: bf:51:16:93:2e:4e:dd:09:02:59:1a:42:8a:76:19:37: f2:de:d3:ee:28:40:43:5d:ea:51:ad:62:ee:da:35:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:82:ae:8e:62:d0:1b:5d:f5:30:64:93:d4:42:9c:f2: af:b1:41:8b:af:36:6f:ba:a7:1f:b7:c8:6e:74:7d:93: 7d:8e:2f:a2:fd:f8:74:56:05:ac:c3:2f:8f:d8:40:db: 6f:bf:43:3f:d4:f3:95:4e:db:06:ec:2f:0a:93:e0:58: 4f:ce:37:40:c0:33:e4:43:3d:37:74:4f:b6:58:c0:ec: 05:ea:a4:d0:22:79:c0:69:64:6d:4e:54:93:09:05:9a: 3d:97:44:3d:ca:e2:04:d7:f8:88:67:3e:db:65:ec:a6: 1c:19:c9:f0:63:e9:df:f0:7f:d0:07:fe:4c:6b:cf:cd: 09:5d:99:db:1b:98:2d:05:6a:18:d6:f5:2b:d4:0b:28: 67:a7:cd:22:35:c7:ed:81:66:2e:74:22:17:f4:8c:46: 0c:22:d7:0d:be:36:43:de:12:e2:7f:c1:3b:d7:31:2a: 63:ed:1e:08:9e:e8:26:b9:81:6f:31:1c:c0:4d:e0:f0: 4e:a0:53:9a:9b:2f:3c:9f:f8:2c:f2:93:53:c1:12:00: d0:aa:ce:6d:7c:08:48:81:c1:e1:1b:e1:6f:74:5c:7b: a6:d6:d7:c7:11:8c:15:a4:b6:06:f2:6f:5f:8b:2b:58: fc:a9:a8:ee:c8:9f:74:d6:a2:4a:92:0c:a4:39:5b:22 Fingerprint (SHA-256): 06:67:0C:41:0B:1D:4E:1E:66:8C:84:58:A5:4A:0A:28:04:53:48:63:65:DC:FA:34:09:FA:3B:F7:08:54:BE:A8 Fingerprint (SHA1): FD:1B:4C:D6:94:24:EA:3E:19:5E:8F:12:A1:78:76:52:E7:94:0F:D8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11026: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125754 (0x1e67e6ba) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:59:14 2017 Not After : Tue May 10 12:59:14 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:cc:2b:52:7b:22:0f:a8:e1:92:8c:6d:f3:7a:10:e6: d3:23:df:2f:98:b2:be:05:2a:36:c8:88:c3:49:de:3d: cb:be:ef:a8:16:4d:0c:db:d0:fb:dd:ff:4d:bf:af:68: 99:1f:f9:cb:f7:81:3c:30:93:5b:b4:cc:ef:d8:89:c0: a6:a4:b0:c6:dd:e7:17:ca:98:0a:ac:44:2e:d5:e5:96: af:b7:2b:e6:51:6d:af:63:2e:fa:75:69:ae:ee:32:98: 9e:af:69:f6:02:d0:02:5c:b7:89:ce:d1:9a:1b:31:23: 5c:c5:fa:bd:1a:28:98:16:5e:63:bf:77:14:d0:05:8e: b7:7c:46:c5:c9:7c:39:47:bb:b2:b2:54:4c:7f:e7:08: 88:3b:7b:02:46:72:53:4d:71:a8:2b:36:a8:96:f3:d9: 0f:ae:15:6e:48:3d:2b:13:d7:22:d2:bc:a3:59:b4:89: d7:0c:b9:74:34:03:e8:88:93:25:62:86:3e:77:c8:86: 07:6c:66:5f:a6:7c:d9:d9:03:be:ed:0f:7d:8b:59:6e: de:f9:4b:7a:72:8e:b8:a9:d1:85:6c:3c:03:f2:80:aa: bf:51:16:93:2e:4e:dd:09:02:59:1a:42:8a:76:19:37: f2:de:d3:ee:28:40:43:5d:ea:51:ad:62:ee:da:35:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:82:ae:8e:62:d0:1b:5d:f5:30:64:93:d4:42:9c:f2: af:b1:41:8b:af:36:6f:ba:a7:1f:b7:c8:6e:74:7d:93: 7d:8e:2f:a2:fd:f8:74:56:05:ac:c3:2f:8f:d8:40:db: 6f:bf:43:3f:d4:f3:95:4e:db:06:ec:2f:0a:93:e0:58: 4f:ce:37:40:c0:33:e4:43:3d:37:74:4f:b6:58:c0:ec: 05:ea:a4:d0:22:79:c0:69:64:6d:4e:54:93:09:05:9a: 3d:97:44:3d:ca:e2:04:d7:f8:88:67:3e:db:65:ec:a6: 1c:19:c9:f0:63:e9:df:f0:7f:d0:07:fe:4c:6b:cf:cd: 09:5d:99:db:1b:98:2d:05:6a:18:d6:f5:2b:d4:0b:28: 67:a7:cd:22:35:c7:ed:81:66:2e:74:22:17:f4:8c:46: 0c:22:d7:0d:be:36:43:de:12:e2:7f:c1:3b:d7:31:2a: 63:ed:1e:08:9e:e8:26:b9:81:6f:31:1c:c0:4d:e0:f0: 4e:a0:53:9a:9b:2f:3c:9f:f8:2c:f2:93:53:c1:12:00: d0:aa:ce:6d:7c:08:48:81:c1:e1:1b:e1:6f:74:5c:7b: a6:d6:d7:c7:11:8c:15:a4:b6:06:f2:6f:5f:8b:2b:58: fc:a9:a8:ee:c8:9f:74:d6:a2:4a:92:0c:a4:39:5b:22 Fingerprint (SHA-256): 06:67:0C:41:0B:1D:4E:1E:66:8C:84:58:A5:4A:0A:28:04:53:48:63:65:DC:FA:34:09:FA:3B:F7:08:54:BE:A8 Fingerprint (SHA1): FD:1B:4C:D6:94:24:EA:3E:19:5E:8F:12:A1:78:76:52:E7:94:0F:D8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11027: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125755 (0x1e67e6bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:59:16 2017 Not After : Tue May 10 12:59:16 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:55:73:76:41:2a:c5:15:3a:13:ee:51:9b:dc:b6:11: 23:34:f6:9f:47:8a:10:ae:dc:ea:c6:43:19:a2:a5:7a: 2a:68:96:70:8c:05:5f:dc:44:b6:94:80:da:d9:40:c0: 36:2a:79:48:38:af:76:f1:58:34:d6:8f:b5:d3:df:e2: 5d:97:73:90:0b:d7:a5:99:c8:09:2b:4b:b9:7a:59:73: 8e:35:15:a2:ad:f5:cb:a9:76:52:f7:81:5a:81:d6:49: 08:8e:13:81:48:81:4a:50:16:a1:ab:ec:93:24:29:4c: b4:6d:92:b2:44:da:ff:bf:4e:35:24:22:55:77:11:fd: 97:b4:67:3e:16:49:28:98:ed:7e:41:6b:b8:27:91:fc: 44:9f:88:44:2f:5e:84:9f:d2:a5:7d:80:77:40:c8:1b: 4d:22:05:96:02:da:7d:49:26:74:23:0a:72:d7:9e:49: 15:19:c7:50:61:2b:55:a8:9a:0b:e6:ab:c2:96:52:7b: 6c:f2:38:6b:d2:7e:e1:8c:de:f3:4a:40:cc:43:df:cd: f6:fb:ad:15:e9:fa:ff:2e:02:2d:0e:1a:5a:bf:ab:a8: 7a:eb:0c:d3:21:48:75:aa:c9:c8:56:7a:5e:74:21:4d: fe:70:25:50:c4:dc:cd:b5:d4:90:b8:cf:32:f3:6f:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:cc:71:f1:89:33:b9:04:f5:e8:cc:6e:6f:49:26:f6: df:82:a0:e5:4e:66:12:57:bf:24:06:70:5d:e7:1e:90: 43:f4:f7:bf:ee:79:d7:eb:c4:e6:19:83:8f:f2:21:a0: e1:a5:69:32:a9:aa:e3:36:c6:76:c3:ce:03:89:15:14: 22:15:fb:9f:4f:14:56:ec:1c:e5:16:1b:93:04:e1:5e: ac:d6:77:4b:01:f5:58:2c:e7:17:c1:3a:0a:b8:fc:1f: c3:07:38:4f:35:86:98:d3:fb:4a:91:18:a1:d7:ab:89: 12:ac:88:02:83:ce:83:5f:5e:f1:f1:14:92:52:3c:24: a8:fd:5b:69:40:7d:8c:ab:dc:07:18:0e:da:b1:cc:32: 48:a9:e4:72:24:bb:bb:0e:f4:5a:a5:35:89:e4:d3:99: b9:b1:dc:84:44:24:6b:c0:a4:10:cb:79:12:80:c9:10: fb:08:fb:40:50:5a:6a:c5:77:74:a4:e8:32:55:f4:48: ef:40:7c:fc:59:aa:50:6c:04:65:3b:9c:20:e1:bb:d0: 46:01:66:25:15:29:19:b3:5c:e0:d6:b5:f5:47:67:7c: 06:88:64:96:57:ef:f1:db:8c:03:b6:77:7d:1d:f3:f1: c5:06:90:33:c5:55:62:a3:e2:2d:5b:a9:89:0a:bb:80 Fingerprint (SHA-256): 72:CB:69:EF:8E:F5:48:2B:8F:39:31:9D:E0:37:23:23:08:DF:EE:C1:03:30:11:38:78:77:A6:C2:A5:76:41:5D Fingerprint (SHA1): F6:44:42:56:89:B1:E0:B3:71:63:1E:A6:41:F1:CB:C4:D3:C3:D9:58 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #11028: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125755 (0x1e67e6bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 12:59:16 2017 Not After : Tue May 10 12:59:16 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:55:73:76:41:2a:c5:15:3a:13:ee:51:9b:dc:b6:11: 23:34:f6:9f:47:8a:10:ae:dc:ea:c6:43:19:a2:a5:7a: 2a:68:96:70:8c:05:5f:dc:44:b6:94:80:da:d9:40:c0: 36:2a:79:48:38:af:76:f1:58:34:d6:8f:b5:d3:df:e2: 5d:97:73:90:0b:d7:a5:99:c8:09:2b:4b:b9:7a:59:73: 8e:35:15:a2:ad:f5:cb:a9:76:52:f7:81:5a:81:d6:49: 08:8e:13:81:48:81:4a:50:16:a1:ab:ec:93:24:29:4c: b4:6d:92:b2:44:da:ff:bf:4e:35:24:22:55:77:11:fd: 97:b4:67:3e:16:49:28:98:ed:7e:41:6b:b8:27:91:fc: 44:9f:88:44:2f:5e:84:9f:d2:a5:7d:80:77:40:c8:1b: 4d:22:05:96:02:da:7d:49:26:74:23:0a:72:d7:9e:49: 15:19:c7:50:61:2b:55:a8:9a:0b:e6:ab:c2:96:52:7b: 6c:f2:38:6b:d2:7e:e1:8c:de:f3:4a:40:cc:43:df:cd: f6:fb:ad:15:e9:fa:ff:2e:02:2d:0e:1a:5a:bf:ab:a8: 7a:eb:0c:d3:21:48:75:aa:c9:c8:56:7a:5e:74:21:4d: fe:70:25:50:c4:dc:cd:b5:d4:90:b8:cf:32:f3:6f:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:cc:71:f1:89:33:b9:04:f5:e8:cc:6e:6f:49:26:f6: df:82:a0:e5:4e:66:12:57:bf:24:06:70:5d:e7:1e:90: 43:f4:f7:bf:ee:79:d7:eb:c4:e6:19:83:8f:f2:21:a0: e1:a5:69:32:a9:aa:e3:36:c6:76:c3:ce:03:89:15:14: 22:15:fb:9f:4f:14:56:ec:1c:e5:16:1b:93:04:e1:5e: ac:d6:77:4b:01:f5:58:2c:e7:17:c1:3a:0a:b8:fc:1f: c3:07:38:4f:35:86:98:d3:fb:4a:91:18:a1:d7:ab:89: 12:ac:88:02:83:ce:83:5f:5e:f1:f1:14:92:52:3c:24: a8:fd:5b:69:40:7d:8c:ab:dc:07:18:0e:da:b1:cc:32: 48:a9:e4:72:24:bb:bb:0e:f4:5a:a5:35:89:e4:d3:99: b9:b1:dc:84:44:24:6b:c0:a4:10:cb:79:12:80:c9:10: fb:08:fb:40:50:5a:6a:c5:77:74:a4:e8:32:55:f4:48: ef:40:7c:fc:59:aa:50:6c:04:65:3b:9c:20:e1:bb:d0: 46:01:66:25:15:29:19:b3:5c:e0:d6:b5:f5:47:67:7c: 06:88:64:96:57:ef:f1:db:8c:03:b6:77:7d:1d:f3:f1: c5:06:90:33:c5:55:62:a3:e2:2d:5b:a9:89:0a:bb:80 Fingerprint (SHA-256): 72:CB:69:EF:8E:F5:48:2B:8F:39:31:9D:E0:37:23:23:08:DF:EE:C1:03:30:11:38:78:77:A6:C2:A5:76:41:5D Fingerprint (SHA1): F6:44:42:56:89:B1:E0:B3:71:63:1E:A6:41:F1:CB:C4:D3:C3:D9:58 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #11029: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125756 (0x1e67e6bc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:59:17 2017 Not After : Tue May 10 12:59:17 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:a6:fa:0d:af:d3:a4:27:71:e3:42:fa:23:e2:1b:24: 08:ff:be:6a:30:a3:89:15:98:95:8f:16:35:ce:92:e3: e1:b9:36:26:4a:18:8e:c2:d5:f0:ec:c0:9f:f3:8d:65: d0:9a:cb:89:9d:15:0d:7c:f7:2d:38:f7:6d:0d:76:19: fa:47:24:c3:0e:dd:8d:c1:6b:3c:7b:ef:f3:64:4a:78: 3c:30:d8:be:4e:e9:e6:25:72:f7:38:b6:d8:d8:56:0d: 42:e3:08:d3:ab:65:63:0b:d0:6e:ab:bd:39:7c:6e:31: 23:ca:f5:48:06:dc:6b:31:9f:97:1b:f7:c8:3b:77:d9: ea:18:f5:d5:82:8a:c9:28:17:a7:1b:a9:0c:b7:e0:65: 3e:fc:39:d9:f6:81:db:85:a8:8b:67:32:ff:17:52:21: 74:69:cd:3c:3c:45:c8:06:5b:88:b6:5d:9c:04:b9:f1: e2:e9:89:66:76:3d:0a:99:14:f7:21:a6:63:c5:b8:c9: 34:35:81:80:7d:b6:9e:62:82:d6:6d:33:bf:de:0c:ae: ca:2a:f8:89:59:2b:66:cd:41:e8:46:40:3f:71:26:96: 59:c0:37:9a:52:0e:37:12:42:35:62:d0:6d:8d:30:d2: 1e:7c:76:19:5d:b4:b4:11:25:57:4a:cc:88:3e:1e:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:ca:2e:59:2c:4d:ab:2e:19:4e:a9:5b:1e:3b:1f:70: 96:5f:99:7d:7e:bf:4c:44:3a:a8:ea:9b:e5:cb:36:85: 83:d9:07:3f:85:1d:d3:dc:5f:74:85:00:60:6c:68:7e: e1:89:59:dc:ea:20:b0:11:d4:7d:82:5a:2a:b6:b3:e6: e4:a7:53:12:a7:07:e7:e4:a2:b6:53:5d:30:8c:5b:3b: 9c:a3:2a:fa:97:08:a4:40:14:ef:f0:6a:24:82:27:0c: b9:9f:94:50:ab:f6:e4:49:44:7c:92:1a:f9:fd:c9:38: 29:d4:81:ad:9c:01:a1:20:a9:28:33:66:26:ba:dd:99: 00:3e:34:85:73:7f:e7:73:22:a6:11:15:4b:7c:c5:26: 62:e8:d7:64:34:99:92:c3:75:95:86:a1:fe:17:67:29: fa:26:fe:d4:6e:1a:ca:25:81:c3:73:f5:76:98:6a:24: 03:b4:29:81:02:8f:ab:3c:68:a2:d9:c4:24:a1:74:d3: a9:75:fc:16:7f:29:6e:1a:b5:34:3e:ef:ce:05:20:a7: 64:2c:01:d7:49:86:98:00:5e:ee:18:4b:9f:8e:54:90: 37:65:96:59:dc:be:fa:42:54:4a:39:53:0c:3c:f0:49: bc:cb:ed:5e:ba:9d:6a:e0:65:34:77:d2:16:5d:3a:98 Fingerprint (SHA-256): 75:C5:75:3F:84:2F:60:65:36:9B:B3:E8:95:6A:DF:54:54:B5:FC:B0:59:5F:A2:0C:3A:C1:62:B0:7E:12:68:34 Fingerprint (SHA1): 84:DF:30:DB:61:C4:9D:E2:4B:DF:D9:03:A3:05:6C:DF:AE:36:9F:A8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #11030: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125756 (0x1e67e6bc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 12:59:17 2017 Not After : Tue May 10 12:59:17 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:a6:fa:0d:af:d3:a4:27:71:e3:42:fa:23:e2:1b:24: 08:ff:be:6a:30:a3:89:15:98:95:8f:16:35:ce:92:e3: e1:b9:36:26:4a:18:8e:c2:d5:f0:ec:c0:9f:f3:8d:65: d0:9a:cb:89:9d:15:0d:7c:f7:2d:38:f7:6d:0d:76:19: fa:47:24:c3:0e:dd:8d:c1:6b:3c:7b:ef:f3:64:4a:78: 3c:30:d8:be:4e:e9:e6:25:72:f7:38:b6:d8:d8:56:0d: 42:e3:08:d3:ab:65:63:0b:d0:6e:ab:bd:39:7c:6e:31: 23:ca:f5:48:06:dc:6b:31:9f:97:1b:f7:c8:3b:77:d9: ea:18:f5:d5:82:8a:c9:28:17:a7:1b:a9:0c:b7:e0:65: 3e:fc:39:d9:f6:81:db:85:a8:8b:67:32:ff:17:52:21: 74:69:cd:3c:3c:45:c8:06:5b:88:b6:5d:9c:04:b9:f1: e2:e9:89:66:76:3d:0a:99:14:f7:21:a6:63:c5:b8:c9: 34:35:81:80:7d:b6:9e:62:82:d6:6d:33:bf:de:0c:ae: ca:2a:f8:89:59:2b:66:cd:41:e8:46:40:3f:71:26:96: 59:c0:37:9a:52:0e:37:12:42:35:62:d0:6d:8d:30:d2: 1e:7c:76:19:5d:b4:b4:11:25:57:4a:cc:88:3e:1e:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:ca:2e:59:2c:4d:ab:2e:19:4e:a9:5b:1e:3b:1f:70: 96:5f:99:7d:7e:bf:4c:44:3a:a8:ea:9b:e5:cb:36:85: 83:d9:07:3f:85:1d:d3:dc:5f:74:85:00:60:6c:68:7e: e1:89:59:dc:ea:20:b0:11:d4:7d:82:5a:2a:b6:b3:e6: e4:a7:53:12:a7:07:e7:e4:a2:b6:53:5d:30:8c:5b:3b: 9c:a3:2a:fa:97:08:a4:40:14:ef:f0:6a:24:82:27:0c: b9:9f:94:50:ab:f6:e4:49:44:7c:92:1a:f9:fd:c9:38: 29:d4:81:ad:9c:01:a1:20:a9:28:33:66:26:ba:dd:99: 00:3e:34:85:73:7f:e7:73:22:a6:11:15:4b:7c:c5:26: 62:e8:d7:64:34:99:92:c3:75:95:86:a1:fe:17:67:29: fa:26:fe:d4:6e:1a:ca:25:81:c3:73:f5:76:98:6a:24: 03:b4:29:81:02:8f:ab:3c:68:a2:d9:c4:24:a1:74:d3: a9:75:fc:16:7f:29:6e:1a:b5:34:3e:ef:ce:05:20:a7: 64:2c:01:d7:49:86:98:00:5e:ee:18:4b:9f:8e:54:90: 37:65:96:59:dc:be:fa:42:54:4a:39:53:0c:3c:f0:49: bc:cb:ed:5e:ba:9d:6a:e0:65:34:77:d2:16:5d:3a:98 Fingerprint (SHA-256): 75:C5:75:3F:84:2F:60:65:36:9B:B3:E8:95:6A:DF:54:54:B5:FC:B0:59:5F:A2:0C:3A:C1:62:B0:7E:12:68:34 Fingerprint (SHA1): 84:DF:30:DB:61:C4:9D:E2:4B:DF:D9:03:A3:05:6C:DF:AE:36:9F:A8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #11031: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #11032: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125759 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11033: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #11034: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #11035: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11036: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 510125760 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11037: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11038: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #11039: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11040: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510125761 --extCP --extIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #11041: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11042: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #11043: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11044: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 510125762 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11045: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11046: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #11047: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11048: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 510125763 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11049: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11050: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #11051: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11052: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 510125764 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11053: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11054: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #11055: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11056: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 510125765 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11057: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11058: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #11059: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #11060: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #11061: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #11062: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #11063: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125759 (0x1e67e6bf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:59:28 2017 Not After : Tue May 10 12:59:28 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:d8:89:c4:71:c8:40:ed:be:6b:30:c0:0c:8f:90:77: 38:96:c5:e9:c5:d9:bf:e0:60:98:6a:af:97:54:09:69: 3f:40:49:ad:15:da:71:ac:b0:83:e9:7a:9d:0b:3c:e6: 92:4d:23:b7:ab:35:38:9a:29:7c:fb:a0:e6:06:1b:57: 88:73:c3:56:de:7d:94:c7:d2:80:96:1d:26:c7:4b:cc: 30:3f:9a:e2:f2:ee:c5:39:b8:01:a8:47:91:3a:a1:d4: f4:bb:36:a5:40:dc:02:2e:9f:7e:f2:49:91:ca:42:eb: be:e0:2a:44:c5:0e:93:86:1e:42:c3:57:a1:47:90:72: 19:39:b0:56:e0:ac:21:9e:53:73:c9:01:bd:15:d3:cb: 44:4d:8e:d5:6c:d1:47:ee:a9:17:17:7d:19:9f:21:6b: fd:3d:64:dc:d6:fb:d8:ab:79:99:5c:bd:6c:c3:37:ef: f8:cc:19:17:da:03:dc:bf:c1:e0:4e:c7:11:76:5c:26: 22:25:c0:d0:17:35:a5:d6:a3:6b:c4:41:b0:d2:dc:93: 30:a8:51:30:8a:12:5c:dd:1e:37:ba:7b:1a:df:4a:58: ce:6d:b7:d3:d9:1a:bb:4f:1a:25:18:7b:34:b7:6a:bc: 8e:6a:33:70:7f:7d:b3:2a:78:8c:23:7e:01:33:34:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:07:d7:2e:7c:25:f4:4c:4b:a3:05:51:49:8b:d1:24: 71:1f:95:c4:f2:18:ff:f9:2b:d7:04:af:a4:29:01:78: b9:fd:35:cd:67:61:a9:51:80:1c:80:87:a1:e6:45:ac: 1f:70:0b:ce:b3:7f:eb:57:64:06:f0:8b:03:27:c4:db: 37:75:bc:8a:dd:8f:38:38:cf:f0:d8:0b:c3:28:fd:a6: 5b:99:69:7c:27:78:15:a1:92:b4:3d:44:87:3b:69:35: c9:96:22:11:67:b3:86:6b:02:97:30:5f:25:57:c0:97: e7:0a:d0:db:cf:e5:24:0a:6f:64:6b:55:7f:30:fa:b2: 7c:50:ed:4c:19:d0:8f:1c:8b:46:1f:54:1f:52:bb:4f: 47:b0:93:d7:39:a6:cc:1d:0e:f9:c5:9e:ca:88:67:15: da:82:c8:be:4a:95:ae:87:1e:09:69:82:f8:66:7f:b3: 32:e3:60:fc:dd:30:ff:3c:f5:ed:80:c1:2c:5a:d5:08: ea:37:99:b3:b9:a2:95:21:b5:57:97:f3:9e:98:bd:78: 34:ee:54:85:73:33:84:e9:c3:f1:b7:35:c4:87:c4:4e: 24:cd:07:99:50:10:fa:36:75:db:90:c2:2e:50:3a:ff: 26:33:80:db:76:9c:6f:16:8d:1b:f3:f5:00:b6:9e:65 Fingerprint (SHA-256): CB:F6:DF:6A:2E:28:97:9A:71:E5:6C:E8:7D:2F:90:6F:03:45:9B:5C:67:42:05:7E:74:AD:10:A5:4A:F5:58:BE Fingerprint (SHA1): 25:80:4B:D3:1C:A0:39:43:51:00:13:7A:14:72:3F:27:1D:1B:D7:75 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11064: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11065: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11066: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11067: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125759 (0x1e67e6bf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:59:28 2017 Not After : Tue May 10 12:59:28 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:d8:89:c4:71:c8:40:ed:be:6b:30:c0:0c:8f:90:77: 38:96:c5:e9:c5:d9:bf:e0:60:98:6a:af:97:54:09:69: 3f:40:49:ad:15:da:71:ac:b0:83:e9:7a:9d:0b:3c:e6: 92:4d:23:b7:ab:35:38:9a:29:7c:fb:a0:e6:06:1b:57: 88:73:c3:56:de:7d:94:c7:d2:80:96:1d:26:c7:4b:cc: 30:3f:9a:e2:f2:ee:c5:39:b8:01:a8:47:91:3a:a1:d4: f4:bb:36:a5:40:dc:02:2e:9f:7e:f2:49:91:ca:42:eb: be:e0:2a:44:c5:0e:93:86:1e:42:c3:57:a1:47:90:72: 19:39:b0:56:e0:ac:21:9e:53:73:c9:01:bd:15:d3:cb: 44:4d:8e:d5:6c:d1:47:ee:a9:17:17:7d:19:9f:21:6b: fd:3d:64:dc:d6:fb:d8:ab:79:99:5c:bd:6c:c3:37:ef: f8:cc:19:17:da:03:dc:bf:c1:e0:4e:c7:11:76:5c:26: 22:25:c0:d0:17:35:a5:d6:a3:6b:c4:41:b0:d2:dc:93: 30:a8:51:30:8a:12:5c:dd:1e:37:ba:7b:1a:df:4a:58: ce:6d:b7:d3:d9:1a:bb:4f:1a:25:18:7b:34:b7:6a:bc: 8e:6a:33:70:7f:7d:b3:2a:78:8c:23:7e:01:33:34:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:07:d7:2e:7c:25:f4:4c:4b:a3:05:51:49:8b:d1:24: 71:1f:95:c4:f2:18:ff:f9:2b:d7:04:af:a4:29:01:78: b9:fd:35:cd:67:61:a9:51:80:1c:80:87:a1:e6:45:ac: 1f:70:0b:ce:b3:7f:eb:57:64:06:f0:8b:03:27:c4:db: 37:75:bc:8a:dd:8f:38:38:cf:f0:d8:0b:c3:28:fd:a6: 5b:99:69:7c:27:78:15:a1:92:b4:3d:44:87:3b:69:35: c9:96:22:11:67:b3:86:6b:02:97:30:5f:25:57:c0:97: e7:0a:d0:db:cf:e5:24:0a:6f:64:6b:55:7f:30:fa:b2: 7c:50:ed:4c:19:d0:8f:1c:8b:46:1f:54:1f:52:bb:4f: 47:b0:93:d7:39:a6:cc:1d:0e:f9:c5:9e:ca:88:67:15: da:82:c8:be:4a:95:ae:87:1e:09:69:82:f8:66:7f:b3: 32:e3:60:fc:dd:30:ff:3c:f5:ed:80:c1:2c:5a:d5:08: ea:37:99:b3:b9:a2:95:21:b5:57:97:f3:9e:98:bd:78: 34:ee:54:85:73:33:84:e9:c3:f1:b7:35:c4:87:c4:4e: 24:cd:07:99:50:10:fa:36:75:db:90:c2:2e:50:3a:ff: 26:33:80:db:76:9c:6f:16:8d:1b:f3:f5:00:b6:9e:65 Fingerprint (SHA-256): CB:F6:DF:6A:2E:28:97:9A:71:E5:6C:E8:7D:2F:90:6F:03:45:9B:5C:67:42:05:7E:74:AD:10:A5:4A:F5:58:BE Fingerprint (SHA1): 25:80:4B:D3:1C:A0:39:43:51:00:13:7A:14:72:3F:27:1D:1B:D7:75 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11068: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11069: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #11070: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125766 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11071: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #11072: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #11073: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11074: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 510125767 --extCP --extIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #11075: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11076: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #11077: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11078: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 510125768 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11079: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11080: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #11081: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11082: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 510125769 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11083: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11084: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #11085: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11086: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 510125770 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11087: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11088: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #11089: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11090: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 510125771 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11091: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11092: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #11093: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11094: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 510125772 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11095: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11096: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #11097: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11098: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 510125773 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11099: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11100: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #11101: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11102: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 510125774 --extCP --extIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #11103: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11104: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #11105: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11106: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 510125775 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11107: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11108: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #11109: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11110: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 510125776 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11111: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11112: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #11113: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11114: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 510125777 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11115: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11116: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #11117: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11118: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 510125778 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11119: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11120: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #11121: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11122: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 510125779 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11123: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11124: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #11125: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11126: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 510125780 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11127: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11128: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #11129: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11130: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 510125781 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11131: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11132: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #11133: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11134: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 510125782 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11135: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11136: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #11137: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11138: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 510125783 --extCP --extIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #11139: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11140: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #11141: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11142: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 510125784 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11143: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11144: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #11145: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11146: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 510125785 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11147: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11148: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #11149: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11150: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 510125786 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11151: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11152: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #11153: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11154: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 510125787 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11155: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11156: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #11157: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11158: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 510125788 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11159: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11160: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #11161: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11162: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 510125789 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11163: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11164: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #11165: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11166: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 510125790 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11167: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11168: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #11169: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11170: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 510125791 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11171: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11172: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #11173: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11174: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 510125792 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11175: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11176: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #11177: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11178: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 510125793 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11179: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11180: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #11181: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11182: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 510125794 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11183: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11184: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #11185: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11186: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 510125795 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11187: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11188: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #11189: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125766 (0x1e67e6c6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:59:43 2017 Not After : Tue May 10 12:59:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:53:d4:79:44:e2:d1:0b:4e:39:f0:54:98:aa:cc:59: b5:3c:5d:36:71:11:0a:c6:9d:f9:b1:59:fe:04:73:1e: ee:26:f8:6e:1b:bd:af:ea:b1:c3:05:e6:df:4e:04:66: 45:e8:00:1f:83:ab:56:b2:56:df:9d:27:77:ba:6b:1f: 84:d4:3c:8c:7e:39:5b:0f:09:79:c1:60:38:34:e0:ff: 65:37:ac:cd:0d:ee:1b:b2:bf:c1:76:fc:b0:d6:fa:95: ab:4f:35:a5:be:7b:cd:04:40:43:d8:0c:e0:26:63:dc: 9c:af:ff:cf:1f:04:0a:e8:23:86:ff:f1:04:2d:a6:21: 91:31:06:20:44:10:67:77:7c:16:35:85:02:48:30:51: 9b:ac:8a:da:dd:2c:64:6d:e7:d8:90:58:69:77:c0:fc: a7:25:1f:82:4e:5d:8b:b2:42:18:4d:10:40:db:4b:99: a9:0b:7b:69:35:8b:97:72:fc:2e:02:7a:e5:e9:28:89: aa:bb:dc:7e:b3:0a:0b:44:5f:67:6c:00:af:0b:14:7a: a6:8e:73:c2:71:9e:41:01:d7:f5:a0:ff:3d:d8:57:83: 1e:ca:bd:92:71:76:bb:55:5d:02:51:72:ab:89:1b:26: d6:3f:9b:cd:03:e8:fd:e1:05:f5:65:ff:5a:e8:84:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:4a:64:0b:c8:b6:3c:79:4f:8a:45:19:dc:a3:82:2c: 88:6f:20:a5:e1:27:7c:35:5e:29:04:7d:96:fc:39:31: c0:0a:bb:c7:86:f2:41:e4:19:dc:cc:e0:81:ee:a4:4f: e6:27:2f:8d:ee:22:77:d6:00:42:0b:53:1f:a1:11:8b: ef:93:23:f8:12:15:c1:45:d6:69:99:7e:4b:59:23:0e: 3f:97:88:fc:3c:40:92:9a:fc:eb:96:35:0c:19:98:e5: f7:92:20:36:12:0e:2b:8a:5e:37:66:78:2e:13:8a:e6: 5b:5e:8b:0f:14:d1:53:cb:3f:49:e9:fa:c3:44:90:0a: e2:50:09:b3:37:97:86:d8:fe:eb:f0:1b:76:0e:e8:b4: 6f:e4:c8:38:b4:6b:bb:33:0e:dc:3e:6a:f1:1d:76:ea: ce:7a:67:6c:dd:ea:af:08:84:91:b4:6f:f9:27:bb:8e: fd:1f:cb:ea:fe:11:30:bc:ae:df:73:fa:b3:71:97:20: 04:54:f6:17:9d:b8:d9:74:83:91:82:93:01:7d:6c:1e: 14:7b:f9:5a:0a:0e:65:70:03:24:ae:aa:6c:e4:1d:ee: ff:5a:15:42:b0:f0:ef:8d:0c:1b:37:9d:b4:88:71:cb: b3:0b:07:2d:78:44:52:2c:10:ce:56:07:bb:86:a1:3b Fingerprint (SHA-256): DC:26:35:F5:30:D1:92:08:A0:21:B1:C7:99:F2:2E:F2:FE:5C:07:DF:25:F7:F5:74:31:37:9D:85:53:B1:AD:71 Fingerprint (SHA1): 6B:19:6F:4D:1E:88:30:67:6A:25:D6:18:4C:53:19:AE:07:FC:6F:91 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11190: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11191: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125766 (0x1e67e6c6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:59:43 2017 Not After : Tue May 10 12:59:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:53:d4:79:44:e2:d1:0b:4e:39:f0:54:98:aa:cc:59: b5:3c:5d:36:71:11:0a:c6:9d:f9:b1:59:fe:04:73:1e: ee:26:f8:6e:1b:bd:af:ea:b1:c3:05:e6:df:4e:04:66: 45:e8:00:1f:83:ab:56:b2:56:df:9d:27:77:ba:6b:1f: 84:d4:3c:8c:7e:39:5b:0f:09:79:c1:60:38:34:e0:ff: 65:37:ac:cd:0d:ee:1b:b2:bf:c1:76:fc:b0:d6:fa:95: ab:4f:35:a5:be:7b:cd:04:40:43:d8:0c:e0:26:63:dc: 9c:af:ff:cf:1f:04:0a:e8:23:86:ff:f1:04:2d:a6:21: 91:31:06:20:44:10:67:77:7c:16:35:85:02:48:30:51: 9b:ac:8a:da:dd:2c:64:6d:e7:d8:90:58:69:77:c0:fc: a7:25:1f:82:4e:5d:8b:b2:42:18:4d:10:40:db:4b:99: a9:0b:7b:69:35:8b:97:72:fc:2e:02:7a:e5:e9:28:89: aa:bb:dc:7e:b3:0a:0b:44:5f:67:6c:00:af:0b:14:7a: a6:8e:73:c2:71:9e:41:01:d7:f5:a0:ff:3d:d8:57:83: 1e:ca:bd:92:71:76:bb:55:5d:02:51:72:ab:89:1b:26: d6:3f:9b:cd:03:e8:fd:e1:05:f5:65:ff:5a:e8:84:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:4a:64:0b:c8:b6:3c:79:4f:8a:45:19:dc:a3:82:2c: 88:6f:20:a5:e1:27:7c:35:5e:29:04:7d:96:fc:39:31: c0:0a:bb:c7:86:f2:41:e4:19:dc:cc:e0:81:ee:a4:4f: e6:27:2f:8d:ee:22:77:d6:00:42:0b:53:1f:a1:11:8b: ef:93:23:f8:12:15:c1:45:d6:69:99:7e:4b:59:23:0e: 3f:97:88:fc:3c:40:92:9a:fc:eb:96:35:0c:19:98:e5: f7:92:20:36:12:0e:2b:8a:5e:37:66:78:2e:13:8a:e6: 5b:5e:8b:0f:14:d1:53:cb:3f:49:e9:fa:c3:44:90:0a: e2:50:09:b3:37:97:86:d8:fe:eb:f0:1b:76:0e:e8:b4: 6f:e4:c8:38:b4:6b:bb:33:0e:dc:3e:6a:f1:1d:76:ea: ce:7a:67:6c:dd:ea:af:08:84:91:b4:6f:f9:27:bb:8e: fd:1f:cb:ea:fe:11:30:bc:ae:df:73:fa:b3:71:97:20: 04:54:f6:17:9d:b8:d9:74:83:91:82:93:01:7d:6c:1e: 14:7b:f9:5a:0a:0e:65:70:03:24:ae:aa:6c:e4:1d:ee: ff:5a:15:42:b0:f0:ef:8d:0c:1b:37:9d:b4:88:71:cb: b3:0b:07:2d:78:44:52:2c:10:ce:56:07:bb:86:a1:3b Fingerprint (SHA-256): DC:26:35:F5:30:D1:92:08:A0:21:B1:C7:99:F2:2E:F2:FE:5C:07:DF:25:F7:F5:74:31:37:9D:85:53:B1:AD:71 Fingerprint (SHA1): 6B:19:6F:4D:1E:88:30:67:6A:25:D6:18:4C:53:19:AE:07:FC:6F:91 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11192: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11193: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11194: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11195: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125766 (0x1e67e6c6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:59:43 2017 Not After : Tue May 10 12:59:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:53:d4:79:44:e2:d1:0b:4e:39:f0:54:98:aa:cc:59: b5:3c:5d:36:71:11:0a:c6:9d:f9:b1:59:fe:04:73:1e: ee:26:f8:6e:1b:bd:af:ea:b1:c3:05:e6:df:4e:04:66: 45:e8:00:1f:83:ab:56:b2:56:df:9d:27:77:ba:6b:1f: 84:d4:3c:8c:7e:39:5b:0f:09:79:c1:60:38:34:e0:ff: 65:37:ac:cd:0d:ee:1b:b2:bf:c1:76:fc:b0:d6:fa:95: ab:4f:35:a5:be:7b:cd:04:40:43:d8:0c:e0:26:63:dc: 9c:af:ff:cf:1f:04:0a:e8:23:86:ff:f1:04:2d:a6:21: 91:31:06:20:44:10:67:77:7c:16:35:85:02:48:30:51: 9b:ac:8a:da:dd:2c:64:6d:e7:d8:90:58:69:77:c0:fc: a7:25:1f:82:4e:5d:8b:b2:42:18:4d:10:40:db:4b:99: a9:0b:7b:69:35:8b:97:72:fc:2e:02:7a:e5:e9:28:89: aa:bb:dc:7e:b3:0a:0b:44:5f:67:6c:00:af:0b:14:7a: a6:8e:73:c2:71:9e:41:01:d7:f5:a0:ff:3d:d8:57:83: 1e:ca:bd:92:71:76:bb:55:5d:02:51:72:ab:89:1b:26: d6:3f:9b:cd:03:e8:fd:e1:05:f5:65:ff:5a:e8:84:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:4a:64:0b:c8:b6:3c:79:4f:8a:45:19:dc:a3:82:2c: 88:6f:20:a5:e1:27:7c:35:5e:29:04:7d:96:fc:39:31: c0:0a:bb:c7:86:f2:41:e4:19:dc:cc:e0:81:ee:a4:4f: e6:27:2f:8d:ee:22:77:d6:00:42:0b:53:1f:a1:11:8b: ef:93:23:f8:12:15:c1:45:d6:69:99:7e:4b:59:23:0e: 3f:97:88:fc:3c:40:92:9a:fc:eb:96:35:0c:19:98:e5: f7:92:20:36:12:0e:2b:8a:5e:37:66:78:2e:13:8a:e6: 5b:5e:8b:0f:14:d1:53:cb:3f:49:e9:fa:c3:44:90:0a: e2:50:09:b3:37:97:86:d8:fe:eb:f0:1b:76:0e:e8:b4: 6f:e4:c8:38:b4:6b:bb:33:0e:dc:3e:6a:f1:1d:76:ea: ce:7a:67:6c:dd:ea:af:08:84:91:b4:6f:f9:27:bb:8e: fd:1f:cb:ea:fe:11:30:bc:ae:df:73:fa:b3:71:97:20: 04:54:f6:17:9d:b8:d9:74:83:91:82:93:01:7d:6c:1e: 14:7b:f9:5a:0a:0e:65:70:03:24:ae:aa:6c:e4:1d:ee: ff:5a:15:42:b0:f0:ef:8d:0c:1b:37:9d:b4:88:71:cb: b3:0b:07:2d:78:44:52:2c:10:ce:56:07:bb:86:a1:3b Fingerprint (SHA-256): DC:26:35:F5:30:D1:92:08:A0:21:B1:C7:99:F2:2E:F2:FE:5C:07:DF:25:F7:F5:74:31:37:9D:85:53:B1:AD:71 Fingerprint (SHA1): 6B:19:6F:4D:1E:88:30:67:6A:25:D6:18:4C:53:19:AE:07:FC:6F:91 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11196: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11197: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11198: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11199: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125766 (0x1e67e6c6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:59:43 2017 Not After : Tue May 10 12:59:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:53:d4:79:44:e2:d1:0b:4e:39:f0:54:98:aa:cc:59: b5:3c:5d:36:71:11:0a:c6:9d:f9:b1:59:fe:04:73:1e: ee:26:f8:6e:1b:bd:af:ea:b1:c3:05:e6:df:4e:04:66: 45:e8:00:1f:83:ab:56:b2:56:df:9d:27:77:ba:6b:1f: 84:d4:3c:8c:7e:39:5b:0f:09:79:c1:60:38:34:e0:ff: 65:37:ac:cd:0d:ee:1b:b2:bf:c1:76:fc:b0:d6:fa:95: ab:4f:35:a5:be:7b:cd:04:40:43:d8:0c:e0:26:63:dc: 9c:af:ff:cf:1f:04:0a:e8:23:86:ff:f1:04:2d:a6:21: 91:31:06:20:44:10:67:77:7c:16:35:85:02:48:30:51: 9b:ac:8a:da:dd:2c:64:6d:e7:d8:90:58:69:77:c0:fc: a7:25:1f:82:4e:5d:8b:b2:42:18:4d:10:40:db:4b:99: a9:0b:7b:69:35:8b:97:72:fc:2e:02:7a:e5:e9:28:89: aa:bb:dc:7e:b3:0a:0b:44:5f:67:6c:00:af:0b:14:7a: a6:8e:73:c2:71:9e:41:01:d7:f5:a0:ff:3d:d8:57:83: 1e:ca:bd:92:71:76:bb:55:5d:02:51:72:ab:89:1b:26: d6:3f:9b:cd:03:e8:fd:e1:05:f5:65:ff:5a:e8:84:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:4a:64:0b:c8:b6:3c:79:4f:8a:45:19:dc:a3:82:2c: 88:6f:20:a5:e1:27:7c:35:5e:29:04:7d:96:fc:39:31: c0:0a:bb:c7:86:f2:41:e4:19:dc:cc:e0:81:ee:a4:4f: e6:27:2f:8d:ee:22:77:d6:00:42:0b:53:1f:a1:11:8b: ef:93:23:f8:12:15:c1:45:d6:69:99:7e:4b:59:23:0e: 3f:97:88:fc:3c:40:92:9a:fc:eb:96:35:0c:19:98:e5: f7:92:20:36:12:0e:2b:8a:5e:37:66:78:2e:13:8a:e6: 5b:5e:8b:0f:14:d1:53:cb:3f:49:e9:fa:c3:44:90:0a: e2:50:09:b3:37:97:86:d8:fe:eb:f0:1b:76:0e:e8:b4: 6f:e4:c8:38:b4:6b:bb:33:0e:dc:3e:6a:f1:1d:76:ea: ce:7a:67:6c:dd:ea:af:08:84:91:b4:6f:f9:27:bb:8e: fd:1f:cb:ea:fe:11:30:bc:ae:df:73:fa:b3:71:97:20: 04:54:f6:17:9d:b8:d9:74:83:91:82:93:01:7d:6c:1e: 14:7b:f9:5a:0a:0e:65:70:03:24:ae:aa:6c:e4:1d:ee: ff:5a:15:42:b0:f0:ef:8d:0c:1b:37:9d:b4:88:71:cb: b3:0b:07:2d:78:44:52:2c:10:ce:56:07:bb:86:a1:3b Fingerprint (SHA-256): DC:26:35:F5:30:D1:92:08:A0:21:B1:C7:99:F2:2E:F2:FE:5C:07:DF:25:F7:F5:74:31:37:9D:85:53:B1:AD:71 Fingerprint (SHA1): 6B:19:6F:4D:1E:88:30:67:6A:25:D6:18:4C:53:19:AE:07:FC:6F:91 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11200: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125766 (0x1e67e6c6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:59:43 2017 Not After : Tue May 10 12:59:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:53:d4:79:44:e2:d1:0b:4e:39:f0:54:98:aa:cc:59: b5:3c:5d:36:71:11:0a:c6:9d:f9:b1:59:fe:04:73:1e: ee:26:f8:6e:1b:bd:af:ea:b1:c3:05:e6:df:4e:04:66: 45:e8:00:1f:83:ab:56:b2:56:df:9d:27:77:ba:6b:1f: 84:d4:3c:8c:7e:39:5b:0f:09:79:c1:60:38:34:e0:ff: 65:37:ac:cd:0d:ee:1b:b2:bf:c1:76:fc:b0:d6:fa:95: ab:4f:35:a5:be:7b:cd:04:40:43:d8:0c:e0:26:63:dc: 9c:af:ff:cf:1f:04:0a:e8:23:86:ff:f1:04:2d:a6:21: 91:31:06:20:44:10:67:77:7c:16:35:85:02:48:30:51: 9b:ac:8a:da:dd:2c:64:6d:e7:d8:90:58:69:77:c0:fc: a7:25:1f:82:4e:5d:8b:b2:42:18:4d:10:40:db:4b:99: a9:0b:7b:69:35:8b:97:72:fc:2e:02:7a:e5:e9:28:89: aa:bb:dc:7e:b3:0a:0b:44:5f:67:6c:00:af:0b:14:7a: a6:8e:73:c2:71:9e:41:01:d7:f5:a0:ff:3d:d8:57:83: 1e:ca:bd:92:71:76:bb:55:5d:02:51:72:ab:89:1b:26: d6:3f:9b:cd:03:e8:fd:e1:05:f5:65:ff:5a:e8:84:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:4a:64:0b:c8:b6:3c:79:4f:8a:45:19:dc:a3:82:2c: 88:6f:20:a5:e1:27:7c:35:5e:29:04:7d:96:fc:39:31: c0:0a:bb:c7:86:f2:41:e4:19:dc:cc:e0:81:ee:a4:4f: e6:27:2f:8d:ee:22:77:d6:00:42:0b:53:1f:a1:11:8b: ef:93:23:f8:12:15:c1:45:d6:69:99:7e:4b:59:23:0e: 3f:97:88:fc:3c:40:92:9a:fc:eb:96:35:0c:19:98:e5: f7:92:20:36:12:0e:2b:8a:5e:37:66:78:2e:13:8a:e6: 5b:5e:8b:0f:14:d1:53:cb:3f:49:e9:fa:c3:44:90:0a: e2:50:09:b3:37:97:86:d8:fe:eb:f0:1b:76:0e:e8:b4: 6f:e4:c8:38:b4:6b:bb:33:0e:dc:3e:6a:f1:1d:76:ea: ce:7a:67:6c:dd:ea:af:08:84:91:b4:6f:f9:27:bb:8e: fd:1f:cb:ea:fe:11:30:bc:ae:df:73:fa:b3:71:97:20: 04:54:f6:17:9d:b8:d9:74:83:91:82:93:01:7d:6c:1e: 14:7b:f9:5a:0a:0e:65:70:03:24:ae:aa:6c:e4:1d:ee: ff:5a:15:42:b0:f0:ef:8d:0c:1b:37:9d:b4:88:71:cb: b3:0b:07:2d:78:44:52:2c:10:ce:56:07:bb:86:a1:3b Fingerprint (SHA-256): DC:26:35:F5:30:D1:92:08:A0:21:B1:C7:99:F2:2E:F2:FE:5C:07:DF:25:F7:F5:74:31:37:9D:85:53:B1:AD:71 Fingerprint (SHA1): 6B:19:6F:4D:1E:88:30:67:6A:25:D6:18:4C:53:19:AE:07:FC:6F:91 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11201: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11202: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125766 (0x1e67e6c6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:59:43 2017 Not After : Tue May 10 12:59:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:53:d4:79:44:e2:d1:0b:4e:39:f0:54:98:aa:cc:59: b5:3c:5d:36:71:11:0a:c6:9d:f9:b1:59:fe:04:73:1e: ee:26:f8:6e:1b:bd:af:ea:b1:c3:05:e6:df:4e:04:66: 45:e8:00:1f:83:ab:56:b2:56:df:9d:27:77:ba:6b:1f: 84:d4:3c:8c:7e:39:5b:0f:09:79:c1:60:38:34:e0:ff: 65:37:ac:cd:0d:ee:1b:b2:bf:c1:76:fc:b0:d6:fa:95: ab:4f:35:a5:be:7b:cd:04:40:43:d8:0c:e0:26:63:dc: 9c:af:ff:cf:1f:04:0a:e8:23:86:ff:f1:04:2d:a6:21: 91:31:06:20:44:10:67:77:7c:16:35:85:02:48:30:51: 9b:ac:8a:da:dd:2c:64:6d:e7:d8:90:58:69:77:c0:fc: a7:25:1f:82:4e:5d:8b:b2:42:18:4d:10:40:db:4b:99: a9:0b:7b:69:35:8b:97:72:fc:2e:02:7a:e5:e9:28:89: aa:bb:dc:7e:b3:0a:0b:44:5f:67:6c:00:af:0b:14:7a: a6:8e:73:c2:71:9e:41:01:d7:f5:a0:ff:3d:d8:57:83: 1e:ca:bd:92:71:76:bb:55:5d:02:51:72:ab:89:1b:26: d6:3f:9b:cd:03:e8:fd:e1:05:f5:65:ff:5a:e8:84:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:4a:64:0b:c8:b6:3c:79:4f:8a:45:19:dc:a3:82:2c: 88:6f:20:a5:e1:27:7c:35:5e:29:04:7d:96:fc:39:31: c0:0a:bb:c7:86:f2:41:e4:19:dc:cc:e0:81:ee:a4:4f: e6:27:2f:8d:ee:22:77:d6:00:42:0b:53:1f:a1:11:8b: ef:93:23:f8:12:15:c1:45:d6:69:99:7e:4b:59:23:0e: 3f:97:88:fc:3c:40:92:9a:fc:eb:96:35:0c:19:98:e5: f7:92:20:36:12:0e:2b:8a:5e:37:66:78:2e:13:8a:e6: 5b:5e:8b:0f:14:d1:53:cb:3f:49:e9:fa:c3:44:90:0a: e2:50:09:b3:37:97:86:d8:fe:eb:f0:1b:76:0e:e8:b4: 6f:e4:c8:38:b4:6b:bb:33:0e:dc:3e:6a:f1:1d:76:ea: ce:7a:67:6c:dd:ea:af:08:84:91:b4:6f:f9:27:bb:8e: fd:1f:cb:ea:fe:11:30:bc:ae:df:73:fa:b3:71:97:20: 04:54:f6:17:9d:b8:d9:74:83:91:82:93:01:7d:6c:1e: 14:7b:f9:5a:0a:0e:65:70:03:24:ae:aa:6c:e4:1d:ee: ff:5a:15:42:b0:f0:ef:8d:0c:1b:37:9d:b4:88:71:cb: b3:0b:07:2d:78:44:52:2c:10:ce:56:07:bb:86:a1:3b Fingerprint (SHA-256): DC:26:35:F5:30:D1:92:08:A0:21:B1:C7:99:F2:2E:F2:FE:5C:07:DF:25:F7:F5:74:31:37:9D:85:53:B1:AD:71 Fingerprint (SHA1): 6B:19:6F:4D:1E:88:30:67:6A:25:D6:18:4C:53:19:AE:07:FC:6F:91 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11203: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11204: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11205: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11206: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125766 (0x1e67e6c6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:59:43 2017 Not After : Tue May 10 12:59:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:53:d4:79:44:e2:d1:0b:4e:39:f0:54:98:aa:cc:59: b5:3c:5d:36:71:11:0a:c6:9d:f9:b1:59:fe:04:73:1e: ee:26:f8:6e:1b:bd:af:ea:b1:c3:05:e6:df:4e:04:66: 45:e8:00:1f:83:ab:56:b2:56:df:9d:27:77:ba:6b:1f: 84:d4:3c:8c:7e:39:5b:0f:09:79:c1:60:38:34:e0:ff: 65:37:ac:cd:0d:ee:1b:b2:bf:c1:76:fc:b0:d6:fa:95: ab:4f:35:a5:be:7b:cd:04:40:43:d8:0c:e0:26:63:dc: 9c:af:ff:cf:1f:04:0a:e8:23:86:ff:f1:04:2d:a6:21: 91:31:06:20:44:10:67:77:7c:16:35:85:02:48:30:51: 9b:ac:8a:da:dd:2c:64:6d:e7:d8:90:58:69:77:c0:fc: a7:25:1f:82:4e:5d:8b:b2:42:18:4d:10:40:db:4b:99: a9:0b:7b:69:35:8b:97:72:fc:2e:02:7a:e5:e9:28:89: aa:bb:dc:7e:b3:0a:0b:44:5f:67:6c:00:af:0b:14:7a: a6:8e:73:c2:71:9e:41:01:d7:f5:a0:ff:3d:d8:57:83: 1e:ca:bd:92:71:76:bb:55:5d:02:51:72:ab:89:1b:26: d6:3f:9b:cd:03:e8:fd:e1:05:f5:65:ff:5a:e8:84:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:4a:64:0b:c8:b6:3c:79:4f:8a:45:19:dc:a3:82:2c: 88:6f:20:a5:e1:27:7c:35:5e:29:04:7d:96:fc:39:31: c0:0a:bb:c7:86:f2:41:e4:19:dc:cc:e0:81:ee:a4:4f: e6:27:2f:8d:ee:22:77:d6:00:42:0b:53:1f:a1:11:8b: ef:93:23:f8:12:15:c1:45:d6:69:99:7e:4b:59:23:0e: 3f:97:88:fc:3c:40:92:9a:fc:eb:96:35:0c:19:98:e5: f7:92:20:36:12:0e:2b:8a:5e:37:66:78:2e:13:8a:e6: 5b:5e:8b:0f:14:d1:53:cb:3f:49:e9:fa:c3:44:90:0a: e2:50:09:b3:37:97:86:d8:fe:eb:f0:1b:76:0e:e8:b4: 6f:e4:c8:38:b4:6b:bb:33:0e:dc:3e:6a:f1:1d:76:ea: ce:7a:67:6c:dd:ea:af:08:84:91:b4:6f:f9:27:bb:8e: fd:1f:cb:ea:fe:11:30:bc:ae:df:73:fa:b3:71:97:20: 04:54:f6:17:9d:b8:d9:74:83:91:82:93:01:7d:6c:1e: 14:7b:f9:5a:0a:0e:65:70:03:24:ae:aa:6c:e4:1d:ee: ff:5a:15:42:b0:f0:ef:8d:0c:1b:37:9d:b4:88:71:cb: b3:0b:07:2d:78:44:52:2c:10:ce:56:07:bb:86:a1:3b Fingerprint (SHA-256): DC:26:35:F5:30:D1:92:08:A0:21:B1:C7:99:F2:2E:F2:FE:5C:07:DF:25:F7:F5:74:31:37:9D:85:53:B1:AD:71 Fingerprint (SHA1): 6B:19:6F:4D:1E:88:30:67:6A:25:D6:18:4C:53:19:AE:07:FC:6F:91 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11207: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125766 (0x1e67e6c6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:59:43 2017 Not After : Tue May 10 12:59:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:53:d4:79:44:e2:d1:0b:4e:39:f0:54:98:aa:cc:59: b5:3c:5d:36:71:11:0a:c6:9d:f9:b1:59:fe:04:73:1e: ee:26:f8:6e:1b:bd:af:ea:b1:c3:05:e6:df:4e:04:66: 45:e8:00:1f:83:ab:56:b2:56:df:9d:27:77:ba:6b:1f: 84:d4:3c:8c:7e:39:5b:0f:09:79:c1:60:38:34:e0:ff: 65:37:ac:cd:0d:ee:1b:b2:bf:c1:76:fc:b0:d6:fa:95: ab:4f:35:a5:be:7b:cd:04:40:43:d8:0c:e0:26:63:dc: 9c:af:ff:cf:1f:04:0a:e8:23:86:ff:f1:04:2d:a6:21: 91:31:06:20:44:10:67:77:7c:16:35:85:02:48:30:51: 9b:ac:8a:da:dd:2c:64:6d:e7:d8:90:58:69:77:c0:fc: a7:25:1f:82:4e:5d:8b:b2:42:18:4d:10:40:db:4b:99: a9:0b:7b:69:35:8b:97:72:fc:2e:02:7a:e5:e9:28:89: aa:bb:dc:7e:b3:0a:0b:44:5f:67:6c:00:af:0b:14:7a: a6:8e:73:c2:71:9e:41:01:d7:f5:a0:ff:3d:d8:57:83: 1e:ca:bd:92:71:76:bb:55:5d:02:51:72:ab:89:1b:26: d6:3f:9b:cd:03:e8:fd:e1:05:f5:65:ff:5a:e8:84:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:4a:64:0b:c8:b6:3c:79:4f:8a:45:19:dc:a3:82:2c: 88:6f:20:a5:e1:27:7c:35:5e:29:04:7d:96:fc:39:31: c0:0a:bb:c7:86:f2:41:e4:19:dc:cc:e0:81:ee:a4:4f: e6:27:2f:8d:ee:22:77:d6:00:42:0b:53:1f:a1:11:8b: ef:93:23:f8:12:15:c1:45:d6:69:99:7e:4b:59:23:0e: 3f:97:88:fc:3c:40:92:9a:fc:eb:96:35:0c:19:98:e5: f7:92:20:36:12:0e:2b:8a:5e:37:66:78:2e:13:8a:e6: 5b:5e:8b:0f:14:d1:53:cb:3f:49:e9:fa:c3:44:90:0a: e2:50:09:b3:37:97:86:d8:fe:eb:f0:1b:76:0e:e8:b4: 6f:e4:c8:38:b4:6b:bb:33:0e:dc:3e:6a:f1:1d:76:ea: ce:7a:67:6c:dd:ea:af:08:84:91:b4:6f:f9:27:bb:8e: fd:1f:cb:ea:fe:11:30:bc:ae:df:73:fa:b3:71:97:20: 04:54:f6:17:9d:b8:d9:74:83:91:82:93:01:7d:6c:1e: 14:7b:f9:5a:0a:0e:65:70:03:24:ae:aa:6c:e4:1d:ee: ff:5a:15:42:b0:f0:ef:8d:0c:1b:37:9d:b4:88:71:cb: b3:0b:07:2d:78:44:52:2c:10:ce:56:07:bb:86:a1:3b Fingerprint (SHA-256): DC:26:35:F5:30:D1:92:08:A0:21:B1:C7:99:F2:2E:F2:FE:5C:07:DF:25:F7:F5:74:31:37:9D:85:53:B1:AD:71 Fingerprint (SHA1): 6B:19:6F:4D:1E:88:30:67:6A:25:D6:18:4C:53:19:AE:07:FC:6F:91 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #11208: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125766 (0x1e67e6c6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:59:43 2017 Not After : Tue May 10 12:59:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:53:d4:79:44:e2:d1:0b:4e:39:f0:54:98:aa:cc:59: b5:3c:5d:36:71:11:0a:c6:9d:f9:b1:59:fe:04:73:1e: ee:26:f8:6e:1b:bd:af:ea:b1:c3:05:e6:df:4e:04:66: 45:e8:00:1f:83:ab:56:b2:56:df:9d:27:77:ba:6b:1f: 84:d4:3c:8c:7e:39:5b:0f:09:79:c1:60:38:34:e0:ff: 65:37:ac:cd:0d:ee:1b:b2:bf:c1:76:fc:b0:d6:fa:95: ab:4f:35:a5:be:7b:cd:04:40:43:d8:0c:e0:26:63:dc: 9c:af:ff:cf:1f:04:0a:e8:23:86:ff:f1:04:2d:a6:21: 91:31:06:20:44:10:67:77:7c:16:35:85:02:48:30:51: 9b:ac:8a:da:dd:2c:64:6d:e7:d8:90:58:69:77:c0:fc: a7:25:1f:82:4e:5d:8b:b2:42:18:4d:10:40:db:4b:99: a9:0b:7b:69:35:8b:97:72:fc:2e:02:7a:e5:e9:28:89: aa:bb:dc:7e:b3:0a:0b:44:5f:67:6c:00:af:0b:14:7a: a6:8e:73:c2:71:9e:41:01:d7:f5:a0:ff:3d:d8:57:83: 1e:ca:bd:92:71:76:bb:55:5d:02:51:72:ab:89:1b:26: d6:3f:9b:cd:03:e8:fd:e1:05:f5:65:ff:5a:e8:84:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:4a:64:0b:c8:b6:3c:79:4f:8a:45:19:dc:a3:82:2c: 88:6f:20:a5:e1:27:7c:35:5e:29:04:7d:96:fc:39:31: c0:0a:bb:c7:86:f2:41:e4:19:dc:cc:e0:81:ee:a4:4f: e6:27:2f:8d:ee:22:77:d6:00:42:0b:53:1f:a1:11:8b: ef:93:23:f8:12:15:c1:45:d6:69:99:7e:4b:59:23:0e: 3f:97:88:fc:3c:40:92:9a:fc:eb:96:35:0c:19:98:e5: f7:92:20:36:12:0e:2b:8a:5e:37:66:78:2e:13:8a:e6: 5b:5e:8b:0f:14:d1:53:cb:3f:49:e9:fa:c3:44:90:0a: e2:50:09:b3:37:97:86:d8:fe:eb:f0:1b:76:0e:e8:b4: 6f:e4:c8:38:b4:6b:bb:33:0e:dc:3e:6a:f1:1d:76:ea: ce:7a:67:6c:dd:ea:af:08:84:91:b4:6f:f9:27:bb:8e: fd:1f:cb:ea:fe:11:30:bc:ae:df:73:fa:b3:71:97:20: 04:54:f6:17:9d:b8:d9:74:83:91:82:93:01:7d:6c:1e: 14:7b:f9:5a:0a:0e:65:70:03:24:ae:aa:6c:e4:1d:ee: ff:5a:15:42:b0:f0:ef:8d:0c:1b:37:9d:b4:88:71:cb: b3:0b:07:2d:78:44:52:2c:10:ce:56:07:bb:86:a1:3b Fingerprint (SHA-256): DC:26:35:F5:30:D1:92:08:A0:21:B1:C7:99:F2:2E:F2:FE:5C:07:DF:25:F7:F5:74:31:37:9D:85:53:B1:AD:71 Fingerprint (SHA1): 6B:19:6F:4D:1E:88:30:67:6A:25:D6:18:4C:53:19:AE:07:FC:6F:91 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #11209: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125766 (0x1e67e6c6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:59:43 2017 Not After : Tue May 10 12:59:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:53:d4:79:44:e2:d1:0b:4e:39:f0:54:98:aa:cc:59: b5:3c:5d:36:71:11:0a:c6:9d:f9:b1:59:fe:04:73:1e: ee:26:f8:6e:1b:bd:af:ea:b1:c3:05:e6:df:4e:04:66: 45:e8:00:1f:83:ab:56:b2:56:df:9d:27:77:ba:6b:1f: 84:d4:3c:8c:7e:39:5b:0f:09:79:c1:60:38:34:e0:ff: 65:37:ac:cd:0d:ee:1b:b2:bf:c1:76:fc:b0:d6:fa:95: ab:4f:35:a5:be:7b:cd:04:40:43:d8:0c:e0:26:63:dc: 9c:af:ff:cf:1f:04:0a:e8:23:86:ff:f1:04:2d:a6:21: 91:31:06:20:44:10:67:77:7c:16:35:85:02:48:30:51: 9b:ac:8a:da:dd:2c:64:6d:e7:d8:90:58:69:77:c0:fc: a7:25:1f:82:4e:5d:8b:b2:42:18:4d:10:40:db:4b:99: a9:0b:7b:69:35:8b:97:72:fc:2e:02:7a:e5:e9:28:89: aa:bb:dc:7e:b3:0a:0b:44:5f:67:6c:00:af:0b:14:7a: a6:8e:73:c2:71:9e:41:01:d7:f5:a0:ff:3d:d8:57:83: 1e:ca:bd:92:71:76:bb:55:5d:02:51:72:ab:89:1b:26: d6:3f:9b:cd:03:e8:fd:e1:05:f5:65:ff:5a:e8:84:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:4a:64:0b:c8:b6:3c:79:4f:8a:45:19:dc:a3:82:2c: 88:6f:20:a5:e1:27:7c:35:5e:29:04:7d:96:fc:39:31: c0:0a:bb:c7:86:f2:41:e4:19:dc:cc:e0:81:ee:a4:4f: e6:27:2f:8d:ee:22:77:d6:00:42:0b:53:1f:a1:11:8b: ef:93:23:f8:12:15:c1:45:d6:69:99:7e:4b:59:23:0e: 3f:97:88:fc:3c:40:92:9a:fc:eb:96:35:0c:19:98:e5: f7:92:20:36:12:0e:2b:8a:5e:37:66:78:2e:13:8a:e6: 5b:5e:8b:0f:14:d1:53:cb:3f:49:e9:fa:c3:44:90:0a: e2:50:09:b3:37:97:86:d8:fe:eb:f0:1b:76:0e:e8:b4: 6f:e4:c8:38:b4:6b:bb:33:0e:dc:3e:6a:f1:1d:76:ea: ce:7a:67:6c:dd:ea:af:08:84:91:b4:6f:f9:27:bb:8e: fd:1f:cb:ea:fe:11:30:bc:ae:df:73:fa:b3:71:97:20: 04:54:f6:17:9d:b8:d9:74:83:91:82:93:01:7d:6c:1e: 14:7b:f9:5a:0a:0e:65:70:03:24:ae:aa:6c:e4:1d:ee: ff:5a:15:42:b0:f0:ef:8d:0c:1b:37:9d:b4:88:71:cb: b3:0b:07:2d:78:44:52:2c:10:ce:56:07:bb:86:a1:3b Fingerprint (SHA-256): DC:26:35:F5:30:D1:92:08:A0:21:B1:C7:99:F2:2E:F2:FE:5C:07:DF:25:F7:F5:74:31:37:9D:85:53:B1:AD:71 Fingerprint (SHA1): 6B:19:6F:4D:1E:88:30:67:6A:25:D6:18:4C:53:19:AE:07:FC:6F:91 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #11210: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125766 (0x1e67e6c6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:59:43 2017 Not After : Tue May 10 12:59:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:53:d4:79:44:e2:d1:0b:4e:39:f0:54:98:aa:cc:59: b5:3c:5d:36:71:11:0a:c6:9d:f9:b1:59:fe:04:73:1e: ee:26:f8:6e:1b:bd:af:ea:b1:c3:05:e6:df:4e:04:66: 45:e8:00:1f:83:ab:56:b2:56:df:9d:27:77:ba:6b:1f: 84:d4:3c:8c:7e:39:5b:0f:09:79:c1:60:38:34:e0:ff: 65:37:ac:cd:0d:ee:1b:b2:bf:c1:76:fc:b0:d6:fa:95: ab:4f:35:a5:be:7b:cd:04:40:43:d8:0c:e0:26:63:dc: 9c:af:ff:cf:1f:04:0a:e8:23:86:ff:f1:04:2d:a6:21: 91:31:06:20:44:10:67:77:7c:16:35:85:02:48:30:51: 9b:ac:8a:da:dd:2c:64:6d:e7:d8:90:58:69:77:c0:fc: a7:25:1f:82:4e:5d:8b:b2:42:18:4d:10:40:db:4b:99: a9:0b:7b:69:35:8b:97:72:fc:2e:02:7a:e5:e9:28:89: aa:bb:dc:7e:b3:0a:0b:44:5f:67:6c:00:af:0b:14:7a: a6:8e:73:c2:71:9e:41:01:d7:f5:a0:ff:3d:d8:57:83: 1e:ca:bd:92:71:76:bb:55:5d:02:51:72:ab:89:1b:26: d6:3f:9b:cd:03:e8:fd:e1:05:f5:65:ff:5a:e8:84:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:4a:64:0b:c8:b6:3c:79:4f:8a:45:19:dc:a3:82:2c: 88:6f:20:a5:e1:27:7c:35:5e:29:04:7d:96:fc:39:31: c0:0a:bb:c7:86:f2:41:e4:19:dc:cc:e0:81:ee:a4:4f: e6:27:2f:8d:ee:22:77:d6:00:42:0b:53:1f:a1:11:8b: ef:93:23:f8:12:15:c1:45:d6:69:99:7e:4b:59:23:0e: 3f:97:88:fc:3c:40:92:9a:fc:eb:96:35:0c:19:98:e5: f7:92:20:36:12:0e:2b:8a:5e:37:66:78:2e:13:8a:e6: 5b:5e:8b:0f:14:d1:53:cb:3f:49:e9:fa:c3:44:90:0a: e2:50:09:b3:37:97:86:d8:fe:eb:f0:1b:76:0e:e8:b4: 6f:e4:c8:38:b4:6b:bb:33:0e:dc:3e:6a:f1:1d:76:ea: ce:7a:67:6c:dd:ea:af:08:84:91:b4:6f:f9:27:bb:8e: fd:1f:cb:ea:fe:11:30:bc:ae:df:73:fa:b3:71:97:20: 04:54:f6:17:9d:b8:d9:74:83:91:82:93:01:7d:6c:1e: 14:7b:f9:5a:0a:0e:65:70:03:24:ae:aa:6c:e4:1d:ee: ff:5a:15:42:b0:f0:ef:8d:0c:1b:37:9d:b4:88:71:cb: b3:0b:07:2d:78:44:52:2c:10:ce:56:07:bb:86:a1:3b Fingerprint (SHA-256): DC:26:35:F5:30:D1:92:08:A0:21:B1:C7:99:F2:2E:F2:FE:5C:07:DF:25:F7:F5:74:31:37:9D:85:53:B1:AD:71 Fingerprint (SHA1): 6B:19:6F:4D:1E:88:30:67:6A:25:D6:18:4C:53:19:AE:07:FC:6F:91 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #11211: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125766 (0x1e67e6c6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 12:59:43 2017 Not After : Tue May 10 12:59:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:53:d4:79:44:e2:d1:0b:4e:39:f0:54:98:aa:cc:59: b5:3c:5d:36:71:11:0a:c6:9d:f9:b1:59:fe:04:73:1e: ee:26:f8:6e:1b:bd:af:ea:b1:c3:05:e6:df:4e:04:66: 45:e8:00:1f:83:ab:56:b2:56:df:9d:27:77:ba:6b:1f: 84:d4:3c:8c:7e:39:5b:0f:09:79:c1:60:38:34:e0:ff: 65:37:ac:cd:0d:ee:1b:b2:bf:c1:76:fc:b0:d6:fa:95: ab:4f:35:a5:be:7b:cd:04:40:43:d8:0c:e0:26:63:dc: 9c:af:ff:cf:1f:04:0a:e8:23:86:ff:f1:04:2d:a6:21: 91:31:06:20:44:10:67:77:7c:16:35:85:02:48:30:51: 9b:ac:8a:da:dd:2c:64:6d:e7:d8:90:58:69:77:c0:fc: a7:25:1f:82:4e:5d:8b:b2:42:18:4d:10:40:db:4b:99: a9:0b:7b:69:35:8b:97:72:fc:2e:02:7a:e5:e9:28:89: aa:bb:dc:7e:b3:0a:0b:44:5f:67:6c:00:af:0b:14:7a: a6:8e:73:c2:71:9e:41:01:d7:f5:a0:ff:3d:d8:57:83: 1e:ca:bd:92:71:76:bb:55:5d:02:51:72:ab:89:1b:26: d6:3f:9b:cd:03:e8:fd:e1:05:f5:65:ff:5a:e8:84:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:4a:64:0b:c8:b6:3c:79:4f:8a:45:19:dc:a3:82:2c: 88:6f:20:a5:e1:27:7c:35:5e:29:04:7d:96:fc:39:31: c0:0a:bb:c7:86:f2:41:e4:19:dc:cc:e0:81:ee:a4:4f: e6:27:2f:8d:ee:22:77:d6:00:42:0b:53:1f:a1:11:8b: ef:93:23:f8:12:15:c1:45:d6:69:99:7e:4b:59:23:0e: 3f:97:88:fc:3c:40:92:9a:fc:eb:96:35:0c:19:98:e5: f7:92:20:36:12:0e:2b:8a:5e:37:66:78:2e:13:8a:e6: 5b:5e:8b:0f:14:d1:53:cb:3f:49:e9:fa:c3:44:90:0a: e2:50:09:b3:37:97:86:d8:fe:eb:f0:1b:76:0e:e8:b4: 6f:e4:c8:38:b4:6b:bb:33:0e:dc:3e:6a:f1:1d:76:ea: ce:7a:67:6c:dd:ea:af:08:84:91:b4:6f:f9:27:bb:8e: fd:1f:cb:ea:fe:11:30:bc:ae:df:73:fa:b3:71:97:20: 04:54:f6:17:9d:b8:d9:74:83:91:82:93:01:7d:6c:1e: 14:7b:f9:5a:0a:0e:65:70:03:24:ae:aa:6c:e4:1d:ee: ff:5a:15:42:b0:f0:ef:8d:0c:1b:37:9d:b4:88:71:cb: b3:0b:07:2d:78:44:52:2c:10:ce:56:07:bb:86:a1:3b Fingerprint (SHA-256): DC:26:35:F5:30:D1:92:08:A0:21:B1:C7:99:F2:2E:F2:FE:5C:07:DF:25:F7:F5:74:31:37:9D:85:53:B1:AD:71 Fingerprint (SHA1): 6B:19:6F:4D:1E:88:30:67:6A:25:D6:18:4C:53:19:AE:07:FC:6F:91 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #11212: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11213: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #11214: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125796 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11215: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #11216: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #11217: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11218: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 510125797 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11219: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11220: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #11221: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11222: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 510125798 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11223: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11224: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #11225: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11226: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 510125799 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11227: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11228: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #11229: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11230: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 510125800 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11231: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11232: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #11233: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11234: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 510125801 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11235: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11236: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #11237: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11238: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 510125802 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11239: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11240: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #11241: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125796 (0x1e67e6e4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:00:51 2017 Not After : Tue May 10 13:00:51 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:e9:fa:f2:07:29:9f:17:ea:bd:b0:be:88:ad:08:5e: ab:88:9d:37:e7:f8:41:1e:42:79:9a:93:97:b8:2b:65: 97:7b:12:47:a0:10:dd:e4:f9:87:3e:26:9c:6b:cd:0a: 37:4f:c4:35:f9:fe:2e:83:60:ff:6f:70:8d:9b:70:5d: 21:2d:fd:1b:b8:0a:25:a6:64:6e:a0:e6:2e:a5:3b:34: 03:2d:b9:29:b5:4b:3e:d6:2a:15:f8:09:35:10:64:41: 16:81:c1:34:a4:9e:ef:4a:96:92:67:d4:4f:cd:16:db: 70:39:09:3d:3e:9c:b5:04:c8:eb:d9:f4:63:3f:d0:f8: 11:20:88:d2:5e:f0:0f:ff:a5:2d:dc:bd:b5:fc:5b:1e: 73:45:b4:aa:88:da:0a:2e:66:90:5c:56:09:d0:da:b7: 48:7b:bf:52:51:e2:6b:1d:ec:9a:b5:1f:cb:5a:1a:3f: a6:ed:20:ad:f9:a3:07:ab:8e:21:e7:b4:16:cf:7b:45: 0d:a6:51:33:83:ff:d3:22:c7:89:c0:7f:f7:35:4d:27: c8:2d:16:b3:52:01:66:d3:65:20:fd:fa:71:f0:d1:84: 6c:77:bb:3b:46:8b:ca:a8:39:92:62:6c:b3:9a:a9:37: e1:66:5d:8a:7b:bc:31:19:e7:94:6f:3c:f1:a3:da:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 44:ca:6b:98:0d:b9:37:2e:3e:8e:2d:d3:ad:f8:bb:9f: 0a:97:f6:cf:d9:cf:33:65:fc:68:35:76:ca:0b:f9:29: 83:dc:69:4f:b6:28:62:2f:20:af:60:09:2d:2b:bf:8a: 73:86:2b:26:39:a2:2c:96:18:a5:55:99:0e:34:7f:81: a4:83:4c:d8:b4:0d:4a:2d:9c:18:62:0e:7d:e9:b2:8d: c4:43:e9:6d:22:0c:89:72:d1:10:a0:b0:1f:02:fc:67: 27:c6:19:c4:8d:fa:28:f5:7e:84:2d:0a:ab:5f:23:23: 09:cf:47:bc:75:94:96:b5:c6:a1:06:d0:ad:e8:56:52: d3:23:1a:05:10:d9:6e:55:56:c8:71:11:43:0f:41:4a: 63:ce:5e:6f:11:a4:29:81:6d:73:a0:01:2a:33:a6:7f: 6e:bd:ef:84:09:10:99:50:f8:3f:d5:ee:44:33:1e:a4: 08:f2:12:c2:e6:04:4d:03:04:12:af:d3:b1:44:03:0d: 4e:72:0e:5f:88:2b:1c:3d:b1:45:90:54:ec:c4:f4:9c: d1:08:bf:b9:09:6c:9b:8c:d9:1c:ef:0e:8d:1c:c0:0e: 1d:97:f1:90:b4:98:4a:c0:84:0c:64:0b:6a:9f:4c:d3: 50:d0:40:27:7d:8e:2c:c4:eb:23:40:60:98:28:61:bc Fingerprint (SHA-256): 44:0A:A8:3E:C0:34:0B:D3:10:37:34:11:53:6E:AC:12:29:81:39:A1:26:C8:C9:52:CA:EB:2F:FC:C4:C9:58:DF Fingerprint (SHA1): AD:82:83:77:AE:86:DE:D1:8B:62:D4:BE:59:47:8E:D7:53:3D:49:DD Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #11242: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11243: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11244: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #11245: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125796 (0x1e67e6e4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:00:51 2017 Not After : Tue May 10 13:00:51 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:e9:fa:f2:07:29:9f:17:ea:bd:b0:be:88:ad:08:5e: ab:88:9d:37:e7:f8:41:1e:42:79:9a:93:97:b8:2b:65: 97:7b:12:47:a0:10:dd:e4:f9:87:3e:26:9c:6b:cd:0a: 37:4f:c4:35:f9:fe:2e:83:60:ff:6f:70:8d:9b:70:5d: 21:2d:fd:1b:b8:0a:25:a6:64:6e:a0:e6:2e:a5:3b:34: 03:2d:b9:29:b5:4b:3e:d6:2a:15:f8:09:35:10:64:41: 16:81:c1:34:a4:9e:ef:4a:96:92:67:d4:4f:cd:16:db: 70:39:09:3d:3e:9c:b5:04:c8:eb:d9:f4:63:3f:d0:f8: 11:20:88:d2:5e:f0:0f:ff:a5:2d:dc:bd:b5:fc:5b:1e: 73:45:b4:aa:88:da:0a:2e:66:90:5c:56:09:d0:da:b7: 48:7b:bf:52:51:e2:6b:1d:ec:9a:b5:1f:cb:5a:1a:3f: a6:ed:20:ad:f9:a3:07:ab:8e:21:e7:b4:16:cf:7b:45: 0d:a6:51:33:83:ff:d3:22:c7:89:c0:7f:f7:35:4d:27: c8:2d:16:b3:52:01:66:d3:65:20:fd:fa:71:f0:d1:84: 6c:77:bb:3b:46:8b:ca:a8:39:92:62:6c:b3:9a:a9:37: e1:66:5d:8a:7b:bc:31:19:e7:94:6f:3c:f1:a3:da:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 44:ca:6b:98:0d:b9:37:2e:3e:8e:2d:d3:ad:f8:bb:9f: 0a:97:f6:cf:d9:cf:33:65:fc:68:35:76:ca:0b:f9:29: 83:dc:69:4f:b6:28:62:2f:20:af:60:09:2d:2b:bf:8a: 73:86:2b:26:39:a2:2c:96:18:a5:55:99:0e:34:7f:81: a4:83:4c:d8:b4:0d:4a:2d:9c:18:62:0e:7d:e9:b2:8d: c4:43:e9:6d:22:0c:89:72:d1:10:a0:b0:1f:02:fc:67: 27:c6:19:c4:8d:fa:28:f5:7e:84:2d:0a:ab:5f:23:23: 09:cf:47:bc:75:94:96:b5:c6:a1:06:d0:ad:e8:56:52: d3:23:1a:05:10:d9:6e:55:56:c8:71:11:43:0f:41:4a: 63:ce:5e:6f:11:a4:29:81:6d:73:a0:01:2a:33:a6:7f: 6e:bd:ef:84:09:10:99:50:f8:3f:d5:ee:44:33:1e:a4: 08:f2:12:c2:e6:04:4d:03:04:12:af:d3:b1:44:03:0d: 4e:72:0e:5f:88:2b:1c:3d:b1:45:90:54:ec:c4:f4:9c: d1:08:bf:b9:09:6c:9b:8c:d9:1c:ef:0e:8d:1c:c0:0e: 1d:97:f1:90:b4:98:4a:c0:84:0c:64:0b:6a:9f:4c:d3: 50:d0:40:27:7d:8e:2c:c4:eb:23:40:60:98:28:61:bc Fingerprint (SHA-256): 44:0A:A8:3E:C0:34:0B:D3:10:37:34:11:53:6E:AC:12:29:81:39:A1:26:C8:C9:52:CA:EB:2F:FC:C4:C9:58:DF Fingerprint (SHA1): AD:82:83:77:AE:86:DE:D1:8B:62:D4:BE:59:47:8E:D7:53:3D:49:DD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #11246: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11247: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11248: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #11249: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125803 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11250: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #11251: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #11252: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11253: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510125804 --extCP --extPM < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #11254: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11255: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #11256: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11257: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510125805 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11258: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11259: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #11260: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11261: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 510125806 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11262: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11263: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #11264: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #11265: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #11266: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #11267: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125803 (0x1e67e6eb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:01:10 2017 Not After : Tue May 10 13:01:10 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:56:49:1d:aa:d9:d7:b9:c6:27:3a:ce:cc:dd:ef:4d: a8:09:43:8c:5e:b5:56:85:02:7e:21:2b:5a:f5:25:70: 6c:cd:3c:64:9e:f4:a8:a4:db:ea:7d:98:41:a9:39:f2: c1:ba:d8:72:eb:8d:66:25:a6:c2:0b:f5:45:cd:89:68: be:40:c1:d5:30:54:8f:a8:06:cf:15:0e:67:b9:c1:a7: a3:8c:d5:db:0b:91:a8:73:42:80:07:3f:f2:df:67:93: da:07:29:65:65:7c:b1:5c:01:df:cd:7c:be:68:83:2c: d6:ec:82:48:89:05:75:08:a5:18:36:ce:5f:30:75:b6: 55:6d:c0:58:f0:7f:0f:75:3f:1f:2f:f2:37:7c:f3:ac: 3a:a3:e9:1e:20:1e:8c:0f:ec:91:a1:86:20:06:14:79: 92:66:b1:69:7b:c1:f8:e0:be:7c:e1:7c:4b:0c:91:1f: 57:92:09:5e:43:6c:56:27:69:df:be:5f:03:b1:8f:8c: 21:13:fb:ec:7d:c9:24:3d:3c:30:a0:2d:b7:a2:de:c0: 9e:63:00:df:aa:5b:de:0e:f4:69:6f:14:36:5e:91:f6: 29:0d:6e:c9:62:42:42:0c:25:2e:5f:a5:e6:9c:04:74: 23:f4:e1:2d:5c:f3:fd:4a:cf:97:55:c5:4a:4e:16:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:a1:28:8b:e7:81:12:36:9d:8f:a9:8d:c4:86:d8:75: 84:ed:71:de:3a:c5:85:ba:62:48:e6:49:2b:59:05:ab: 9d:cc:49:07:36:41:b1:17:26:6c:7f:5d:26:77:b7:fc: 4e:66:85:d4:fb:7f:f7:eb:fc:7d:9f:5a:1b:81:4a:56: ab:ba:9f:5c:fb:1b:f9:ed:0e:6d:92:76:df:d5:a2:5c: 45:d3:63:ab:fb:ca:16:d3:3a:06:41:23:57:b6:e9:eb: bd:d9:38:b5:bf:ec:df:cf:7e:70:8a:47:ff:e7:4c:08: cf:31:0e:9e:de:f2:0d:19:1c:fb:e5:01:5f:60:e8:96: aa:90:2a:94:c3:24:9d:9a:fb:a8:6f:1c:af:b3:f1:dc: c2:5f:72:c8:61:cf:c3:6f:3c:6a:70:6d:ce:c1:4b:0e: d5:99:00:e5:81:80:bb:c5:9a:41:9e:d6:fe:66:8d:3d: 1b:1c:59:d8:2e:aa:e0:6d:9d:27:64:cf:7c:1b:bf:73: e8:7d:2b:5f:43:ef:33:cd:c1:08:68:56:bf:39:21:c3: 5e:99:31:c7:a7:c6:3e:2a:bd:39:2b:5c:96:25:2b:e5: 7b:44:41:44:5a:40:a4:d9:10:80:5e:d7:a3:f9:a3:51: 78:94:7c:07:4b:aa:13:0e:83:a6:fe:d0:49:df:ea:57 Fingerprint (SHA-256): 29:15:CE:7B:31:E3:60:56:4F:C4:08:55:8A:3F:58:27:DD:1B:D5:D6:08:8A:4F:F7:91:87:6F:17:09:8D:78:29 Fingerprint (SHA1): D0:71:E3:18:2C:11:1C:EC:0A:09:77:FC:82:50:DD:F6:AB:32:03:1C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11268: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11269: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11270: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125804 (0x1e67e6ec) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:01:12 2017 Not After : Tue May 10 13:01:12 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:cc:de:d2:28:f1:62:b7:c2:8d:71:5a:08:99:88:d4: d0:59:2c:27:1a:5f:e8:22:8b:91:5e:33:ca:4a:dd:10: 7c:6d:26:fe:80:4a:2c:e5:48:b0:b9:8b:35:c3:25:41: d5:b2:04:8d:06:e4:6a:db:2b:3c:d6:76:85:94:f7:f6: 84:da:d2:a3:ba:5e:53:c3:e5:87:53:30:c9:e4:e4:a5: 98:36:08:2a:09:02:45:ad:f6:cd:05:ba:e2:9f:79:ff: 10:b8:43:aa:46:8c:8a:36:39:fe:ea:91:0c:35:77:f1: 12:c5:8c:e5:7b:11:86:a2:b7:b4:23:fa:65:ea:e2:68: 96:d9:a7:97:e0:b9:77:25:29:8f:3b:49:9f:cf:f2:f0: ac:1c:16:50:51:12:4f:12:08:9a:e8:56:a6:8a:44:3d: 75:0e:4c:8b:b1:ab:b5:95:0e:00:bc:76:dd:33:c7:b6: 32:92:f9:6f:a3:0c:40:30:b8:06:2a:b8:d2:34:1a:66: 91:10:62:f8:4c:fe:de:a0:ae:eb:9e:8f:40:af:1f:3c: 70:29:62:2d:38:3c:5d:da:5a:25:1c:2b:c8:ba:e7:7a: 01:28:1a:4c:f9:22:da:ea:57:e6:2f:26:f1:b6:12:f0: d4:e1:0f:55:00:39:86:d8:59:e2:50:43:1d:23:50:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:d5:e8:e7:02:7b:f0:6d:fb:54:94:a8:04:24:bd:0a: e0:63:50:9d:a0:cc:a7:2f:20:13:5d:77:e8:9d:f9:ee: 57:13:a9:19:e3:28:2d:14:b9:4a:55:85:cb:ea:aa:ef: 35:d4:e5:d2:9c:26:a9:90:62:6f:22:f6:df:a4:bb:f5: f3:7b:e5:b3:f0:88:59:8d:76:4a:c0:91:8f:a2:07:05: bb:87:e4:82:35:c6:7a:5b:70:0d:af:10:61:1c:d5:ac: 5f:e0:e3:e3:fe:a9:d1:d3:23:5d:54:58:f3:21:39:ef: 1e:ea:7e:46:79:37:b7:23:00:96:ab:c3:8f:dc:46:23: 4a:c6:be:d0:ea:43:65:0f:4f:9e:e9:57:9d:da:5c:5f: e3:af:c0:28:fe:77:69:85:8b:1f:35:64:36:c3:cb:47: 2b:1e:bc:d8:88:f7:55:96:1d:9f:7f:fb:61:0b:71:3a: de:d5:ad:74:f5:e0:ba:05:1c:0e:80:0c:dc:5f:91:8d: 15:23:3e:8f:e1:92:f7:8a:14:87:f2:76:45:53:b8:0f: 90:0e:c2:c5:3b:85:61:64:08:36:87:f3:a7:aa:54:7a: 61:29:71:79:69:72:58:75:80:d0:5a:ce:a0:b1:b0:c3: d3:5a:67:18:79:8c:a9:77:a0:f0:3a:53:3f:c8:fd:88 Fingerprint (SHA-256): 43:BD:21:AC:96:5A:4C:7F:CC:5B:D6:32:D3:7C:3D:80:89:0E:61:61:EA:E5:D7:68:83:87:D3:53:0E:D6:4D:7A Fingerprint (SHA1): 21:A6:F2:83:99:CE:0A:E1:AC:BF:BB:00:53:6C:EB:0F:16:E7:F5:51 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #11271: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11272: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125805 (0x1e67e6ed) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 13:01:14 2017 Not After : Tue May 10 13:01:14 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:1c:3f:8f:31:6a:b0:59:f6:97:ee:dd:61:d5:c1:f2: fe:7e:29:5b:a3:f6:e2:8c:b6:87:15:ec:f3:2d:3b:9e: b3:ca:00:8f:90:41:47:b0:0c:5b:45:fa:81:86:3d:80: 7c:7c:a3:06:6f:2f:02:d3:50:9e:63:15:b1:92:f0:5b: 62:8a:d1:b1:92:b3:28:87:ae:1b:3d:b5:13:30:01:53: b6:59:11:41:6b:bd:46:a7:5f:9d:2d:f4:09:0a:0c:e5: 09:df:bc:88:7d:a5:6a:f2:9c:9a:96:18:02:ae:96:f5: 42:a3:d1:91:65:9b:f6:e6:98:9e:e9:70:ad:ea:39:bf: dc:d2:8c:8a:c9:4a:db:b1:de:b9:76:2e:ae:36:8b:92: 9f:d2:c6:e9:fd:1b:23:ac:ed:58:88:d8:10:60:a1:06: 57:51:0e:fd:0b:85:89:48:e1:81:70:c9:20:dc:b4:db: e9:b7:bb:ae:f8:8c:41:94:3c:e1:d7:21:a7:11:a4:3c: ca:7b:0f:47:50:82:ee:f9:ce:41:a0:27:75:13:19:8a: aa:cc:31:9d:48:31:74:1f:fa:18:6d:c0:67:f5:91:0d: 12:a4:c0:38:4d:fe:49:db:5b:a0:40:da:6e:f6:4b:ff: 9f:69:12:cb:56:f9:7e:72:db:fb:d9:97:b1:3c:cb:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:d9:2b:d9:e8:8f:e6:5d:b9:5b:0e:d7:50:63:30:20: 0c:59:81:32:9c:6f:db:a3:b4:01:b0:10:23:9a:c0:a4: db:46:d8:94:d7:f0:97:0b:d2:15:f4:3f:bb:d3:9a:9b: 69:7d:36:0b:5d:4d:fc:c8:ff:c7:cd:4a:a7:b8:fc:f4: 04:55:96:24:8b:e8:9a:8e:17:58:ba:f1:f5:96:2e:24: 2b:c5:26:c0:b3:19:88:9f:dc:e1:b5:9b:14:00:e5:7d: bf:22:cc:22:54:14:a8:c3:6d:20:06:6f:04:d4:f1:f4: 25:82:cc:16:78:d5:70:06:da:dd:1c:5d:1e:f7:a6:0e: 0b:8a:98:2d:be:e3:77:8a:ae:11:9a:2b:31:7f:4a:6a: 41:99:15:ac:c7:5c:30:d7:5d:c1:dd:a3:7d:6b:9b:cc: b6:1a:05:59:41:ba:f7:9d:d9:76:ed:af:ac:de:ca:bb: e0:f3:5a:f3:94:63:bc:54:d4:d6:a1:af:cc:be:1d:a0: f3:f3:09:36:a0:25:a1:4d:d0:0b:26:61:a2:7b:cf:92: d1:24:cf:f3:8c:8e:90:9c:92:4b:eb:d2:75:6f:9d:2d: 08:3a:0b:c0:a6:a0:b7:c8:8e:4b:34:41:8e:94:b6:14: 76:dd:48:01:8e:7e:1f:73:36:5c:52:58:bd:b9:f2:de Fingerprint (SHA-256): 44:12:A2:41:92:CA:9E:F5:85:3E:63:9E:2C:72:50:A9:38:0C:0D:8A:7D:A9:E6:74:CF:7A:FD:C4:7C:C6:39:11 Fingerprint (SHA1): 90:C6:28:59:6B:22:E4:C8:33:35:C4:78:A0:86:22:FB:84:4E:69:B3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #11273: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #11274: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125807 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11275: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #11276: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #11277: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11278: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510125808 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11279: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11280: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #11281: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11282: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510125809 --extCP --extPM < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #11283: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11284: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #11285: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11286: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 510125810 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11287: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11288: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #11289: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11290: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 510125811 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11291: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11292: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #11293: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #11294: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #11295: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #11296: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #11297: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125807 (0x1e67e6ef) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:01:21 2017 Not After : Tue May 10 13:01:21 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:e2:4f:60:e1:16:ef:3f:4e:75:42:d3:6f:c0:6a:7b: 77:20:c0:24:c2:1f:11:ba:f7:d8:a0:53:22:e1:d9:8e: 94:ad:db:2b:0d:45:5c:a6:5e:34:b9:2f:2e:ad:c5:9d: 7e:ca:3e:ea:ed:c4:85:05:3e:f2:f1:e8:ad:ca:4f:8a: 46:83:79:7d:11:4c:63:4a:81:c6:e2:f8:3d:04:41:0f: e9:f0:5e:39:0f:6c:da:7a:25:7a:70:b1:93:07:33:1d: ba:9a:70:c2:95:88:14:40:b9:11:b1:f3:9f:66:35:02: 34:7a:97:53:76:7a:63:c9:9d:d1:cc:e3:20:dc:72:77: f7:e4:92:17:55:d6:fe:d2:01:97:45:54:c5:79:cb:0e: 97:a0:08:b7:63:b3:da:3e:b0:79:cb:c1:33:6e:6b:98: ed:30:21:76:01:08:5c:be:54:64:56:cc:29:69:39:77: a6:f4:c0:3c:3c:9e:e9:f7:ef:6b:c1:f0:62:53:62:2a: 09:aa:53:49:01:99:5c:cf:49:a2:76:ed:44:a3:6d:69: c2:59:6b:96:35:96:5a:c5:f0:a4:31:5d:2e:0b:6a:e1: f3:6e:1d:a5:97:36:7f:93:a2:ed:60:67:b2:64:1c:d5: d2:53:54:01:54:f0:b5:be:e9:23:84:e7:e3:0d:42:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:10:be:1e:fe:3c:39:da:ff:2f:df:66:56:ff:3c:9d: 4e:6d:05:a4:ff:83:28:7c:0b:20:88:f1:88:cb:ba:f1: 9f:99:3d:50:5d:c0:a2:d9:2d:f9:a7:40:c6:84:cc:bc: 19:b0:56:1a:9a:99:22:42:cc:10:e6:f8:ea:ca:f5:3a: 07:df:e8:8e:00:6d:ed:5e:14:76:48:fc:63:a3:54:5c: e2:88:c3:e4:cc:da:4b:fd:34:26:a7:37:ba:e0:83:9d: 7c:f1:59:17:a5:f4:bd:cf:ad:e5:6c:93:1b:02:30:e6: 85:89:68:8d:f9:fa:43:4c:e6:79:20:8b:b4:d0:c6:84: 9d:62:e5:1b:46:85:55:1d:46:7e:49:d3:c3:9d:21:2e: a2:01:e0:2f:df:5a:4f:c3:95:c5:d5:62:ad:52:50:cc: 0f:b9:9b:50:f9:61:fd:80:b8:89:51:6d:6b:26:6a:cf: 64:7d:b4:6d:31:b1:08:69:36:b9:40:a8:a1:ff:99:bb: 9d:40:18:1b:8d:c9:84:b5:cf:43:b0:9b:c4:8b:c8:c6: 25:c2:ba:0d:ee:1d:c3:3e:02:5e:c4:33:c4:f0:88:39: 02:de:d0:39:2c:5e:85:a8:04:6f:86:2e:8d:0b:e4:f1: 9f:b9:4a:79:04:d9:59:20:cd:16:0d:0a:39:98:c3:bf Fingerprint (SHA-256): 30:1E:A0:83:03:84:B3:36:2A:9B:EE:00:21:48:06:9D:68:0A:E8:22:BF:AF:E9:D7:5F:6B:A7:83:3B:6A:A5:42 Fingerprint (SHA1): 14:33:D9:AA:BE:47:34:0F:B8:06:6F:45:02:73:C3:16:CA:E3:FD:01 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11298: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11299: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125808 (0x1e67e6f0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:01:23 2017 Not After : Tue May 10 13:01:23 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:6b:20:98:cb:e2:83:22:43:d6:8b:88:aa:d4:c2:57: 65:72:69:2b:dd:4b:34:d7:c7:cb:c8:55:67:54:b9:ae: e4:7a:4c:e7:ea:3a:80:7f:c9:ad:aa:4b:96:b4:b5:66: 95:07:96:89:3e:03:b6:45:c9:60:ee:96:a3:cb:f6:7a: d6:7a:28:60:14:8e:5a:97:58:38:42:86:09:28:ab:b2: 1e:fa:d4:6c:55:c5:10:3b:5c:2a:b4:0d:34:50:2d:07: e6:f3:15:e0:8c:cb:ac:b0:15:83:aa:93:c4:4a:5b:d8: fe:75:fd:d8:52:bb:88:98:12:c4:ea:46:b9:23:b0:1c: 49:a9:55:6a:02:b5:54:bb:5e:7a:af:75:3e:e4:40:1d: 73:b4:a2:77:84:df:ee:9b:96:42:46:17:34:2b:2e:63: 8a:1e:99:6b:e8:cb:f7:09:72:27:db:0e:36:a9:10:bf: 82:24:b0:4e:51:5f:b0:d7:5d:90:4f:1b:bd:6f:74:02: 5a:1d:76:79:11:c4:ca:69:3f:b2:c0:d3:57:b3:b4:ed: 9e:e8:9a:f8:62:26:9b:41:02:f3:d2:f0:c3:98:c9:47: 9e:41:17:cf:1d:13:3e:99:14:4e:0a:0c:54:35:d7:8b: da:1b:57:9c:8c:ca:33:d8:01:52:0e:9f:f7:70:22:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 05:32:49:4e:84:94:56:da:8f:6a:40:d1:58:7b:11:16: dd:e2:7f:72:bf:81:25:a8:96:3e:87:70:9f:87:33:e9: 73:6b:3b:62:a0:76:8d:ac:01:ef:cb:b7:71:5f:09:3f: 67:01:84:80:bb:ca:69:42:77:2f:a9:f9:df:36:0b:20: 1b:5b:20:cf:7d:36:41:c5:62:42:c3:d6:da:9b:94:c1: c5:ce:99:f9:ee:10:25:9e:b5:21:07:92:e2:65:02:3d: 90:85:f4:a3:da:25:8f:ac:ad:6e:b4:c7:67:b1:f7:5f: eb:b0:39:8d:f4:63:33:c9:fb:0f:94:2e:57:08:99:bb: 41:44:c3:fe:85:ed:bb:51:77:60:0c:be:a2:ee:78:af: af:8f:a3:bf:34:55:08:ae:60:4c:ae:48:e6:21:32:f9: 99:0f:98:c0:cc:26:80:8e:88:c7:8e:4d:0f:26:78:09: f9:7c:aa:cf:e3:29:d9:4f:39:0f:af:ab:d2:5d:09:a7: ed:a6:c6:d8:11:79:d3:ae:2e:5b:49:18:ce:66:ee:92: 1e:ba:b7:dc:d3:d1:e5:c7:d5:02:ec:f5:72:54:58:a6: c1:7d:10:3f:e5:df:12:96:a4:1a:9a:26:9a:33:e0:bd: 02:b2:48:c4:e8:40:9a:0b:db:ea:6d:c7:ee:35:e0:a0 Fingerprint (SHA-256): 1C:56:74:ED:9B:25:D1:84:F4:37:91:FF:32:5A:F1:84:74:8C:F3:8E:CD:B0:61:EE:DF:80:3E:A8:F2:ED:E0:B7 Fingerprint (SHA1): A8:D6:ED:7C:C3:36:06:77:B1:79:B8:7D:4E:80:54:2B:18:E2:07:3F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #11300: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11301: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11302: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125809 (0x1e67e6f1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 13:01:25 2017 Not After : Tue May 10 13:01:25 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:d5:0d:59:58:5d:42:91:ec:d5:68:30:f5:86:8d:48: d1:a8:e4:c6:df:96:3c:78:a9:55:f6:4a:ca:66:a5:24: d8:22:81:2c:bc:7e:f9:c6:91:96:6f:89:09:fd:79:bd: 39:8d:cb:0c:17:fc:0a:37:93:ec:cf:13:5f:be:58:10: 0c:e9:77:7e:18:21:89:2d:7a:e4:b1:49:c1:96:02:ef: b2:0f:bc:a5:c4:6a:8c:99:bf:f5:db:5a:dc:7e:aa:0e: 04:ee:aa:35:c2:bf:88:8d:08:d1:8d:ef:4b:0a:15:2d: 55:84:bb:b8:59:c6:da:04:68:46:ac:14:78:2c:73:99: 3d:4b:1b:fc:64:b0:28:93:d6:c7:e4:16:f1:88:38:f5: c6:e1:3b:db:a9:e9:a8:79:a2:ab:70:d7:b1:64:29:dc: 89:23:73:b6:cc:45:c2:cf:e4:36:da:81:ef:ae:9e:e8: 29:3e:87:6c:d4:3f:c7:f0:93:5c:9c:76:14:d2:b6:e7: 02:91:f6:f7:48:ba:18:8e:49:e0:2a:71:e4:e4:34:2e: c5:b7:5c:5c:c6:6b:83:d4:91:82:59:00:20:f9:00:c3: 0a:c4:c6:73:7e:6d:21:95:4d:31:d8:d0:cd:ad:5b:d1: 2b:b1:cd:36:c4:a3:b8:d6:8c:01:c8:fe:ad:8f:a6:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:bf:d1:7c:37:81:cc:8d:d3:65:57:1c:b1:9e:04:b5: 8b:fa:06:4d:5c:46:28:66:a4:c6:e9:30:4d:26:79:f7: b6:3b:f3:68:45:6e:39:99:c2:21:af:d8:b4:c7:9a:a6: 95:45:05:2b:14:e1:a2:fa:cd:53:6e:bc:d8:5e:80:90: 86:40:b2:20:3d:0a:aa:40:0e:09:1a:0d:9d:2f:43:94: 42:01:34:25:a0:da:1c:10:80:ed:36:85:bd:d2:08:a5: 37:20:71:f5:e9:b8:34:7d:03:a6:7f:fc:8b:b2:de:14: 05:62:dd:55:db:86:99:09:eb:06:e5:e6:3b:f2:44:2e: 1f:fa:9a:4d:28:ee:7a:c6:0e:ab:8e:e5:af:a8:bc:6e: 43:9f:a5:a0:01:f6:9e:c9:7a:8b:9a:7f:4e:af:1a:98: 51:69:c9:e8:cc:ed:25:68:60:34:e3:5f:e3:5e:4a:ad: 56:d6:20:fc:12:3f:19:21:ad:fa:ce:f3:9a:5d:6f:4f: 07:a5:ae:d4:ad:02:36:0e:4d:8d:01:70:3c:8c:22:5b: 46:53:e1:ac:a3:59:95:fc:66:3d:d7:e7:a8:06:71:41: 57:6c:0e:bf:75:e1:22:17:48:32:e8:6e:2e:b5:39:c0: 99:30:25:b9:d3:f4:34:d1:f9:d4:e3:4a:b7:a2:0b:3b Fingerprint (SHA-256): CE:59:97:7C:A9:B4:88:11:B6:F1:FD:14:65:18:E6:C3:06:1E:A5:83:72:BB:94:8A:D9:68:08:4E:A5:12:1A:9D Fingerprint (SHA1): 3D:FD:41:F4:08:0B:6D:44:FC:97:47:97:7C:44:1F:FD:9E:5C:75:E1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #11303: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #11304: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125812 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11305: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #11306: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #11307: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11308: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510125813 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11309: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11310: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #11311: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11312: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510125814 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA1Root-510125721.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #11313: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11314: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #11315: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11316: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 510125815 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11317: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11318: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #11319: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125812 (0x1e67e6f4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:01:33 2017 Not After : Tue May 10 13:01:33 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:4e:fb:30:13:24:cc:da:b7:6d:e4:75:d1:94:0a:53: 42:76:43:ae:3a:e3:9e:10:ca:34:ae:a6:70:11:09:1d: 04:ac:a9:ea:a9:9f:90:26:29:2e:c0:42:c7:71:68:42: fd:03:64:68:3d:b0:65:1c:7a:39:4f:9b:a7:17:3b:52: f3:94:22:cf:aa:fb:ce:6f:dd:00:78:09:49:fb:a2:c7: d9:d7:f3:b1:a4:3d:a1:cd:11:ac:a2:ed:71:f4:fa:1d: ef:30:41:08:f4:ca:51:4c:00:70:85:21:87:a2:9e:10: b3:61:d6:bf:61:cb:b9:9b:03:88:fa:2a:51:c0:33:9a: 3e:e8:65:47:55:42:47:58:1e:8d:18:9f:4c:04:52:4c: 94:ac:2f:01:8f:78:f4:22:0c:7d:0a:e2:31:09:8a:86: 8b:98:cc:65:f5:f5:c5:1a:dd:81:05:2f:db:5a:14:ab: 14:ca:ff:35:c0:ff:23:e9:da:f1:96:32:27:fa:cc:5c: 79:d4:69:51:80:af:6b:de:7d:9f:45:30:d4:63:c7:f4: b5:56:c6:8f:63:4d:9d:a0:dc:1a:b2:ac:61:07:4c:8c: 5e:3a:02:76:42:05:3e:8c:06:2f:57:f2:cb:f1:f7:1a: 6f:93:f4:7e:63:d1:63:70:91:2d:65:61:57:99:4f:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:ee:bb:ac:54:7f:20:24:59:a8:dc:62:34:f6:46:12: 74:36:8f:b6:57:44:f2:72:fd:a2:a1:64:6d:d6:37:62: a1:0d:45:3e:fa:70:58:c7:47:cb:ab:e1:fd:e9:bc:fa: 2a:f1:03:59:ba:a7:e1:78:b9:21:a9:4e:6e:5a:3a:ad: d9:99:c4:24:37:f5:f1:da:1c:9c:ee:d9:3d:44:b3:a7: bd:a3:d7:e3:f1:1c:03:89:cd:e8:5e:5d:8a:6e:b6:17: a8:f2:c9:6b:8b:80:aa:54:01:93:4e:57:44:ee:86:82: 23:4e:75:1c:c3:89:45:d8:66:24:8e:21:ba:0f:bf:a6: 16:ab:e3:99:19:a6:48:28:fe:f6:3e:97:c7:41:67:3b: 4e:9a:7e:a1:e6:b0:34:45:69:60:fc:68:e6:7d:ce:94: 43:d2:a5:46:3f:45:b3:68:3f:c9:9f:1b:38:cf:15:74: d6:25:87:e2:75:31:3c:cd:9d:9b:4c:93:52:e6:9c:99: 81:5a:86:41:46:96:03:47:be:19:e3:93:b7:5c:5e:e8: 7a:58:bb:e8:30:f7:38:b6:cf:ed:1e:46:e9:b5:12:7f: c7:b6:34:2a:da:28:fc:91:dd:62:e4:76:ee:ad:51:74: eb:8f:18:c7:5b:80:94:2c:7b:9a:a4:3f:77:b5:0b:83 Fingerprint (SHA-256): 8E:00:4C:4D:39:4A:DF:60:05:AC:01:0B:00:DD:4F:79:F3:13:D3:2A:D4:99:31:6F:53:6F:6C:B1:C0:D9:6B:EC Fingerprint (SHA1): 26:A5:5F:4A:54:23:44:74:B0:40:7A:EE:F7:8A:34:81:3A:59:34:1A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11320: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #11321: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125816 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11322: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #11323: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #11324: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125817 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11325: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #11326: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #11327: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11328: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 510125818 -7 Bridge@Army < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11329: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11330: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 510125819 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11331: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11332: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #11333: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #11334: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11335: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 510125820 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-Bridge-510125722.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #11336: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11337: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #11338: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11339: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510125821 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11340: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11341: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #11342: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125816 (0x1e67e6f8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 13:01:41 2017 Not After : Tue May 10 13:01:41 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:a4:4b:a2:77:12:89:9e:d5:e1:1b:59:fa:83:c5:a0: 41:fd:c2:70:04:1c:bf:52:ef:33:2b:e9:43:df:70:87: 37:62:7b:4c:3b:e8:52:85:1b:06:68:e5:5a:0d:35:c4: d9:ff:99:4b:fb:56:e6:b2:36:ec:2c:19:35:49:11:d4: 35:63:0f:ab:fe:ea:a7:14:fb:f6:a8:ad:6f:2c:c7:91: 79:fc:11:4e:2d:c2:68:0a:e4:1d:d3:77:cf:a8:95:80: b1:57:9d:f6:25:d3:95:75:36:74:26:8c:c4:3c:81:24: cb:2e:6b:f3:af:3a:8a:06:79:98:a5:21:1b:43:6b:ff: 82:41:7b:87:ac:d0:6a:49:09:f5:be:42:e0:92:4d:02: f0:f4:b7:f1:8a:9a:33:46:0c:ad:36:bb:8c:6e:4c:bb: da:5b:ad:b1:88:c9:7d:8a:45:82:38:51:34:31:3b:4c: df:5a:43:85:fd:6e:da:04:e9:88:1a:33:2b:7f:7d:ce: f7:18:91:fa:fd:85:11:07:ee:79:d3:dd:06:da:fd:c2: 7f:6b:e6:99:09:46:81:29:94:a1:a9:8c:12:50:3e:9a: 95:2f:85:07:1b:99:fc:dc:51:2a:da:70:9c:01:9e:fa: b1:0c:46:b2:71:87:4a:56:c1:02:74:83:8b:11:ec:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:97:f3:c4:5b:10:60:21:c3:02:49:cc:0e:02:93:5a: 66:64:c5:fb:78:93:a8:d6:c6:63:3c:f0:05:fb:fa:fe: 13:1a:c5:9f:d5:ec:15:3b:60:6b:a0:b9:98:3a:36:3d: f5:52:96:a8:3b:3c:43:0a:81:80:0a:bd:67:4c:d8:42: a8:f8:84:9a:10:5f:e9:53:10:40:23:40:43:75:0c:b1: 19:35:36:ea:ad:d8:ce:15:5b:6a:7b:bf:7c:e0:7e:75: 06:73:66:da:e3:78:45:b6:d6:52:52:53:36:71:02:9d: ba:12:d5:26:c6:a6:0b:6a:09:86:39:a3:82:96:54:56: 30:70:1d:c9:01:35:dd:44:af:93:55:98:96:73:10:fd: 95:6d:48:e3:1e:cc:41:77:e4:ef:b1:e8:31:a1:f2:da: 6b:6a:16:81:d5:03:a9:6c:fa:3b:78:e9:43:d0:5f:b6: b2:fd:e3:f8:0d:bd:08:b5:bc:22:71:d0:a3:15:a8:40: 94:4f:83:67:4a:ee:db:0e:84:ee:84:a4:15:39:56:a5: e3:02:59:39:76:d2:10:64:88:74:b3:40:36:f8:cd:03: 8d:85:9b:da:d6:42:76:a7:22:6a:ac:02:4f:41:22:1b: 0f:8b:8d:04:1a:18:fa:fb:ec:29:9c:69:0e:40:b5:fd Fingerprint (SHA-256): 5E:A0:2D:F5:0D:55:6E:B4:C0:1E:33:C7:41:34:91:4F:08:E9:89:D0:1C:9B:39:BA:6D:9A:6F:8D:89:4E:2E:FC Fingerprint (SHA1): 03:6C:04:92:A9:F1:41:03:31:0A:90:DA:5B:1E:49:08:59:B4:6B:82 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #11343: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125817 (0x1e67e6f9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 13:01:43 2017 Not After : Tue May 10 13:01:43 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:ca:4d:09:d8:62:05:4b:27:7b:52:43:5f:ca:28:28: 27:12:db:57:6a:79:bc:66:eb:23:ae:6d:a7:1c:68:7d: d0:11:01:d3:af:2b:96:b0:76:0c:83:52:c2:12:be:82: 74:85:56:57:4c:79:a1:03:84:31:c9:5f:96:00:e4:86: 10:9e:66:3e:8c:24:0c:bf:e6:f8:d8:2a:03:55:12:e2: 30:e9:f8:90:ad:27:5f:0c:96:5e:03:e5:89:50:d9:09: e7:55:72:aa:be:38:54:fb:69:18:42:71:e3:46:4d:55: e8:c7:a8:cc:59:c4:ca:e6:2d:6c:61:fd:b8:ff:77:e1: 95:a1:bc:16:72:ad:81:a9:64:2b:75:e8:ee:03:7b:1c: 59:e6:5e:f5:3f:61:e9:29:bf:26:6e:0c:92:80:92:96: c4:e5:5d:69:73:10:28:e0:df:69:d8:ff:f6:09:63:18: ef:a4:46:4e:dc:9a:19:bc:39:66:de:37:6f:bd:62:b3: df:1d:58:3d:ca:9e:f6:02:97:39:a5:62:e7:97:04:de: 06:27:6a:fb:a7:43:33:24:48:28:c2:cf:19:ee:5b:a0: 66:93:13:9c:0e:13:11:8a:c7:fa:9a:80:a2:52:d3:6f: 9d:77:dd:fd:2a:dc:e1:2b:29:de:7e:26:49:ca:82:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bc:dd:0f:2b:e3:83:92:14:9d:02:88:ba:93:51:c2:7b: 7b:76:17:ed:9a:52:98:de:86:d7:67:79:bb:0c:62:69: 34:b3:c4:51:c8:fa:19:52:9b:b1:ca:b1:44:c8:6f:6b: f6:e6:b6:93:9f:66:7b:16:eb:82:90:43:d9:82:97:1e: 3a:9f:c0:84:8b:8c:4e:80:f1:30:9e:76:17:23:a9:47: 97:80:99:43:6d:7d:d4:09:ec:95:5b:1e:f5:a0:a6:9d: 6b:3a:54:7e:28:ca:1e:3d:cb:d0:e7:82:dc:51:14:e5: 19:95:54:7c:48:f0:d6:40:9e:bc:22:af:62:68:93:e2: 55:53:44:1b:e1:68:18:9b:14:63:a3:f3:6a:74:fc:7b: 21:ba:e0:45:b5:c0:61:bc:37:e8:b4:b3:f2:d6:13:21: 8a:37:85:1a:a4:00:62:d5:78:6a:eb:7c:eb:48:c3:0a: c7:b5:a9:5c:66:85:42:77:5e:75:23:04:71:5d:f7:0f: e2:00:64:d4:0e:ce:6d:f2:04:7c:3c:c3:7c:c6:21:18: 58:38:00:68:00:f9:5d:41:4c:dd:26:47:21:d7:92:b4: 3e:26:12:b9:53:ae:55:b5:3e:92:0b:90:c5:33:ea:46: dc:c3:bf:cc:2a:aa:71:4f:d7:0a:44:46:6f:3b:7b:eb Fingerprint (SHA-256): 22:0B:EC:48:AC:82:20:D7:BC:99:6B:52:1D:A7:E3:8A:E0:22:50:10:D5:27:F1:E1:7B:C4:23:19:8B:75:41:6C Fingerprint (SHA1): 10:55:C7:B4:61:35:00:9E:1C:EB:E1:7B:E8:06:DD:F6:DD:2F:1F:7E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #11344: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125817 (0x1e67e6f9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 13:01:43 2017 Not After : Tue May 10 13:01:43 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:ca:4d:09:d8:62:05:4b:27:7b:52:43:5f:ca:28:28: 27:12:db:57:6a:79:bc:66:eb:23:ae:6d:a7:1c:68:7d: d0:11:01:d3:af:2b:96:b0:76:0c:83:52:c2:12:be:82: 74:85:56:57:4c:79:a1:03:84:31:c9:5f:96:00:e4:86: 10:9e:66:3e:8c:24:0c:bf:e6:f8:d8:2a:03:55:12:e2: 30:e9:f8:90:ad:27:5f:0c:96:5e:03:e5:89:50:d9:09: e7:55:72:aa:be:38:54:fb:69:18:42:71:e3:46:4d:55: e8:c7:a8:cc:59:c4:ca:e6:2d:6c:61:fd:b8:ff:77:e1: 95:a1:bc:16:72:ad:81:a9:64:2b:75:e8:ee:03:7b:1c: 59:e6:5e:f5:3f:61:e9:29:bf:26:6e:0c:92:80:92:96: c4:e5:5d:69:73:10:28:e0:df:69:d8:ff:f6:09:63:18: ef:a4:46:4e:dc:9a:19:bc:39:66:de:37:6f:bd:62:b3: df:1d:58:3d:ca:9e:f6:02:97:39:a5:62:e7:97:04:de: 06:27:6a:fb:a7:43:33:24:48:28:c2:cf:19:ee:5b:a0: 66:93:13:9c:0e:13:11:8a:c7:fa:9a:80:a2:52:d3:6f: 9d:77:dd:fd:2a:dc:e1:2b:29:de:7e:26:49:ca:82:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bc:dd:0f:2b:e3:83:92:14:9d:02:88:ba:93:51:c2:7b: 7b:76:17:ed:9a:52:98:de:86:d7:67:79:bb:0c:62:69: 34:b3:c4:51:c8:fa:19:52:9b:b1:ca:b1:44:c8:6f:6b: f6:e6:b6:93:9f:66:7b:16:eb:82:90:43:d9:82:97:1e: 3a:9f:c0:84:8b:8c:4e:80:f1:30:9e:76:17:23:a9:47: 97:80:99:43:6d:7d:d4:09:ec:95:5b:1e:f5:a0:a6:9d: 6b:3a:54:7e:28:ca:1e:3d:cb:d0:e7:82:dc:51:14:e5: 19:95:54:7c:48:f0:d6:40:9e:bc:22:af:62:68:93:e2: 55:53:44:1b:e1:68:18:9b:14:63:a3:f3:6a:74:fc:7b: 21:ba:e0:45:b5:c0:61:bc:37:e8:b4:b3:f2:d6:13:21: 8a:37:85:1a:a4:00:62:d5:78:6a:eb:7c:eb:48:c3:0a: c7:b5:a9:5c:66:85:42:77:5e:75:23:04:71:5d:f7:0f: e2:00:64:d4:0e:ce:6d:f2:04:7c:3c:c3:7c:c6:21:18: 58:38:00:68:00:f9:5d:41:4c:dd:26:47:21:d7:92:b4: 3e:26:12:b9:53:ae:55:b5:3e:92:0b:90:c5:33:ea:46: dc:c3:bf:cc:2a:aa:71:4f:d7:0a:44:46:6f:3b:7b:eb Fingerprint (SHA-256): 22:0B:EC:48:AC:82:20:D7:BC:99:6B:52:1D:A7:E3:8A:E0:22:50:10:D5:27:F1:E1:7B:C4:23:19:8B:75:41:6C Fingerprint (SHA1): 10:55:C7:B4:61:35:00:9E:1C:EB:E1:7B:E8:06:DD:F6:DD:2F:1F:7E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #11345: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #11346: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125822 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11347: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #11348: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #11349: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125823 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11350: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #11351: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #11352: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11353: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 510125824 -7 Bridge@Army < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11354: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11355: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 510125825 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11356: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11357: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #11358: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #11359: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11360: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 510125826 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-Bridge-510125723.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #11361: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11362: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #11363: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11364: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510125827 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11365: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11366: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #11367: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11368: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 510125828 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-BridgeNavy-510125724.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #11369: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11370: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #11371: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11372: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 510125829 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11373: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11374: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #11375: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125822 (0x1e67e6fe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 13:01:51 2017 Not After : Tue May 10 13:01:51 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:c2:b3:72:de:bc:71:99:14:42:32:dd:4f:ee:a2:fd: ec:29:11:e6:f3:eb:30:2b:29:e6:2d:7b:47:40:aa:8e: 52:96:ac:ee:05:17:d9:da:69:59:b6:59:71:59:7e:6c: 30:f8:0a:19:56:24:a8:33:9a:eb:07:1d:9c:c7:10:e3: 09:d2:95:03:93:8a:07:f1:cd:48:54:c8:25:3c:07:91: f8:13:b6:a6:c1:c9:db:9f:15:0d:91:d8:9a:df:dc:9a: 21:31:0f:0e:3b:66:18:20:a5:5a:d2:42:9e:15:09:3f: a8:0b:e5:f4:8f:14:ac:f4:84:3b:18:4a:4d:4d:b0:bc: de:e9:13:97:74:14:24:2e:89:f8:54:66:92:b0:78:5d: 6b:14:1e:35:18:ea:0e:0c:29:26:95:12:ba:ab:fd:85: bd:76:cb:61:29:87:4f:ce:80:4d:45:4a:c8:d7:56:67: 18:3b:ec:0c:28:40:7c:65:f1:4d:35:84:6f:27:fe:a2: e8:81:f4:0e:da:f7:81:a0:fb:f7:84:9f:1b:fc:5f:76: a7:aa:13:72:65:e5:77:fd:6c:b2:1e:0c:f6:f0:71:f6: 9d:f0:48:e6:00:80:f7:9c:40:ec:31:ca:61:af:56:a5: cc:c9:4c:c9:a9:1f:1a:69:52:50:3f:85:f7:9b:89:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:b2:7f:d0:a5:3c:af:9a:c8:fa:c7:1b:f7:46:b0:c0: 2c:f9:eb:c3:6d:29:b5:f6:e9:4f:49:f1:aa:b2:09:d3: d9:26:16:27:a4:99:f5:44:a9:09:f3:60:a6:fc:4e:92: 27:91:f0:2f:9f:63:1f:29:3d:01:c4:14:36:d5:4a:fa: 05:15:64:de:b7:54:48:ad:91:0b:e5:3b:c4:96:53:1e: 8b:b6:9c:39:54:ae:d0:ef:42:33:72:5e:fd:76:c0:b5: 54:72:d5:c3:78:7d:4d:7f:b2:2c:4a:83:6b:e7:58:a6: 50:6e:9c:32:52:11:10:23:04:0d:52:d2:ec:42:30:1f: ca:57:3b:0d:11:db:22:62:70:91:54:50:20:e0:6a:97: ae:58:ef:3c:9e:b3:59:2b:b9:7d:18:0c:80:0e:40:1c: b5:8f:46:b4:e5:7e:b0:58:93:6c:d0:3e:e2:04:47:14: a3:5e:f1:98:5a:4a:c4:f7:f4:83:c1:90:2b:6f:89:6c: aa:af:c1:16:3d:4e:85:49:37:2a:90:7b:e2:9c:58:7b: 75:e5:43:f6:c9:8c:72:53:3f:09:f1:db:68:f2:d0:bf: 79:61:f3:72:41:29:03:81:e6:b1:da:c7:7b:36:a8:6d: e5:91:ce:9b:4a:58:98:26:00:13:99:e1:0b:06:60:34 Fingerprint (SHA-256): E4:8C:37:1F:EC:71:D8:8E:ED:D8:D9:39:73:73:EB:DE:E3:4A:C0:10:46:72:2D:4B:13:16:6C:E6:B2:83:27:E6 Fingerprint (SHA1): 4A:96:95:89:74:6E:97:AC:D7:36:E5:D8:CD:1F:B1:6E:37:AD:2C:27 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #11376: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125823 (0x1e67e6ff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 13:01:55 2017 Not After : Tue May 10 13:01:55 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:16:c2:98:b2:14:77:3b:65:d9:fe:ac:99:b3:89:6e: 67:7e:1f:8f:cb:42:91:26:82:70:d3:ba:41:b1:00:cc: 76:a0:61:3c:00:01:f9:22:6f:97:2c:ce:a9:fc:40:61: f6:40:14:af:8c:48:77:f2:af:bc:a5:69:c6:7c:bc:93: 40:f5:68:f1:1d:89:10:2c:98:af:d6:95:8f:3d:e3:d1: 91:9c:e2:ef:97:02:ce:e4:57:08:3e:01:9f:85:b5:fe: 0f:88:d5:c3:27:41:12:c2:56:40:30:ba:09:25:8b:53: ac:b7:35:fb:e1:f7:b4:96:1b:1e:a4:9a:61:1c:12:d9: d2:60:4f:a7:eb:89:46:dc:7e:3b:16:b7:80:6e:c2:a6: e3:e4:c5:1b:0a:d2:9d:3a:35:4a:d7:30:ec:9d:5e:63: f6:21:92:4f:8b:30:37:81:04:71:8d:31:4a:c9:3b:54: d4:5c:48:ca:83:32:4d:5c:e5:8d:b7:10:f8:78:01:9b: 4d:35:ca:3e:4f:02:b7:c0:a6:16:02:3a:a3:b1:54:d4: aa:d4:cf:38:5f:e3:c4:f7:df:45:8a:39:db:90:24:f5: b1:0b:75:45:95:d8:8e:77:37:d2:da:98:e3:d3:9b:c6: 49:22:aa:fd:64:f4:34:cd:fc:f8:87:fa:09:9a:7a:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 92:c8:0e:c0:15:d0:c6:0a:2b:b6:96:9a:ea:75:96:76: 3f:53:63:7b:64:4d:51:b0:4a:84:c5:0c:d0:d3:0b:aa: 98:31:a1:5d:fc:73:10:72:05:9d:7b:6a:a0:54:b9:97: 5f:9b:4d:52:30:ba:92:31:a9:a8:d3:19:6a:18:d8:1f: b2:ac:ed:fe:a0:c5:dd:7a:a5:0d:2b:8e:c2:71:c9:cf: d6:11:1a:43:7e:e9:5d:02:09:99:ee:fc:0a:fa:b6:35: 5a:81:9e:7f:b5:8b:ac:5b:00:54:dd:b9:d8:48:a5:38: 95:13:87:ec:7a:a1:0b:02:e3:72:f7:31:40:75:1f:b7: 54:d0:45:24:3f:76:f4:e5:aa:c1:90:60:d5:90:df:f4: 9d:f5:a1:30:be:22:03:ce:62:42:81:c7:15:1f:c0:b7: 1f:fc:10:01:79:14:e0:4d:9d:d2:c8:a0:f2:65:f8:2d: ef:56:91:61:8c:22:81:77:76:0f:e2:34:a1:f5:d9:6a: 9d:3c:31:4d:d3:7a:18:71:36:17:c2:08:11:b7:c4:aa: 37:fa:67:c5:e7:bf:9f:3f:99:3c:52:63:9c:2f:57:6e: e1:ba:2b:2f:b7:5b:71:6c:18:eb:be:07:a7:1d:74:f1: aa:df:06:0f:b5:56:89:e3:e1:2e:89:84:a7:97:a8:cd Fingerprint (SHA-256): F4:1D:90:83:28:BE:DF:37:1C:48:66:29:44:CC:25:AF:78:40:5F:99:58:C9:1E:B6:D0:40:35:C9:7C:1D:86:4D Fingerprint (SHA1): A6:5E:D2:3D:AB:EF:A8:4C:B1:9A:04:2F:99:E6:C8:F7:64:5C:D8:43 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #11377: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125823 (0x1e67e6ff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 13:01:55 2017 Not After : Tue May 10 13:01:55 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:16:c2:98:b2:14:77:3b:65:d9:fe:ac:99:b3:89:6e: 67:7e:1f:8f:cb:42:91:26:82:70:d3:ba:41:b1:00:cc: 76:a0:61:3c:00:01:f9:22:6f:97:2c:ce:a9:fc:40:61: f6:40:14:af:8c:48:77:f2:af:bc:a5:69:c6:7c:bc:93: 40:f5:68:f1:1d:89:10:2c:98:af:d6:95:8f:3d:e3:d1: 91:9c:e2:ef:97:02:ce:e4:57:08:3e:01:9f:85:b5:fe: 0f:88:d5:c3:27:41:12:c2:56:40:30:ba:09:25:8b:53: ac:b7:35:fb:e1:f7:b4:96:1b:1e:a4:9a:61:1c:12:d9: d2:60:4f:a7:eb:89:46:dc:7e:3b:16:b7:80:6e:c2:a6: e3:e4:c5:1b:0a:d2:9d:3a:35:4a:d7:30:ec:9d:5e:63: f6:21:92:4f:8b:30:37:81:04:71:8d:31:4a:c9:3b:54: d4:5c:48:ca:83:32:4d:5c:e5:8d:b7:10:f8:78:01:9b: 4d:35:ca:3e:4f:02:b7:c0:a6:16:02:3a:a3:b1:54:d4: aa:d4:cf:38:5f:e3:c4:f7:df:45:8a:39:db:90:24:f5: b1:0b:75:45:95:d8:8e:77:37:d2:da:98:e3:d3:9b:c6: 49:22:aa:fd:64:f4:34:cd:fc:f8:87:fa:09:9a:7a:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 92:c8:0e:c0:15:d0:c6:0a:2b:b6:96:9a:ea:75:96:76: 3f:53:63:7b:64:4d:51:b0:4a:84:c5:0c:d0:d3:0b:aa: 98:31:a1:5d:fc:73:10:72:05:9d:7b:6a:a0:54:b9:97: 5f:9b:4d:52:30:ba:92:31:a9:a8:d3:19:6a:18:d8:1f: b2:ac:ed:fe:a0:c5:dd:7a:a5:0d:2b:8e:c2:71:c9:cf: d6:11:1a:43:7e:e9:5d:02:09:99:ee:fc:0a:fa:b6:35: 5a:81:9e:7f:b5:8b:ac:5b:00:54:dd:b9:d8:48:a5:38: 95:13:87:ec:7a:a1:0b:02:e3:72:f7:31:40:75:1f:b7: 54:d0:45:24:3f:76:f4:e5:aa:c1:90:60:d5:90:df:f4: 9d:f5:a1:30:be:22:03:ce:62:42:81:c7:15:1f:c0:b7: 1f:fc:10:01:79:14:e0:4d:9d:d2:c8:a0:f2:65:f8:2d: ef:56:91:61:8c:22:81:77:76:0f:e2:34:a1:f5:d9:6a: 9d:3c:31:4d:d3:7a:18:71:36:17:c2:08:11:b7:c4:aa: 37:fa:67:c5:e7:bf:9f:3f:99:3c:52:63:9c:2f:57:6e: e1:ba:2b:2f:b7:5b:71:6c:18:eb:be:07:a7:1d:74:f1: aa:df:06:0f:b5:56:89:e3:e1:2e:89:84:a7:97:a8:cd Fingerprint (SHA-256): F4:1D:90:83:28:BE:DF:37:1C:48:66:29:44:CC:25:AF:78:40:5F:99:58:C9:1E:B6:D0:40:35:C9:7C:1D:86:4D Fingerprint (SHA1): A6:5E:D2:3D:AB:EF:A8:4C:B1:9A:04:2F:99:E6:C8:F7:64:5C:D8:43 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #11378: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #11379: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125822 (0x1e67e6fe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 13:01:51 2017 Not After : Tue May 10 13:01:51 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:c2:b3:72:de:bc:71:99:14:42:32:dd:4f:ee:a2:fd: ec:29:11:e6:f3:eb:30:2b:29:e6:2d:7b:47:40:aa:8e: 52:96:ac:ee:05:17:d9:da:69:59:b6:59:71:59:7e:6c: 30:f8:0a:19:56:24:a8:33:9a:eb:07:1d:9c:c7:10:e3: 09:d2:95:03:93:8a:07:f1:cd:48:54:c8:25:3c:07:91: f8:13:b6:a6:c1:c9:db:9f:15:0d:91:d8:9a:df:dc:9a: 21:31:0f:0e:3b:66:18:20:a5:5a:d2:42:9e:15:09:3f: a8:0b:e5:f4:8f:14:ac:f4:84:3b:18:4a:4d:4d:b0:bc: de:e9:13:97:74:14:24:2e:89:f8:54:66:92:b0:78:5d: 6b:14:1e:35:18:ea:0e:0c:29:26:95:12:ba:ab:fd:85: bd:76:cb:61:29:87:4f:ce:80:4d:45:4a:c8:d7:56:67: 18:3b:ec:0c:28:40:7c:65:f1:4d:35:84:6f:27:fe:a2: e8:81:f4:0e:da:f7:81:a0:fb:f7:84:9f:1b:fc:5f:76: a7:aa:13:72:65:e5:77:fd:6c:b2:1e:0c:f6:f0:71:f6: 9d:f0:48:e6:00:80:f7:9c:40:ec:31:ca:61:af:56:a5: cc:c9:4c:c9:a9:1f:1a:69:52:50:3f:85:f7:9b:89:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:b2:7f:d0:a5:3c:af:9a:c8:fa:c7:1b:f7:46:b0:c0: 2c:f9:eb:c3:6d:29:b5:f6:e9:4f:49:f1:aa:b2:09:d3: d9:26:16:27:a4:99:f5:44:a9:09:f3:60:a6:fc:4e:92: 27:91:f0:2f:9f:63:1f:29:3d:01:c4:14:36:d5:4a:fa: 05:15:64:de:b7:54:48:ad:91:0b:e5:3b:c4:96:53:1e: 8b:b6:9c:39:54:ae:d0:ef:42:33:72:5e:fd:76:c0:b5: 54:72:d5:c3:78:7d:4d:7f:b2:2c:4a:83:6b:e7:58:a6: 50:6e:9c:32:52:11:10:23:04:0d:52:d2:ec:42:30:1f: ca:57:3b:0d:11:db:22:62:70:91:54:50:20:e0:6a:97: ae:58:ef:3c:9e:b3:59:2b:b9:7d:18:0c:80:0e:40:1c: b5:8f:46:b4:e5:7e:b0:58:93:6c:d0:3e:e2:04:47:14: a3:5e:f1:98:5a:4a:c4:f7:f4:83:c1:90:2b:6f:89:6c: aa:af:c1:16:3d:4e:85:49:37:2a:90:7b:e2:9c:58:7b: 75:e5:43:f6:c9:8c:72:53:3f:09:f1:db:68:f2:d0:bf: 79:61:f3:72:41:29:03:81:e6:b1:da:c7:7b:36:a8:6d: e5:91:ce:9b:4a:58:98:26:00:13:99:e1:0b:06:60:34 Fingerprint (SHA-256): E4:8C:37:1F:EC:71:D8:8E:ED:D8:D9:39:73:73:EB:DE:E3:4A:C0:10:46:72:2D:4B:13:16:6C:E6:B2:83:27:E6 Fingerprint (SHA1): 4A:96:95:89:74:6E:97:AC:D7:36:E5:D8:CD:1F:B1:6E:37:AD:2C:27 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #11380: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125823 (0x1e67e6ff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 13:01:55 2017 Not After : Tue May 10 13:01:55 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:16:c2:98:b2:14:77:3b:65:d9:fe:ac:99:b3:89:6e: 67:7e:1f:8f:cb:42:91:26:82:70:d3:ba:41:b1:00:cc: 76:a0:61:3c:00:01:f9:22:6f:97:2c:ce:a9:fc:40:61: f6:40:14:af:8c:48:77:f2:af:bc:a5:69:c6:7c:bc:93: 40:f5:68:f1:1d:89:10:2c:98:af:d6:95:8f:3d:e3:d1: 91:9c:e2:ef:97:02:ce:e4:57:08:3e:01:9f:85:b5:fe: 0f:88:d5:c3:27:41:12:c2:56:40:30:ba:09:25:8b:53: ac:b7:35:fb:e1:f7:b4:96:1b:1e:a4:9a:61:1c:12:d9: d2:60:4f:a7:eb:89:46:dc:7e:3b:16:b7:80:6e:c2:a6: e3:e4:c5:1b:0a:d2:9d:3a:35:4a:d7:30:ec:9d:5e:63: f6:21:92:4f:8b:30:37:81:04:71:8d:31:4a:c9:3b:54: d4:5c:48:ca:83:32:4d:5c:e5:8d:b7:10:f8:78:01:9b: 4d:35:ca:3e:4f:02:b7:c0:a6:16:02:3a:a3:b1:54:d4: aa:d4:cf:38:5f:e3:c4:f7:df:45:8a:39:db:90:24:f5: b1:0b:75:45:95:d8:8e:77:37:d2:da:98:e3:d3:9b:c6: 49:22:aa:fd:64:f4:34:cd:fc:f8:87:fa:09:9a:7a:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 92:c8:0e:c0:15:d0:c6:0a:2b:b6:96:9a:ea:75:96:76: 3f:53:63:7b:64:4d:51:b0:4a:84:c5:0c:d0:d3:0b:aa: 98:31:a1:5d:fc:73:10:72:05:9d:7b:6a:a0:54:b9:97: 5f:9b:4d:52:30:ba:92:31:a9:a8:d3:19:6a:18:d8:1f: b2:ac:ed:fe:a0:c5:dd:7a:a5:0d:2b:8e:c2:71:c9:cf: d6:11:1a:43:7e:e9:5d:02:09:99:ee:fc:0a:fa:b6:35: 5a:81:9e:7f:b5:8b:ac:5b:00:54:dd:b9:d8:48:a5:38: 95:13:87:ec:7a:a1:0b:02:e3:72:f7:31:40:75:1f:b7: 54:d0:45:24:3f:76:f4:e5:aa:c1:90:60:d5:90:df:f4: 9d:f5:a1:30:be:22:03:ce:62:42:81:c7:15:1f:c0:b7: 1f:fc:10:01:79:14:e0:4d:9d:d2:c8:a0:f2:65:f8:2d: ef:56:91:61:8c:22:81:77:76:0f:e2:34:a1:f5:d9:6a: 9d:3c:31:4d:d3:7a:18:71:36:17:c2:08:11:b7:c4:aa: 37:fa:67:c5:e7:bf:9f:3f:99:3c:52:63:9c:2f:57:6e: e1:ba:2b:2f:b7:5b:71:6c:18:eb:be:07:a7:1d:74:f1: aa:df:06:0f:b5:56:89:e3:e1:2e:89:84:a7:97:a8:cd Fingerprint (SHA-256): F4:1D:90:83:28:BE:DF:37:1C:48:66:29:44:CC:25:AF:78:40:5F:99:58:C9:1E:B6:D0:40:35:C9:7C:1D:86:4D Fingerprint (SHA1): A6:5E:D2:3D:AB:EF:A8:4C:B1:9A:04:2F:99:E6:C8:F7:64:5C:D8:43 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #11381: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125823 (0x1e67e6ff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 13:01:55 2017 Not After : Tue May 10 13:01:55 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:16:c2:98:b2:14:77:3b:65:d9:fe:ac:99:b3:89:6e: 67:7e:1f:8f:cb:42:91:26:82:70:d3:ba:41:b1:00:cc: 76:a0:61:3c:00:01:f9:22:6f:97:2c:ce:a9:fc:40:61: f6:40:14:af:8c:48:77:f2:af:bc:a5:69:c6:7c:bc:93: 40:f5:68:f1:1d:89:10:2c:98:af:d6:95:8f:3d:e3:d1: 91:9c:e2:ef:97:02:ce:e4:57:08:3e:01:9f:85:b5:fe: 0f:88:d5:c3:27:41:12:c2:56:40:30:ba:09:25:8b:53: ac:b7:35:fb:e1:f7:b4:96:1b:1e:a4:9a:61:1c:12:d9: d2:60:4f:a7:eb:89:46:dc:7e:3b:16:b7:80:6e:c2:a6: e3:e4:c5:1b:0a:d2:9d:3a:35:4a:d7:30:ec:9d:5e:63: f6:21:92:4f:8b:30:37:81:04:71:8d:31:4a:c9:3b:54: d4:5c:48:ca:83:32:4d:5c:e5:8d:b7:10:f8:78:01:9b: 4d:35:ca:3e:4f:02:b7:c0:a6:16:02:3a:a3:b1:54:d4: aa:d4:cf:38:5f:e3:c4:f7:df:45:8a:39:db:90:24:f5: b1:0b:75:45:95:d8:8e:77:37:d2:da:98:e3:d3:9b:c6: 49:22:aa:fd:64:f4:34:cd:fc:f8:87:fa:09:9a:7a:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 92:c8:0e:c0:15:d0:c6:0a:2b:b6:96:9a:ea:75:96:76: 3f:53:63:7b:64:4d:51:b0:4a:84:c5:0c:d0:d3:0b:aa: 98:31:a1:5d:fc:73:10:72:05:9d:7b:6a:a0:54:b9:97: 5f:9b:4d:52:30:ba:92:31:a9:a8:d3:19:6a:18:d8:1f: b2:ac:ed:fe:a0:c5:dd:7a:a5:0d:2b:8e:c2:71:c9:cf: d6:11:1a:43:7e:e9:5d:02:09:99:ee:fc:0a:fa:b6:35: 5a:81:9e:7f:b5:8b:ac:5b:00:54:dd:b9:d8:48:a5:38: 95:13:87:ec:7a:a1:0b:02:e3:72:f7:31:40:75:1f:b7: 54:d0:45:24:3f:76:f4:e5:aa:c1:90:60:d5:90:df:f4: 9d:f5:a1:30:be:22:03:ce:62:42:81:c7:15:1f:c0:b7: 1f:fc:10:01:79:14:e0:4d:9d:d2:c8:a0:f2:65:f8:2d: ef:56:91:61:8c:22:81:77:76:0f:e2:34:a1:f5:d9:6a: 9d:3c:31:4d:d3:7a:18:71:36:17:c2:08:11:b7:c4:aa: 37:fa:67:c5:e7:bf:9f:3f:99:3c:52:63:9c:2f:57:6e: e1:ba:2b:2f:b7:5b:71:6c:18:eb:be:07:a7:1d:74:f1: aa:df:06:0f:b5:56:89:e3:e1:2e:89:84:a7:97:a8:cd Fingerprint (SHA-256): F4:1D:90:83:28:BE:DF:37:1C:48:66:29:44:CC:25:AF:78:40:5F:99:58:C9:1E:B6:D0:40:35:C9:7C:1D:86:4D Fingerprint (SHA1): A6:5E:D2:3D:AB:EF:A8:4C:B1:9A:04:2F:99:E6:C8:F7:64:5C:D8:43 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #11382: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #11383: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125830 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11384: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #11385: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #11386: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125831 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11387: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #11388: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #11389: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11390: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 510125832 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11391: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11392: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #11393: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11394: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 510125833 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11395: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11396: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #11397: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11398: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 510125834 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #11399: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11400: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 510125835 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #11401: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11402: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #11403: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #11404: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11405: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 510125836 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11406: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11407: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #11408: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11409: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 510125837 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11410: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11411: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #11412: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11413: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510125838 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11414: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11415: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #11416: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11417: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 510125839 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11418: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11419: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11420: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125830 (0x1e67e706) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 13:02:14 2017 Not After : Tue May 10 13:02:14 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:a8:06:d7:a0:6d:6b:75:40:72:34:d3:75:b3:85:ab: f4:37:91:c1:17:10:03:39:42:40:e4:85:55:d3:d2:35: 17:69:08:a1:22:92:99:3e:64:88:0c:69:79:73:1a:53: 04:8d:9b:02:48:fc:e2:bb:c9:71:b1:37:93:bf:f2:2f: 0f:64:09:e4:74:6a:6b:86:4e:d9:2f:fc:9f:51:fb:06: 4c:8d:96:36:69:84:f1:1e:de:b1:6a:f5:ec:75:d1:29: 8f:3f:07:15:27:75:b3:68:be:14:0f:62:9d:d2:90:6e: dc:a0:05:0e:00:4f:10:2d:5a:5e:71:b1:01:0d:9e:a5: e2:ae:73:c8:3e:a4:ef:6f:55:55:f2:62:09:a5:bc:bb: 23:5e:c7:8e:0a:c0:ae:76:6c:83:1f:3d:b2:40:6e:ee: a9:f5:cb:a4:1b:c9:67:72:80:56:ba:63:fe:cc:eb:16: c5:db:cd:bb:3c:24:41:06:d5:59:df:2d:05:f2:c2:50: fb:68:a0:e0:f3:91:ef:3d:17:fd:d7:56:df:e7:a2:ff: fd:e7:45:30:aa:f7:f3:4c:14:bc:34:84:dc:9d:d8:31: 30:12:a8:f8:d7:11:27:06:a8:ec:39:ce:da:47:cb:d5: ea:d6:65:c2:10:f1:df:a4:15:c6:c5:e9:f5:bc:55:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:81:8b:8d:ca:ea:ef:17:d3:89:33:22:2a:e1:6e:00: e5:a7:4c:c5:23:ae:fe:95:f8:72:41:e5:93:d5:35:6b: c3:95:66:df:bf:ed:86:50:c2:7c:d1:27:6d:69:86:06: ce:84:bb:ea:fa:c1:60:d8:5c:e5:da:ee:2b:ab:3c:fb: 31:ed:fd:ae:7f:ba:e1:27:43:9a:83:48:ce:fc:2d:97: ab:4f:cc:77:3b:de:c5:78:9f:eb:c9:55:f7:69:7d:04: 44:ff:43:23:57:5e:e0:6c:b1:43:f2:70:69:80:cb:e0: b9:2a:5d:65:ca:b7:48:4d:a8:2f:50:56:59:50:b6:04: 19:da:85:08:38:10:36:ef:f7:4e:a3:f6:93:41:fa:a5: 38:f3:b4:62:3a:17:b2:4a:f0:b8:89:ed:5d:fa:e6:b1: e7:ba:bd:cd:37:da:76:2c:8b:b3:46:b9:53:a8:05:7d: 04:80:0a:02:9c:c6:1a:da:f5:56:6e:2b:f9:2a:97:8b: 1f:06:30:c5:ee:80:38:6c:7b:0b:74:d4:ea:aa:55:07: cb:67:8d:68:15:35:6d:d7:14:72:0d:98:42:af:35:7c: 0a:8d:29:b8:f8:e7:d7:bd:7d:3e:88:4f:4a:69:0f:bd: 6c:0c:d0:99:6f:88:78:28:ff:98:f4:81:d5:9b:76:9f Fingerprint (SHA-256): E5:39:CC:00:F7:0D:52:A2:0E:E2:0C:3D:B9:53:DD:E1:7E:F3:1A:D8:18:02:99:CE:E7:3B:EE:81:4D:78:30:B6 Fingerprint (SHA1): 8F:52:FB:70:34:7E:A8:29:D6:CC:EC:D3:22:F3:32:88:A9:54:E3:64 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #11421: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11422: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11423: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11424: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11425: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11426: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11427: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11428: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11429: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125831 (0x1e67e707) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 13:02:16 2017 Not After : Tue May 10 13:02:16 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:44:54:7a:5d:e0:d3:21:bd:70:c5:27:20:0c:56:2b: a4:16:92:33:eb:d6:24:7d:63:a3:41:58:f0:7a:3d:e2: bf:57:32:6c:9a:6c:e2:3a:7e:bb:de:f3:6f:be:04:db: a0:27:f7:5d:ad:a0:5e:89:15:06:bc:da:e0:4b:7f:19: 6c:5b:21:0a:46:96:b7:02:f7:6b:4e:96:a5:41:b0:fc: 46:c1:2c:b6:16:1b:2c:9f:ad:ec:18:0c:58:4d:87:9a: 2f:ed:54:cc:96:9d:5c:38:32:99:c8:da:52:2e:3b:36: 56:a6:59:88:6d:5f:87:10:07:61:d8:bb:74:1e:01:2a: d2:ad:c9:48:a6:79:4f:5a:a8:5a:29:f7:47:6c:58:24: 31:36:95:3a:e8:a9:0d:5a:57:2b:1c:dd:cb:bd:85:99: fd:ce:59:3d:75:4f:43:86:43:80:76:f4:de:bf:b8:f7: 49:26:79:aa:d0:14:41:9c:93:0b:ec:cc:f2:55:be:82: c3:50:29:67:73:6f:05:22:d8:2a:ab:ea:fd:bc:af:34: dc:8c:30:9b:03:ca:5c:73:e1:dc:41:0d:1e:0b:a5:cc: 90:73:ea:0d:8a:44:13:af:51:1d:9b:f7:ee:dc:37:35: 37:7b:17:a2:36:8d:27:f7:62:23:d0:1f:15:80:36:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6c:61:12:15:d4:2a:52:1f:8d:48:0b:bb:53:b9:36:e2: 30:66:ac:44:5f:6a:75:28:ef:d3:b7:1f:78:e9:6a:72: 66:15:7c:67:6f:6a:73:fb:90:88:ee:bf:ef:59:ed:83: 0b:c0:16:02:dc:d5:4c:d2:d3:91:29:2d:ab:39:2f:f7: 69:ab:85:e4:bc:b0:60:6f:cb:51:ee:e5:e6:d3:80:31: 77:1c:b8:37:42:ad:a2:0a:42:25:bb:3a:eb:7b:cd:9b: 32:c2:01:88:c0:63:37:b5:5f:f8:42:b2:df:b0:67:09: e0:06:7b:fb:67:cf:fc:06:16:87:6c:cd:96:77:85:e8: 9f:50:37:61:5d:0f:1a:a6:2c:67:06:71:e2:cb:eb:46: 32:7b:91:77:c9:55:09:ff:b4:99:87:2a:00:8b:a2:de: 20:40:89:be:f5:d2:be:cd:4a:98:91:2d:34:c1:51:65: eb:08:91:0a:2b:1d:31:fc:b6:92:c4:38:ba:31:18:26: 4a:df:15:18:f8:f5:19:6a:eb:6c:1c:ad:cb:f6:02:3c: a0:b8:a5:c0:4e:32:0d:c1:42:b2:d4:0f:d8:0d:f1:76: 5c:b5:99:4b:e4:df:7c:de:fc:29:b3:76:51:0d:d6:e6: a5:96:21:e1:e8:69:65:3c:88:2e:77:50:08:88:93:68 Fingerprint (SHA-256): 25:E7:5B:30:A7:0F:3F:85:77:5C:41:D4:9F:D5:26:73:5B:9D:11:21:CE:AA:E1:EE:89:E8:F6:DE:F0:E4:F0:83 Fingerprint (SHA1): C3:FB:0D:66:8E:0C:73:2B:4C:06:4B:2D:D6:B1:71:41:BD:E1:F0:86 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #11430: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11431: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11432: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11433: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11434: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11435: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #11436: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #11437: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #11438: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #11439: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #11440: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #11441: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #11442: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #11443: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #11444: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #11445: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #11446: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #11447: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #11448: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125840 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11449: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #11450: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #11451: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11452: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510125841 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11453: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11454: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #11455: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11456: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510125842 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11457: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11458: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #11459: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11460: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 510125843 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11461: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11462: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #11463: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11464: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 510125844 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11465: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11466: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #11467: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11468: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 510125845 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11469: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11470: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #11471: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11472: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 510125846 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11473: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11474: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #11475: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11476: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 510125847 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11477: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11478: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #11479: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11480: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 510125848 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11481: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11482: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #11483: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125840 (0x1e67e710) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:02:40 2017 Not After : Tue May 10 13:02:40 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 51:22:63:66:33:47:a5:83:52:ce:b6:e6:c2:c5:cc:5d: 8a:3e:58:9e:d5:cf:3f:35:d1:08:08:60:47:9a:b0:57: 14:20:69:3f:35:4c:e2:37:5b:89:70:0b:22:a8:26:d9: 30:50:83:bd:bf:04:eb:80:79:ef:65:43:90:ef:2d:6b: 0a:49:9d:91:0f:19:f2:75:11:8b:11:e0:9b:d4:b6:fd: b1:60:14:5b:41:c6:bb:7f:c8:7b:71:8d:01:0a:a2:4a: c2:a7:c9:ec:ad:df:b6:ea:78:99:6a:be:ea:78:13:6a: 36:51:89:27:04:3a:97:bd:42:02:23:43:30:e6:fb:41: 70:a6:c3:70:0a:37:0b:8e:5d:86:d0:16:a5:7b:64:da: 42:3d:1b:91:b3:d9:41:58:2e:41:3d:2c:4f:d6:9d:6c: 71:26:e8:6d:b5:21:a6:fd:b0:75:ee:10:dd:6e:2c:68: 57:ab:fa:dc:93:1f:e5:8f:54:3b:99:1c:a5:a3:81:d6: c8:bb:4c:50:c1:44:68:82:43:ff:28:1e:56:f0:06:dc: 6d:89:44:a4:92:66:ad:ba:b6:be:3f:a1:a8:ab:d6:7c: 8d:a9:73:b0:e5:7c:71:40:f7:d5:30:73:c9:2c:06:5f: 25:6c:a6:69:68:07:05:07:7d:9d:4b:03:9d:1d:e5:44 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:72:1d:11:6d:a8:88:c8:4f:92:09:3f:41: 90:c5:86:f4:68:8e:04:6a:5f:be:ea:b3:3a:d4:a1:c8: 02:1c:06:2b:d3:5a:1c:ce:bf:14:b2:73:68:d5:35:2b: 88:26:6c:84:2c:23:8b:86:8b:ae:c9:b7:c8:bd Fingerprint (SHA-256): BB:20:43:E1:E1:69:72:29:30:3A:D9:92:19:19:B0:56:02:AB:74:4D:0E:45:87:48:8E:86:2A:C4:B6:F3:A7:34 Fingerprint (SHA1): 25:17:7C:5A:11:C9:AB:DC:21:71:2F:10:98:81:8C:A2:87:2F:59:5F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11484: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125840 (0x1e67e710) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:02:40 2017 Not After : Tue May 10 13:02:40 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 51:22:63:66:33:47:a5:83:52:ce:b6:e6:c2:c5:cc:5d: 8a:3e:58:9e:d5:cf:3f:35:d1:08:08:60:47:9a:b0:57: 14:20:69:3f:35:4c:e2:37:5b:89:70:0b:22:a8:26:d9: 30:50:83:bd:bf:04:eb:80:79:ef:65:43:90:ef:2d:6b: 0a:49:9d:91:0f:19:f2:75:11:8b:11:e0:9b:d4:b6:fd: b1:60:14:5b:41:c6:bb:7f:c8:7b:71:8d:01:0a:a2:4a: c2:a7:c9:ec:ad:df:b6:ea:78:99:6a:be:ea:78:13:6a: 36:51:89:27:04:3a:97:bd:42:02:23:43:30:e6:fb:41: 70:a6:c3:70:0a:37:0b:8e:5d:86:d0:16:a5:7b:64:da: 42:3d:1b:91:b3:d9:41:58:2e:41:3d:2c:4f:d6:9d:6c: 71:26:e8:6d:b5:21:a6:fd:b0:75:ee:10:dd:6e:2c:68: 57:ab:fa:dc:93:1f:e5:8f:54:3b:99:1c:a5:a3:81:d6: c8:bb:4c:50:c1:44:68:82:43:ff:28:1e:56:f0:06:dc: 6d:89:44:a4:92:66:ad:ba:b6:be:3f:a1:a8:ab:d6:7c: 8d:a9:73:b0:e5:7c:71:40:f7:d5:30:73:c9:2c:06:5f: 25:6c:a6:69:68:07:05:07:7d:9d:4b:03:9d:1d:e5:44 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:72:1d:11:6d:a8:88:c8:4f:92:09:3f:41: 90:c5:86:f4:68:8e:04:6a:5f:be:ea:b3:3a:d4:a1:c8: 02:1c:06:2b:d3:5a:1c:ce:bf:14:b2:73:68:d5:35:2b: 88:26:6c:84:2c:23:8b:86:8b:ae:c9:b7:c8:bd Fingerprint (SHA-256): BB:20:43:E1:E1:69:72:29:30:3A:D9:92:19:19:B0:56:02:AB:74:4D:0E:45:87:48:8E:86:2A:C4:B6:F3:A7:34 Fingerprint (SHA1): 25:17:7C:5A:11:C9:AB:DC:21:71:2F:10:98:81:8C:A2:87:2F:59:5F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #11485: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125840 (0x1e67e710) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:02:40 2017 Not After : Tue May 10 13:02:40 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 51:22:63:66:33:47:a5:83:52:ce:b6:e6:c2:c5:cc:5d: 8a:3e:58:9e:d5:cf:3f:35:d1:08:08:60:47:9a:b0:57: 14:20:69:3f:35:4c:e2:37:5b:89:70:0b:22:a8:26:d9: 30:50:83:bd:bf:04:eb:80:79:ef:65:43:90:ef:2d:6b: 0a:49:9d:91:0f:19:f2:75:11:8b:11:e0:9b:d4:b6:fd: b1:60:14:5b:41:c6:bb:7f:c8:7b:71:8d:01:0a:a2:4a: c2:a7:c9:ec:ad:df:b6:ea:78:99:6a:be:ea:78:13:6a: 36:51:89:27:04:3a:97:bd:42:02:23:43:30:e6:fb:41: 70:a6:c3:70:0a:37:0b:8e:5d:86:d0:16:a5:7b:64:da: 42:3d:1b:91:b3:d9:41:58:2e:41:3d:2c:4f:d6:9d:6c: 71:26:e8:6d:b5:21:a6:fd:b0:75:ee:10:dd:6e:2c:68: 57:ab:fa:dc:93:1f:e5:8f:54:3b:99:1c:a5:a3:81:d6: c8:bb:4c:50:c1:44:68:82:43:ff:28:1e:56:f0:06:dc: 6d:89:44:a4:92:66:ad:ba:b6:be:3f:a1:a8:ab:d6:7c: 8d:a9:73:b0:e5:7c:71:40:f7:d5:30:73:c9:2c:06:5f: 25:6c:a6:69:68:07:05:07:7d:9d:4b:03:9d:1d:e5:44 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:72:1d:11:6d:a8:88:c8:4f:92:09:3f:41: 90:c5:86:f4:68:8e:04:6a:5f:be:ea:b3:3a:d4:a1:c8: 02:1c:06:2b:d3:5a:1c:ce:bf:14:b2:73:68:d5:35:2b: 88:26:6c:84:2c:23:8b:86:8b:ae:c9:b7:c8:bd Fingerprint (SHA-256): BB:20:43:E1:E1:69:72:29:30:3A:D9:92:19:19:B0:56:02:AB:74:4D:0E:45:87:48:8E:86:2A:C4:B6:F3:A7:34 Fingerprint (SHA1): 25:17:7C:5A:11:C9:AB:DC:21:71:2F:10:98:81:8C:A2:87:2F:59:5F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #11486: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125840 (0x1e67e710) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:02:40 2017 Not After : Tue May 10 13:02:40 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 51:22:63:66:33:47:a5:83:52:ce:b6:e6:c2:c5:cc:5d: 8a:3e:58:9e:d5:cf:3f:35:d1:08:08:60:47:9a:b0:57: 14:20:69:3f:35:4c:e2:37:5b:89:70:0b:22:a8:26:d9: 30:50:83:bd:bf:04:eb:80:79:ef:65:43:90:ef:2d:6b: 0a:49:9d:91:0f:19:f2:75:11:8b:11:e0:9b:d4:b6:fd: b1:60:14:5b:41:c6:bb:7f:c8:7b:71:8d:01:0a:a2:4a: c2:a7:c9:ec:ad:df:b6:ea:78:99:6a:be:ea:78:13:6a: 36:51:89:27:04:3a:97:bd:42:02:23:43:30:e6:fb:41: 70:a6:c3:70:0a:37:0b:8e:5d:86:d0:16:a5:7b:64:da: 42:3d:1b:91:b3:d9:41:58:2e:41:3d:2c:4f:d6:9d:6c: 71:26:e8:6d:b5:21:a6:fd:b0:75:ee:10:dd:6e:2c:68: 57:ab:fa:dc:93:1f:e5:8f:54:3b:99:1c:a5:a3:81:d6: c8:bb:4c:50:c1:44:68:82:43:ff:28:1e:56:f0:06:dc: 6d:89:44:a4:92:66:ad:ba:b6:be:3f:a1:a8:ab:d6:7c: 8d:a9:73:b0:e5:7c:71:40:f7:d5:30:73:c9:2c:06:5f: 25:6c:a6:69:68:07:05:07:7d:9d:4b:03:9d:1d:e5:44 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:72:1d:11:6d:a8:88:c8:4f:92:09:3f:41: 90:c5:86:f4:68:8e:04:6a:5f:be:ea:b3:3a:d4:a1:c8: 02:1c:06:2b:d3:5a:1c:ce:bf:14:b2:73:68:d5:35:2b: 88:26:6c:84:2c:23:8b:86:8b:ae:c9:b7:c8:bd Fingerprint (SHA-256): BB:20:43:E1:E1:69:72:29:30:3A:D9:92:19:19:B0:56:02:AB:74:4D:0E:45:87:48:8E:86:2A:C4:B6:F3:A7:34 Fingerprint (SHA1): 25:17:7C:5A:11:C9:AB:DC:21:71:2F:10:98:81:8C:A2:87:2F:59:5F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #11487: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #11488: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 10 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11489: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #11490: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #11491: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11492: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11493: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11494: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #11495: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11496: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11497: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11498: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #11499: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11500: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11501: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11502: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #11503: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11504: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11505: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11506: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #11507: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11508: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11509: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11510: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #11511: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11512: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11513: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11514: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20170510130309Z nextupdate=20180510130309Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed May 10 13:03:09 2017 Next Update: Thu May 10 13:03:09 2018 CRL Extensions: chains.sh: #11515: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510130310Z nextupdate=20180510130310Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 13:03:10 2017 Next Update: Thu May 10 13:03:10 2018 CRL Extensions: chains.sh: #11516: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170510130310Z nextupdate=20180510130310Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed May 10 13:03:10 2017 Next Update: Thu May 10 13:03:10 2018 CRL Extensions: chains.sh: #11517: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20170510130310Z nextupdate=20180510130310Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed May 10 13:03:10 2017 Next Update: Thu May 10 13:03:10 2018 CRL Extensions: chains.sh: #11518: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170510130312Z addcert 14 20170510130312Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed May 10 13:03:12 2017 Next Update: Thu May 10 13:03:10 2018 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Wed May 10 13:03:12 2017 CRL Extensions: chains.sh: #11519: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510130313Z addcert 15 20170510130313Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 13:03:13 2017 Next Update: Thu May 10 13:03:10 2018 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Wed May 10 13:03:13 2017 CRL Extensions: chains.sh: #11520: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #11521: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11522: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #11523: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #11524: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #11525: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #11526: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #11527: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #11528: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #11529: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:02:56 2017 Not After : Tue May 10 13:02:56 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:19:7d:34:d4:4d:ab:b5:ee:44:fb:51:0a:3f:48:a0: be:45:48:81:a4:bf:ca:e9:52:ee:91:61:01:64:07:14: a9:80:c3:59:a9:e8:79:f2:dd:df:de:73:24:e2:6c:94: 06:21:c3:df:5a:94:e7:64:53:29:f1:a9:f1:97:c8:50: 59:29:cb:b7:df:bd:20:e2:c9:2b:90:da:b7:6d:82:8d: 11:f9:ad:1a:7d:a5:c3:20:cb:ae:f5:c1:b2:31:a7:66: 1a:77:fd:83:6d:58:47:73:86:12:bb:33:4f:94:7b:49: f4:84:44:86:c4:91:5a:93:2a:c2:55:12:b4:a9:42:73: 35:0e:d6:76:22:33:1c:ff:e2:1a:7e:69:ff:e5:89:88: 4a:1d:a3:1d:54:87:5f:0d:8d:4a:5c:08:da:73:f1:61: 13:70:27:57:63:ed:22:43:29:31:8b:4b:50:fd:ee:0e: e3:db:f5:de:b1:29:27:e6:12:c0:d4:bc:9e:f2:ee:20: 5d:a2:62:48:33:56:cb:59:0b:a6:81:11:d3:7d:5e:d1: c4:81:a9:20:5e:b9:2a:97:c3:dc:3e:57:87:0a:75:a4: 4d:37:ca:2d:15:a3:ad:70:a5:d6:f7:4e:14:26:07:7e: 89:27:db:b9:43:21:bb:d3:ad:88:f6:c3:66:37:62:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 12:05:f1:72:c2:99:0c:58:a3:af:e6:44:17:38:8d:0e: a8:4b:b0:b8:5e:bb:1d:91:93:ff:30:8c:b9:fd:f0:c8: ea:3f:ca:da:78:f7:25:e4:01:d4:cc:5a:5c:09:a4:97: da:f2:1f:78:79:c9:6d:e7:b1:5e:e5:fd:86:7f:d8:3a: ef:a5:7a:0b:f6:8d:9c:76:b6:a6:b9:ec:48:3d:8e:cb: fc:e3:44:cb:fe:4b:45:f8:d4:96:b6:84:36:6c:46:ad: bb:e0:c1:eb:b5:d9:a2:69:db:f7:30:9a:bb:17:26:a4: f4:51:cd:9d:67:d9:29:d1:0f:15:f4:01:34:36:7a:82: 9e:09:da:5a:21:f7:3f:8b:ed:6d:ef:2d:8e:c5:5d:31: 6e:98:cc:26:61:a8:c5:68:1f:88:15:a4:6b:f5:1e:6a: 69:81:69:a1:88:dd:72:62:f4:a8:09:4e:bb:9f:58:f9: 03:65:88:ec:74:d3:63:4c:26:da:74:9c:0d:c0:19:d3: c8:c8:04:9b:45:29:1f:9e:88:67:6f:2d:ae:a2:c8:e4: 0f:3a:59:68:b0:b4:e3:40:06:76:f6:28:55:6f:20:94: 87:82:a7:f2:ce:54:8a:92:a8:9b:25:4f:df:96:3a:5c: 87:67:1d:38:47:3f:93:e8:5c:02:41:7e:22:8c:f6:29 Fingerprint (SHA-256): E7:5A:75:03:5F:2D:B0:2B:E9:64:A1:F0:5E:A2:27:9C:47:7A:F1:4D:60:C6:D0:BF:34:73:1F:BE:53:43:28:F9 Fingerprint (SHA1): EC:53:C5:FD:16:E8:07:35:16:D5:29:A3:81:D9:FC:BA:7E:8F:3A:E6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #11530: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #11531: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:02:56 2017 Not After : Tue May 10 13:02:56 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:19:7d:34:d4:4d:ab:b5:ee:44:fb:51:0a:3f:48:a0: be:45:48:81:a4:bf:ca:e9:52:ee:91:61:01:64:07:14: a9:80:c3:59:a9:e8:79:f2:dd:df:de:73:24:e2:6c:94: 06:21:c3:df:5a:94:e7:64:53:29:f1:a9:f1:97:c8:50: 59:29:cb:b7:df:bd:20:e2:c9:2b:90:da:b7:6d:82:8d: 11:f9:ad:1a:7d:a5:c3:20:cb:ae:f5:c1:b2:31:a7:66: 1a:77:fd:83:6d:58:47:73:86:12:bb:33:4f:94:7b:49: f4:84:44:86:c4:91:5a:93:2a:c2:55:12:b4:a9:42:73: 35:0e:d6:76:22:33:1c:ff:e2:1a:7e:69:ff:e5:89:88: 4a:1d:a3:1d:54:87:5f:0d:8d:4a:5c:08:da:73:f1:61: 13:70:27:57:63:ed:22:43:29:31:8b:4b:50:fd:ee:0e: e3:db:f5:de:b1:29:27:e6:12:c0:d4:bc:9e:f2:ee:20: 5d:a2:62:48:33:56:cb:59:0b:a6:81:11:d3:7d:5e:d1: c4:81:a9:20:5e:b9:2a:97:c3:dc:3e:57:87:0a:75:a4: 4d:37:ca:2d:15:a3:ad:70:a5:d6:f7:4e:14:26:07:7e: 89:27:db:b9:43:21:bb:d3:ad:88:f6:c3:66:37:62:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 12:05:f1:72:c2:99:0c:58:a3:af:e6:44:17:38:8d:0e: a8:4b:b0:b8:5e:bb:1d:91:93:ff:30:8c:b9:fd:f0:c8: ea:3f:ca:da:78:f7:25:e4:01:d4:cc:5a:5c:09:a4:97: da:f2:1f:78:79:c9:6d:e7:b1:5e:e5:fd:86:7f:d8:3a: ef:a5:7a:0b:f6:8d:9c:76:b6:a6:b9:ec:48:3d:8e:cb: fc:e3:44:cb:fe:4b:45:f8:d4:96:b6:84:36:6c:46:ad: bb:e0:c1:eb:b5:d9:a2:69:db:f7:30:9a:bb:17:26:a4: f4:51:cd:9d:67:d9:29:d1:0f:15:f4:01:34:36:7a:82: 9e:09:da:5a:21:f7:3f:8b:ed:6d:ef:2d:8e:c5:5d:31: 6e:98:cc:26:61:a8:c5:68:1f:88:15:a4:6b:f5:1e:6a: 69:81:69:a1:88:dd:72:62:f4:a8:09:4e:bb:9f:58:f9: 03:65:88:ec:74:d3:63:4c:26:da:74:9c:0d:c0:19:d3: c8:c8:04:9b:45:29:1f:9e:88:67:6f:2d:ae:a2:c8:e4: 0f:3a:59:68:b0:b4:e3:40:06:76:f6:28:55:6f:20:94: 87:82:a7:f2:ce:54:8a:92:a8:9b:25:4f:df:96:3a:5c: 87:67:1d:38:47:3f:93:e8:5c:02:41:7e:22:8c:f6:29 Fingerprint (SHA-256): E7:5A:75:03:5F:2D:B0:2B:E9:64:A1:F0:5E:A2:27:9C:47:7A:F1:4D:60:C6:D0:BF:34:73:1F:BE:53:43:28:F9 Fingerprint (SHA1): EC:53:C5:FD:16:E8:07:35:16:D5:29:A3:81:D9:FC:BA:7E:8F:3A:E6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #11532: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #11533: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #11534: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125849 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11535: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #11536: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #11537: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11538: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 510125850 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11539: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11540: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #11541: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510125740.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #11542: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0Root-510125725.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #11543: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11544: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #11545: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510125740.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #11546: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 510125851 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11547: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11548: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #11549: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510125740.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #11550: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0Root-510125726.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #11551: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11552: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #11553: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11554: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 510125852 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11555: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11556: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #11557: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510125740.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #11558: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0Root-510125727.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #11559: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11560: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #11561: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510125740.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #11562: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0Root-510125728.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #11563: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11564: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20170510130336Z nextupdate=20180510130336Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed May 10 13:03:36 2017 Next Update: Thu May 10 13:03:36 2018 CRL Extensions: chains.sh: #11565: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510130336Z nextupdate=20180510130336Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 13:03:36 2017 Next Update: Thu May 10 13:03:36 2018 CRL Extensions: chains.sh: #11566: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170510130336Z nextupdate=20180510130336Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed May 10 13:03:36 2017 Next Update: Thu May 10 13:03:36 2018 CRL Extensions: chains.sh: #11567: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20170510130337Z nextupdate=20180510130337Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed May 10 13:03:37 2017 Next Update: Thu May 10 13:03:37 2018 CRL Extensions: chains.sh: #11568: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510130338Z addcert 20 20170510130338Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 13:03:38 2017 Next Update: Thu May 10 13:03:36 2018 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed May 10 13:03:38 2017 CRL Extensions: chains.sh: #11569: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510130339Z addcert 40 20170510130339Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 13:03:39 2017 Next Update: Thu May 10 13:03:36 2018 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed May 10 13:03:38 2017 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Wed May 10 13:03:39 2017 CRL Extensions: chains.sh: #11570: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #11571: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11572: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #11573: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125849 (0x1e67e719) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:03:18 2017 Not After : Tue May 10 13:03:18 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:a7:61:82:f9:07:04:3d:4d:57:a8:18:36:8f:cc:79: 74:76:27:db:0d:8a:fc:cd:fe:2f:3a:03:68:2f:63:36: 17:3b:af:6f:b3:a9:13:4e:84:54:a3:9d:0a:c8:55:4d: 6f:82:7b:63:d8:aa:e4:cb:9a:8b:0c:12:44:73:00:b1: d9:dc:62:36:04:80:d8:f3:01:f1:f2:b8:fd:87:98:c9: bd:de:b1:af:fc:f1:7d:7a:13:5d:91:4c:7c:86:fd:87: d0:fa:ac:fc:b1:32:57:12:d9:cb:30:35:6d:03:9e:7b: 0b:fb:d7:14:0d:fd:de:7f:ac:c8:e8:b0:b7:48:1b:e8: 3b:0d:39:70:05:6b:ea:b1:38:d3:04:48:8f:48:ee:54: 72:08:6a:5d:e3:26:d8:09:74:1c:48:d9:c6:f3:4a:63: a7:56:14:38:6e:1e:de:29:bd:2e:28:00:5f:d1:cb:66: c6:61:f0:41:cf:67:36:47:85:0a:e6:fe:94:8d:80:23: cf:85:14:01:91:aa:ac:47:46:58:13:72:bb:d8:93:e8: b4:65:2c:7c:b4:4a:ab:64:db:d0:ba:96:d5:53:68:58: 69:2f:ff:65:9f:6d:c7:b8:b5:f9:ef:df:11:09:df:f8: ce:64:4b:d3:09:68:ab:16:a4:02:27:05:db:f0:78:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:fb:cd:08:e5:fd:55:3c:33:0f:da:6c:0f:7f:90:81: ff:eb:7a:1a:de:b0:c2:dc:ce:a8:ad:5b:a9:37:1f:91: 94:30:33:a2:fa:3b:65:cc:03:29:41:04:39:70:a4:eb: 86:0d:32:22:2d:20:e4:0e:11:21:6d:8e:23:a7:e4:2c: 8c:f9:d5:9b:ce:9a:9d:d5:51:e4:b4:64:08:b8:17:87: da:d8:35:3d:ff:c2:a6:b9:7d:12:ae:99:a5:46:23:4c: 03:99:6c:e2:19:bb:6a:f5:b2:f5:79:88:83:66:01:4c: c8:db:20:22:43:69:5a:9e:88:4e:22:f7:b9:4a:92:2a: ca:ff:d3:2e:ed:50:8e:c3:10:2c:ac:65:e8:3f:42:1f: 12:6d:a9:aa:fd:af:17:a1:ce:f2:d8:c8:f8:ae:01:4a: a3:47:d7:da:14:a7:08:81:b9:9c:bd:88:3c:d0:a8:07: 1d:cc:b6:fa:74:60:6d:c6:01:79:d1:32:1e:73:60:9b: eb:e0:5a:70:ca:7d:8c:e7:3d:9d:54:02:28:3e:70:2f: 0b:64:f9:8f:fe:5a:d7:04:62:cf:88:ef:a0:43:e7:e4: 5f:26:b9:06:a2:fc:b0:b4:c2:e2:1b:8f:bb:11:85:8e: af:4d:b0:1d:f6:62:18:0f:48:0c:bd:aa:b2:97:d8:79 Fingerprint (SHA-256): 35:67:A7:44:1D:E7:9E:2E:B6:A1:8C:D9:79:0A:3B:F7:0C:DC:EE:8B:95:97:E9:11:2F:18:4E:BE:4D:B9:30:5B Fingerprint (SHA1): C7:BD:31:D8:EA:04:25:76:49:30:B3:39:3D:28:46:CB:5F:D8:A4:3B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #11574: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #11575: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125849 (0x1e67e719) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:03:18 2017 Not After : Tue May 10 13:03:18 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:a7:61:82:f9:07:04:3d:4d:57:a8:18:36:8f:cc:79: 74:76:27:db:0d:8a:fc:cd:fe:2f:3a:03:68:2f:63:36: 17:3b:af:6f:b3:a9:13:4e:84:54:a3:9d:0a:c8:55:4d: 6f:82:7b:63:d8:aa:e4:cb:9a:8b:0c:12:44:73:00:b1: d9:dc:62:36:04:80:d8:f3:01:f1:f2:b8:fd:87:98:c9: bd:de:b1:af:fc:f1:7d:7a:13:5d:91:4c:7c:86:fd:87: d0:fa:ac:fc:b1:32:57:12:d9:cb:30:35:6d:03:9e:7b: 0b:fb:d7:14:0d:fd:de:7f:ac:c8:e8:b0:b7:48:1b:e8: 3b:0d:39:70:05:6b:ea:b1:38:d3:04:48:8f:48:ee:54: 72:08:6a:5d:e3:26:d8:09:74:1c:48:d9:c6:f3:4a:63: a7:56:14:38:6e:1e:de:29:bd:2e:28:00:5f:d1:cb:66: c6:61:f0:41:cf:67:36:47:85:0a:e6:fe:94:8d:80:23: cf:85:14:01:91:aa:ac:47:46:58:13:72:bb:d8:93:e8: b4:65:2c:7c:b4:4a:ab:64:db:d0:ba:96:d5:53:68:58: 69:2f:ff:65:9f:6d:c7:b8:b5:f9:ef:df:11:09:df:f8: ce:64:4b:d3:09:68:ab:16:a4:02:27:05:db:f0:78:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:fb:cd:08:e5:fd:55:3c:33:0f:da:6c:0f:7f:90:81: ff:eb:7a:1a:de:b0:c2:dc:ce:a8:ad:5b:a9:37:1f:91: 94:30:33:a2:fa:3b:65:cc:03:29:41:04:39:70:a4:eb: 86:0d:32:22:2d:20:e4:0e:11:21:6d:8e:23:a7:e4:2c: 8c:f9:d5:9b:ce:9a:9d:d5:51:e4:b4:64:08:b8:17:87: da:d8:35:3d:ff:c2:a6:b9:7d:12:ae:99:a5:46:23:4c: 03:99:6c:e2:19:bb:6a:f5:b2:f5:79:88:83:66:01:4c: c8:db:20:22:43:69:5a:9e:88:4e:22:f7:b9:4a:92:2a: ca:ff:d3:2e:ed:50:8e:c3:10:2c:ac:65:e8:3f:42:1f: 12:6d:a9:aa:fd:af:17:a1:ce:f2:d8:c8:f8:ae:01:4a: a3:47:d7:da:14:a7:08:81:b9:9c:bd:88:3c:d0:a8:07: 1d:cc:b6:fa:74:60:6d:c6:01:79:d1:32:1e:73:60:9b: eb:e0:5a:70:ca:7d:8c:e7:3d:9d:54:02:28:3e:70:2f: 0b:64:f9:8f:fe:5a:d7:04:62:cf:88:ef:a0:43:e7:e4: 5f:26:b9:06:a2:fc:b0:b4:c2:e2:1b:8f:bb:11:85:8e: af:4d:b0:1d:f6:62:18:0f:48:0c:bd:aa:b2:97:d8:79 Fingerprint (SHA-256): 35:67:A7:44:1D:E7:9E:2E:B6:A1:8C:D9:79:0A:3B:F7:0C:DC:EE:8B:95:97:E9:11:2F:18:4E:BE:4D:B9:30:5B Fingerprint (SHA1): C7:BD:31:D8:EA:04:25:76:49:30:B3:39:3D:28:46:CB:5F:D8:A4:3B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #11576: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #11577: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #11578: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125853 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11579: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #11580: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #11581: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11582: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 510125854 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11583: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11584: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #11585: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11586: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510125855 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11587: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11588: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #11589: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11590: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 510125856 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11591: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11592: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #11593: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125857 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11594: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #11595: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #11596: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11597: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 510125858 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11598: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11599: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #11600: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11601: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 510125859 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11602: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11603: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #11604: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #11605: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #11606: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125853 (0x1e67e71d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 13:03:43 2017 Not After : Tue May 10 13:03:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:6d:c7:77:32:ed:91:3d:10:14:af:44:fd:f2:c3:6b: 8f:a2:16:9d:3d:41:50:c1:de:fc:e3:26:71:5a:5c:40: df:98:fe:ef:4d:7b:61:fc:1d:f5:73:89:43:8e:44:3f: ff:4c:ad:9c:77:25:d7:42:2d:e5:84:ad:8b:3a:3d:68: d8:dc:04:b0:4f:6b:b8:59:1e:d6:59:e0:1b:c9:e1:f4: a8:7f:e6:0e:41:0f:ea:fb:4b:6d:38:e3:3c:22:63:67: 87:72:88:33:da:d5:be:80:7b:be:60:66:e9:bb:ab:dc: 51:8b:20:59:8b:3b:f0:e8:30:81:84:70:ff:14:db:3d: 9e:15:bf:96:18:41:58:2d:4c:1e:24:50:ee:19:5d:c9: 59:bd:1f:c1:ff:6c:91:a2:7b:af:a1:e1:a4:52:d3:77: b4:6b:5e:18:f0:0e:c0:94:39:0b:75:4c:60:21:24:27: 57:a0:e8:75:d3:0e:50:7b:57:d3:aa:bc:0b:b6:d8:fd: 06:b6:cf:43:b2:7f:4c:06:c4:ea:5d:47:97:a5:16:8b: 57:28:9a:ba:70:f0:15:5e:71:ed:21:76:7c:05:b5:bd: 35:a2:e5:66:71:24:f8:08:15:f4:7f:c7:e9:ba:99:fb: 8d:f0:3c:78:12:fb:23:5c:58:94:a3:3f:97:3b:01:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:a8:11:d7:69:7e:b7:44:15:5b:4f:90:54:24:39:7f: 46:2d:f9:db:29:25:a8:28:9c:6d:fb:0d:d4:cd:ad:bb: a3:cf:fb:77:80:f1:d4:d4:bd:93:d4:56:55:1a:4f:e3: 29:81:84:d6:2e:1a:30:82:ed:18:dc:d7:08:62:26:10: b3:64:76:69:71:98:56:d2:22:74:84:ee:dc:cf:db:db: be:94:00:d0:04:7b:92:50:70:9e:b9:9a:6b:97:e7:cc: 47:bc:21:64:ed:11:2c:2f:7f:b0:d2:36:d3:5c:02:80: 1d:0c:3a:27:85:be:35:98:bc:09:80:f3:f2:e6:81:b2: c3:b1:2b:29:67:0f:25:56:c5:3c:95:bf:4b:4d:9d:e0: a8:af:f0:af:be:0d:6b:fd:e6:5c:21:d1:6a:7f:90:2b: bb:4b:20:ac:1f:42:f2:ee:00:bc:65:20:3d:a4:25:48: 9c:02:0e:81:c1:6b:a2:f4:76:f6:f4:69:ab:10:28:cf: 08:ad:a1:4f:89:cc:58:e4:9b:28:be:c6:25:c1:b4:18: 5d:db:24:a1:9e:55:db:d0:d5:36:be:ad:7d:4d:60:fd: 5e:32:07:3f:9c:18:89:79:ad:ca:a5:f1:3a:85:87:d8: 48:9e:d3:9f:75:0c:2e:b8:17:1e:d1:0f:74:dc:65:05 Fingerprint (SHA-256): C7:CB:2E:52:C9:6E:5B:0F:12:4F:1D:01:04:BC:A7:7C:30:05:CF:18:AD:3A:F3:9D:43:C8:98:2C:0E:43:EE:AF Fingerprint (SHA1): 5A:0D:C5:89:D7:CB:8B:B4:1C:6D:76:19:2F:C3:28:3D:F2:81:F3:DA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11607: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125855 (0x1e67e71f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 13:03:47 2017 Not After : Tue May 10 13:03:47 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:c0:77:33:f1:8a:f4:d3:c1:6f:5c:56:1d:19:f4:68: 6d:e5:e5:87:e7:2a:59:ea:08:75:03:91:21:84:be:6a: 69:e7:f7:87:e2:28:36:81:43:ed:3f:04:5c:4a:d5:49: c1:99:8e:3a:32:c4:ae:c3:12:4a:25:af:fc:2f:22:a0: 13:01:9a:05:63:c5:30:81:1e:77:81:e6:02:08:79:a8: 5d:3a:b7:b5:c3:26:ac:b7:5c:fa:2f:b0:80:2b:48:69: 11:e4:df:f9:c6:f4:1b:72:82:24:95:61:63:f6:c0:28: 54:26:8b:14:96:3a:5e:fd:fb:ab:3d:c5:c4:1c:b3:0c: 25:c9:27:13:73:12:d4:74:85:5f:45:e3:cc:f5:62:0a: 43:e0:4d:7e:ef:d0:db:35:85:42:f1:41:46:a5:3f:aa: 7b:4b:56:57:55:a1:a8:53:84:e2:f5:38:f1:e1:46:55: e4:d5:42:a9:03:11:96:30:26:22:ca:e9:03:a3:84:9c: dc:93:e8:14:14:f4:61:b7:af:9d:f5:b1:c2:fa:c8:76: e9:9f:82:58:90:dc:7e:24:4b:40:ac:11:96:57:3d:ac: 20:13:ef:32:7d:7b:79:5a:41:80:df:27:0f:9b:51:9d: 0b:4b:6b:4c:b6:45:01:5b:28:d3:f5:ea:e5:c2:c7:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:00:be:b1:db:c1:68:b6:1e:9c:98:ad:67:95:ed:ab: 32:f4:51:c0:ca:0b:4b:3a:f4:da:42:81:12:19:82:73: 14:07:15:08:11:e9:4f:71:98:d4:fd:28:c7:cd:a2:8f: 93:5c:be:43:f6:44:c1:2c:fc:c6:9b:29:1d:05:e2:7f: e9:8e:5a:0a:90:e5:05:f2:85:02:42:a7:10:a7:ef:31: 21:dc:0c:f9:37:50:3c:d6:e2:6c:97:b3:0b:c7:74:24: 4c:e4:5c:6e:28:0c:34:50:14:a7:0a:ef:69:ee:74:01: 59:a3:e8:82:02:65:8b:19:16:ab:2f:ff:87:5a:2a:0d: 56:23:70:ee:6a:b1:c2:e5:9f:ad:63:65:d2:26:e4:c8: 73:05:05:06:8c:b9:87:fa:b9:b4:2f:c3:20:c2:54:f9: 61:78:cf:68:cb:3a:da:95:d1:03:6d:0e:20:1c:c4:12: 1f:7e:8f:43:97:16:76:fe:f1:33:c6:8a:48:ee:1f:29: c9:8f:08:44:96:88:24:8c:81:b6:46:be:8b:f7:67:c1: b6:25:a7:f6:66:3b:95:d8:b3:0d:7e:c7:27:aa:28:8c: b7:55:49:b7:5b:f9:99:65:06:ba:f9:dd:21:bb:ef:07: 3f:b2:52:92:97:f8:90:c0:97:d6:80:f1:28:2e:40:c1 Fingerprint (SHA-256): 7E:A3:DC:A0:13:80:AB:60:C0:B0:89:AF:E6:22:05:32:CA:EF:BA:02:5D:7F:78:61:FE:E6:D9:76:5D:60:58:DC Fingerprint (SHA1): FB:47:AE:F2:DF:2E:85:F0:22:CD:18:39:DF:A6:EC:8B:34:71:CB:D3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #11608: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125853 (0x1e67e71d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 13:03:43 2017 Not After : Tue May 10 13:03:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:6d:c7:77:32:ed:91:3d:10:14:af:44:fd:f2:c3:6b: 8f:a2:16:9d:3d:41:50:c1:de:fc:e3:26:71:5a:5c:40: df:98:fe:ef:4d:7b:61:fc:1d:f5:73:89:43:8e:44:3f: ff:4c:ad:9c:77:25:d7:42:2d:e5:84:ad:8b:3a:3d:68: d8:dc:04:b0:4f:6b:b8:59:1e:d6:59:e0:1b:c9:e1:f4: a8:7f:e6:0e:41:0f:ea:fb:4b:6d:38:e3:3c:22:63:67: 87:72:88:33:da:d5:be:80:7b:be:60:66:e9:bb:ab:dc: 51:8b:20:59:8b:3b:f0:e8:30:81:84:70:ff:14:db:3d: 9e:15:bf:96:18:41:58:2d:4c:1e:24:50:ee:19:5d:c9: 59:bd:1f:c1:ff:6c:91:a2:7b:af:a1:e1:a4:52:d3:77: b4:6b:5e:18:f0:0e:c0:94:39:0b:75:4c:60:21:24:27: 57:a0:e8:75:d3:0e:50:7b:57:d3:aa:bc:0b:b6:d8:fd: 06:b6:cf:43:b2:7f:4c:06:c4:ea:5d:47:97:a5:16:8b: 57:28:9a:ba:70:f0:15:5e:71:ed:21:76:7c:05:b5:bd: 35:a2:e5:66:71:24:f8:08:15:f4:7f:c7:e9:ba:99:fb: 8d:f0:3c:78:12:fb:23:5c:58:94:a3:3f:97:3b:01:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:a8:11:d7:69:7e:b7:44:15:5b:4f:90:54:24:39:7f: 46:2d:f9:db:29:25:a8:28:9c:6d:fb:0d:d4:cd:ad:bb: a3:cf:fb:77:80:f1:d4:d4:bd:93:d4:56:55:1a:4f:e3: 29:81:84:d6:2e:1a:30:82:ed:18:dc:d7:08:62:26:10: b3:64:76:69:71:98:56:d2:22:74:84:ee:dc:cf:db:db: be:94:00:d0:04:7b:92:50:70:9e:b9:9a:6b:97:e7:cc: 47:bc:21:64:ed:11:2c:2f:7f:b0:d2:36:d3:5c:02:80: 1d:0c:3a:27:85:be:35:98:bc:09:80:f3:f2:e6:81:b2: c3:b1:2b:29:67:0f:25:56:c5:3c:95:bf:4b:4d:9d:e0: a8:af:f0:af:be:0d:6b:fd:e6:5c:21:d1:6a:7f:90:2b: bb:4b:20:ac:1f:42:f2:ee:00:bc:65:20:3d:a4:25:48: 9c:02:0e:81:c1:6b:a2:f4:76:f6:f4:69:ab:10:28:cf: 08:ad:a1:4f:89:cc:58:e4:9b:28:be:c6:25:c1:b4:18: 5d:db:24:a1:9e:55:db:d0:d5:36:be:ad:7d:4d:60:fd: 5e:32:07:3f:9c:18:89:79:ad:ca:a5:f1:3a:85:87:d8: 48:9e:d3:9f:75:0c:2e:b8:17:1e:d1:0f:74:dc:65:05 Fingerprint (SHA-256): C7:CB:2E:52:C9:6E:5B:0F:12:4F:1D:01:04:BC:A7:7C:30:05:CF:18:AD:3A:F3:9D:43:C8:98:2C:0E:43:EE:AF Fingerprint (SHA1): 5A:0D:C5:89:D7:CB:8B:B4:1C:6D:76:19:2F:C3:28:3D:F2:81:F3:DA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11609: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #11610: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125853 (0x1e67e71d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 13:03:43 2017 Not After : Tue May 10 13:03:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:6d:c7:77:32:ed:91:3d:10:14:af:44:fd:f2:c3:6b: 8f:a2:16:9d:3d:41:50:c1:de:fc:e3:26:71:5a:5c:40: df:98:fe:ef:4d:7b:61:fc:1d:f5:73:89:43:8e:44:3f: ff:4c:ad:9c:77:25:d7:42:2d:e5:84:ad:8b:3a:3d:68: d8:dc:04:b0:4f:6b:b8:59:1e:d6:59:e0:1b:c9:e1:f4: a8:7f:e6:0e:41:0f:ea:fb:4b:6d:38:e3:3c:22:63:67: 87:72:88:33:da:d5:be:80:7b:be:60:66:e9:bb:ab:dc: 51:8b:20:59:8b:3b:f0:e8:30:81:84:70:ff:14:db:3d: 9e:15:bf:96:18:41:58:2d:4c:1e:24:50:ee:19:5d:c9: 59:bd:1f:c1:ff:6c:91:a2:7b:af:a1:e1:a4:52:d3:77: b4:6b:5e:18:f0:0e:c0:94:39:0b:75:4c:60:21:24:27: 57:a0:e8:75:d3:0e:50:7b:57:d3:aa:bc:0b:b6:d8:fd: 06:b6:cf:43:b2:7f:4c:06:c4:ea:5d:47:97:a5:16:8b: 57:28:9a:ba:70:f0:15:5e:71:ed:21:76:7c:05:b5:bd: 35:a2:e5:66:71:24:f8:08:15:f4:7f:c7:e9:ba:99:fb: 8d:f0:3c:78:12:fb:23:5c:58:94:a3:3f:97:3b:01:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:a8:11:d7:69:7e:b7:44:15:5b:4f:90:54:24:39:7f: 46:2d:f9:db:29:25:a8:28:9c:6d:fb:0d:d4:cd:ad:bb: a3:cf:fb:77:80:f1:d4:d4:bd:93:d4:56:55:1a:4f:e3: 29:81:84:d6:2e:1a:30:82:ed:18:dc:d7:08:62:26:10: b3:64:76:69:71:98:56:d2:22:74:84:ee:dc:cf:db:db: be:94:00:d0:04:7b:92:50:70:9e:b9:9a:6b:97:e7:cc: 47:bc:21:64:ed:11:2c:2f:7f:b0:d2:36:d3:5c:02:80: 1d:0c:3a:27:85:be:35:98:bc:09:80:f3:f2:e6:81:b2: c3:b1:2b:29:67:0f:25:56:c5:3c:95:bf:4b:4d:9d:e0: a8:af:f0:af:be:0d:6b:fd:e6:5c:21:d1:6a:7f:90:2b: bb:4b:20:ac:1f:42:f2:ee:00:bc:65:20:3d:a4:25:48: 9c:02:0e:81:c1:6b:a2:f4:76:f6:f4:69:ab:10:28:cf: 08:ad:a1:4f:89:cc:58:e4:9b:28:be:c6:25:c1:b4:18: 5d:db:24:a1:9e:55:db:d0:d5:36:be:ad:7d:4d:60:fd: 5e:32:07:3f:9c:18:89:79:ad:ca:a5:f1:3a:85:87:d8: 48:9e:d3:9f:75:0c:2e:b8:17:1e:d1:0f:74:dc:65:05 Fingerprint (SHA-256): C7:CB:2E:52:C9:6E:5B:0F:12:4F:1D:01:04:BC:A7:7C:30:05:CF:18:AD:3A:F3:9D:43:C8:98:2C:0E:43:EE:AF Fingerprint (SHA1): 5A:0D:C5:89:D7:CB:8B:B4:1C:6D:76:19:2F:C3:28:3D:F2:81:F3:DA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11611: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125855 (0x1e67e71f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 13:03:47 2017 Not After : Tue May 10 13:03:47 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:c0:77:33:f1:8a:f4:d3:c1:6f:5c:56:1d:19:f4:68: 6d:e5:e5:87:e7:2a:59:ea:08:75:03:91:21:84:be:6a: 69:e7:f7:87:e2:28:36:81:43:ed:3f:04:5c:4a:d5:49: c1:99:8e:3a:32:c4:ae:c3:12:4a:25:af:fc:2f:22:a0: 13:01:9a:05:63:c5:30:81:1e:77:81:e6:02:08:79:a8: 5d:3a:b7:b5:c3:26:ac:b7:5c:fa:2f:b0:80:2b:48:69: 11:e4:df:f9:c6:f4:1b:72:82:24:95:61:63:f6:c0:28: 54:26:8b:14:96:3a:5e:fd:fb:ab:3d:c5:c4:1c:b3:0c: 25:c9:27:13:73:12:d4:74:85:5f:45:e3:cc:f5:62:0a: 43:e0:4d:7e:ef:d0:db:35:85:42:f1:41:46:a5:3f:aa: 7b:4b:56:57:55:a1:a8:53:84:e2:f5:38:f1:e1:46:55: e4:d5:42:a9:03:11:96:30:26:22:ca:e9:03:a3:84:9c: dc:93:e8:14:14:f4:61:b7:af:9d:f5:b1:c2:fa:c8:76: e9:9f:82:58:90:dc:7e:24:4b:40:ac:11:96:57:3d:ac: 20:13:ef:32:7d:7b:79:5a:41:80:df:27:0f:9b:51:9d: 0b:4b:6b:4c:b6:45:01:5b:28:d3:f5:ea:e5:c2:c7:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:00:be:b1:db:c1:68:b6:1e:9c:98:ad:67:95:ed:ab: 32:f4:51:c0:ca:0b:4b:3a:f4:da:42:81:12:19:82:73: 14:07:15:08:11:e9:4f:71:98:d4:fd:28:c7:cd:a2:8f: 93:5c:be:43:f6:44:c1:2c:fc:c6:9b:29:1d:05:e2:7f: e9:8e:5a:0a:90:e5:05:f2:85:02:42:a7:10:a7:ef:31: 21:dc:0c:f9:37:50:3c:d6:e2:6c:97:b3:0b:c7:74:24: 4c:e4:5c:6e:28:0c:34:50:14:a7:0a:ef:69:ee:74:01: 59:a3:e8:82:02:65:8b:19:16:ab:2f:ff:87:5a:2a:0d: 56:23:70:ee:6a:b1:c2:e5:9f:ad:63:65:d2:26:e4:c8: 73:05:05:06:8c:b9:87:fa:b9:b4:2f:c3:20:c2:54:f9: 61:78:cf:68:cb:3a:da:95:d1:03:6d:0e:20:1c:c4:12: 1f:7e:8f:43:97:16:76:fe:f1:33:c6:8a:48:ee:1f:29: c9:8f:08:44:96:88:24:8c:81:b6:46:be:8b:f7:67:c1: b6:25:a7:f6:66:3b:95:d8:b3:0d:7e:c7:27:aa:28:8c: b7:55:49:b7:5b:f9:99:65:06:ba:f9:dd:21:bb:ef:07: 3f:b2:52:92:97:f8:90:c0:97:d6:80:f1:28:2e:40:c1 Fingerprint (SHA-256): 7E:A3:DC:A0:13:80:AB:60:C0:B0:89:AF:E6:22:05:32:CA:EF:BA:02:5D:7F:78:61:FE:E6:D9:76:5D:60:58:DC Fingerprint (SHA1): FB:47:AE:F2:DF:2E:85:F0:22:CD:18:39:DF:A6:EC:8B:34:71:CB:D3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #11612: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #11613: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #11614: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #11615: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125853 (0x1e67e71d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 13:03:43 2017 Not After : Tue May 10 13:03:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:6d:c7:77:32:ed:91:3d:10:14:af:44:fd:f2:c3:6b: 8f:a2:16:9d:3d:41:50:c1:de:fc:e3:26:71:5a:5c:40: df:98:fe:ef:4d:7b:61:fc:1d:f5:73:89:43:8e:44:3f: ff:4c:ad:9c:77:25:d7:42:2d:e5:84:ad:8b:3a:3d:68: d8:dc:04:b0:4f:6b:b8:59:1e:d6:59:e0:1b:c9:e1:f4: a8:7f:e6:0e:41:0f:ea:fb:4b:6d:38:e3:3c:22:63:67: 87:72:88:33:da:d5:be:80:7b:be:60:66:e9:bb:ab:dc: 51:8b:20:59:8b:3b:f0:e8:30:81:84:70:ff:14:db:3d: 9e:15:bf:96:18:41:58:2d:4c:1e:24:50:ee:19:5d:c9: 59:bd:1f:c1:ff:6c:91:a2:7b:af:a1:e1:a4:52:d3:77: b4:6b:5e:18:f0:0e:c0:94:39:0b:75:4c:60:21:24:27: 57:a0:e8:75:d3:0e:50:7b:57:d3:aa:bc:0b:b6:d8:fd: 06:b6:cf:43:b2:7f:4c:06:c4:ea:5d:47:97:a5:16:8b: 57:28:9a:ba:70:f0:15:5e:71:ed:21:76:7c:05:b5:bd: 35:a2:e5:66:71:24:f8:08:15:f4:7f:c7:e9:ba:99:fb: 8d:f0:3c:78:12:fb:23:5c:58:94:a3:3f:97:3b:01:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:a8:11:d7:69:7e:b7:44:15:5b:4f:90:54:24:39:7f: 46:2d:f9:db:29:25:a8:28:9c:6d:fb:0d:d4:cd:ad:bb: a3:cf:fb:77:80:f1:d4:d4:bd:93:d4:56:55:1a:4f:e3: 29:81:84:d6:2e:1a:30:82:ed:18:dc:d7:08:62:26:10: b3:64:76:69:71:98:56:d2:22:74:84:ee:dc:cf:db:db: be:94:00:d0:04:7b:92:50:70:9e:b9:9a:6b:97:e7:cc: 47:bc:21:64:ed:11:2c:2f:7f:b0:d2:36:d3:5c:02:80: 1d:0c:3a:27:85:be:35:98:bc:09:80:f3:f2:e6:81:b2: c3:b1:2b:29:67:0f:25:56:c5:3c:95:bf:4b:4d:9d:e0: a8:af:f0:af:be:0d:6b:fd:e6:5c:21:d1:6a:7f:90:2b: bb:4b:20:ac:1f:42:f2:ee:00:bc:65:20:3d:a4:25:48: 9c:02:0e:81:c1:6b:a2:f4:76:f6:f4:69:ab:10:28:cf: 08:ad:a1:4f:89:cc:58:e4:9b:28:be:c6:25:c1:b4:18: 5d:db:24:a1:9e:55:db:d0:d5:36:be:ad:7d:4d:60:fd: 5e:32:07:3f:9c:18:89:79:ad:ca:a5:f1:3a:85:87:d8: 48:9e:d3:9f:75:0c:2e:b8:17:1e:d1:0f:74:dc:65:05 Fingerprint (SHA-256): C7:CB:2E:52:C9:6E:5B:0F:12:4F:1D:01:04:BC:A7:7C:30:05:CF:18:AD:3A:F3:9D:43:C8:98:2C:0E:43:EE:AF Fingerprint (SHA1): 5A:0D:C5:89:D7:CB:8B:B4:1C:6D:76:19:2F:C3:28:3D:F2:81:F3:DA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11616: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125857 (0x1e67e721) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed May 10 13:03:51 2017 Not After : Tue May 10 13:03:51 2067 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:6d:db:08:94:da:02:a3:c2:03:d0:1c:46:0d:a5:48: 49:26:74:81:67:d9:95:6d:01:c6:b3:01:ce:a8:d2:37: 9c:3f:77:2a:a4:15:9b:ab:b7:ea:a8:61:0f:44:83:b6: 85:3e:57:70:1c:eb:9f:a9:f1:13:2a:73:1b:c0:c1:cf: 21:4c:d1:26:a5:71:96:f4:38:71:df:4d:b3:c0:20:6a: c5:3e:3a:06:ca:20:3f:13:24:73:e0:1a:8c:f2:fb:b5: 2c:ba:c6:dc:8d:85:13:79:52:57:a3:3a:fd:36:b7:2d: 34:d6:97:1d:98:7b:94:73:91:fb:d8:3e:8f:2f:0e:cd: 2e:df:6d:f5:71:36:38:04:f9:b8:8c:aa:23:e5:8e:af: 35:88:6b:6a:c2:a0:78:43:7e:89:2c:d2:6c:cd:31:84: 65:df:ff:63:5f:04:40:e9:1c:49:01:fb:c3:1a:93:dc: 61:7d:cb:fb:d3:43:75:7f:1c:fe:0f:66:e4:85:62:e4: 97:0c:e3:ca:da:53:36:be:0b:63:d2:2f:43:bf:4a:a0: a6:1f:68:e8:e5:aa:62:2c:89:35:42:49:9f:4e:4c:ae: 8d:0a:95:d2:29:97:ca:fe:1f:c7:22:14:b4:f9:1a:d2: cf:63:b7:ce:8e:33:f9:05:9a:2d:6a:33:37:62:67:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:0b:0c:bf:7b:34:69:b1:68:74:8a:63:c1:58:ea:aa: b2:f2:57:0a:8f:cb:ed:18:e2:6c:99:3a:a1:ab:ca:cf: 6a:83:52:dc:43:59:62:9f:5d:61:4a:58:0a:fc:e3:d0: d4:7e:8e:f4:a9:e7:04:d4:af:09:59:11:e1:8f:34:36: 35:e7:87:20:54:41:ab:bd:45:54:b2:bb:84:4e:f4:29: 85:d5:c7:d1:90:56:5c:4a:3c:c7:e8:5c:3b:7f:a6:83: c4:2d:84:88:eb:d8:60:88:78:99:8c:aa:d1:92:d1:f0: ec:db:41:4d:bd:a1:ff:f2:92:80:b7:85:1c:41:57:92: c7:79:32:ac:ab:5b:58:e6:7d:83:6d:76:fa:09:e1:37: 32:b1:0b:39:f1:bb:62:7d:42:a4:13:47:11:db:57:f7: 75:ce:df:9d:f8:1b:c5:0e:ef:e9:96:c0:9a:6b:b8:e9: a9:3e:0e:90:55:f3:f6:4e:1f:bc:15:a9:b7:26:45:06: 3e:ab:58:bf:25:9e:b4:d2:c3:cc:46:57:cd:c6:08:03: a1:04:1e:cd:a3:c4:80:87:c4:76:6d:99:b3:04:7f:8a: 58:7c:a5:d7:0a:11:7c:78:36:7f:50:43:82:81:3f:f2: 98:e1:89:4a:97:37:8b:46:e7:34:94:53:85:4f:e7:9e Fingerprint (SHA-256): 2C:83:76:AB:91:F5:93:A3:05:B0:49:12:57:1A:26:0F:79:14:77:E6:17:BC:71:E9:D6:6B:91:3B:CE:68:5D:DE Fingerprint (SHA1): 0C:A5:1D:B5:F8:0D:41:13:61:9B:3A:1F:47:49:F8:DC:BE:E8:AD:24 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #11617: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125853 (0x1e67e71d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 13:03:43 2017 Not After : Tue May 10 13:03:43 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:6d:c7:77:32:ed:91:3d:10:14:af:44:fd:f2:c3:6b: 8f:a2:16:9d:3d:41:50:c1:de:fc:e3:26:71:5a:5c:40: df:98:fe:ef:4d:7b:61:fc:1d:f5:73:89:43:8e:44:3f: ff:4c:ad:9c:77:25:d7:42:2d:e5:84:ad:8b:3a:3d:68: d8:dc:04:b0:4f:6b:b8:59:1e:d6:59:e0:1b:c9:e1:f4: a8:7f:e6:0e:41:0f:ea:fb:4b:6d:38:e3:3c:22:63:67: 87:72:88:33:da:d5:be:80:7b:be:60:66:e9:bb:ab:dc: 51:8b:20:59:8b:3b:f0:e8:30:81:84:70:ff:14:db:3d: 9e:15:bf:96:18:41:58:2d:4c:1e:24:50:ee:19:5d:c9: 59:bd:1f:c1:ff:6c:91:a2:7b:af:a1:e1:a4:52:d3:77: b4:6b:5e:18:f0:0e:c0:94:39:0b:75:4c:60:21:24:27: 57:a0:e8:75:d3:0e:50:7b:57:d3:aa:bc:0b:b6:d8:fd: 06:b6:cf:43:b2:7f:4c:06:c4:ea:5d:47:97:a5:16:8b: 57:28:9a:ba:70:f0:15:5e:71:ed:21:76:7c:05:b5:bd: 35:a2:e5:66:71:24:f8:08:15:f4:7f:c7:e9:ba:99:fb: 8d:f0:3c:78:12:fb:23:5c:58:94:a3:3f:97:3b:01:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:a8:11:d7:69:7e:b7:44:15:5b:4f:90:54:24:39:7f: 46:2d:f9:db:29:25:a8:28:9c:6d:fb:0d:d4:cd:ad:bb: a3:cf:fb:77:80:f1:d4:d4:bd:93:d4:56:55:1a:4f:e3: 29:81:84:d6:2e:1a:30:82:ed:18:dc:d7:08:62:26:10: b3:64:76:69:71:98:56:d2:22:74:84:ee:dc:cf:db:db: be:94:00:d0:04:7b:92:50:70:9e:b9:9a:6b:97:e7:cc: 47:bc:21:64:ed:11:2c:2f:7f:b0:d2:36:d3:5c:02:80: 1d:0c:3a:27:85:be:35:98:bc:09:80:f3:f2:e6:81:b2: c3:b1:2b:29:67:0f:25:56:c5:3c:95:bf:4b:4d:9d:e0: a8:af:f0:af:be:0d:6b:fd:e6:5c:21:d1:6a:7f:90:2b: bb:4b:20:ac:1f:42:f2:ee:00:bc:65:20:3d:a4:25:48: 9c:02:0e:81:c1:6b:a2:f4:76:f6:f4:69:ab:10:28:cf: 08:ad:a1:4f:89:cc:58:e4:9b:28:be:c6:25:c1:b4:18: 5d:db:24:a1:9e:55:db:d0:d5:36:be:ad:7d:4d:60:fd: 5e:32:07:3f:9c:18:89:79:ad:ca:a5:f1:3a:85:87:d8: 48:9e:d3:9f:75:0c:2e:b8:17:1e:d1:0f:74:dc:65:05 Fingerprint (SHA-256): C7:CB:2E:52:C9:6E:5B:0F:12:4F:1D:01:04:BC:A7:7C:30:05:CF:18:AD:3A:F3:9D:43:C8:98:2C:0E:43:EE:AF Fingerprint (SHA1): 5A:0D:C5:89:D7:CB:8B:B4:1C:6D:76:19:2F:C3:28:3D:F2:81:F3:DA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11618: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #11619: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #11620: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #11621: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #11622: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #11623: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125858 (0x1e67e722) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed May 10 13:03:53 2017 Not After : Tue May 10 13:03:53 2022 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:f5:40:79:a2:9d:02:56:ca:95:51:ac:d0:4a:41:a6: 09:ac:e3:29:7c:31:1f:7d:45:d3:a1:7b:48:31:0f:a7: 7d:49:0f:1a:b1:d4:28:c0:1d:4c:67:59:5f:a6:1c:9a: 01:fa:30:cf:a2:6d:87:74:1e:e7:8f:c8:bb:16:06:3b: e9:67:8a:df:33:7c:3a:1d:e3:55:8f:73:93:f2:1c:a3: 8e:6f:26:d8:2c:4c:0f:8d:12:b5:71:be:f5:e1:af:35: f4:43:b2:71:d9:9c:58:b2:0f:0e:0f:c4:48:9e:93:0d: f1:04:96:a0:95:90:3e:a6:ba:9a:62:c0:93:c6:2a:e6: 80:7b:2d:99:6a:84:17:cc:04:11:8c:96:ec:7e:b0:88: de:16:b4:91:94:c6:02:0d:f2:35:a8:d1:19:fe:b2:f3: 6d:d3:93:15:6b:e3:0c:a3:c1:09:6a:d8:a5:b6:c1:ef: 0a:0c:b6:6d:a3:19:bc:2b:df:d1:08:1b:25:e1:92:7b: d8:0e:fb:28:ff:09:16:69:0d:77:cc:fd:2f:c9:78:f3: 98:41:84:04:58:0c:2f:6f:17:98:ff:08:67:67:e0:79: 1a:a2:77:39:ae:15:2d:15:53:2d:5d:2c:54:53:a0:5a: 46:44:3a:38:b1:d6:bc:20:e6:b0:3f:4c:14:0d:1b:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 21:9b:cf:32:cd:12:16:b4:09:5b:2f:9c:00:f8:26:fa: d1:f8:21:a3:48:15:29:3d:3d:71:0d:f6:80:75:1a:fe: 09:ef:c4:20:c0:f7:13:c1:4d:b5:09:ea:51:39:b7:c2: 0b:67:3f:96:a8:bd:86:ed:ab:05:7c:e0:b4:b1:cf:21: df:52:96:5b:96:46:f3:75:a7:b6:64:d0:95:03:64:4d: 4f:a6:94:8d:66:39:97:f3:d0:7a:92:87:7d:f7:25:2f: af:81:4e:14:aa:d4:d9:17:02:16:59:0b:18:d8:1a:18: 56:ae:d4:0c:f7:e4:55:55:e6:0c:22:3e:fc:67:69:24: 8f:63:e5:69:12:e9:2a:03:cf:4b:02:61:be:8b:78:9b: c3:d4:11:9f:69:6b:32:53:e1:21:a4:7b:f7:b0:ab:13: 98:a2:13:a6:58:69:45:22:95:09:84:d0:11:e0:2e:65: 4e:2d:7d:60:ca:d3:cf:d0:59:67:08:dd:a3:13:1c:d8: c9:b7:7c:0e:85:c0:ea:71:29:37:6a:c1:5d:4b:d4:32: d7:1d:50:06:d0:f3:79:2d:f7:b0:11:61:20:18:b4:66: 9b:c4:56:b0:8d:83:84:ee:b7:48:b0:ce:a8:5d:a5:ac: fc:77:a8:44:bf:bb:ff:4c:41:36:9a:d4:75:df:97:fa Fingerprint (SHA-256): 7F:A4:FA:AD:A9:4C:87:D9:6B:4F:9B:6B:0E:56:47:BD:CB:4D:07:12:BD:5F:9C:ED:0C:04:77:3D:04:64:CA:98 Fingerprint (SHA1): 24:F5:48:FC:B4:D6:0A:02:EC:8B:2D:0D:32:87:0B:BA:77:CC:E7:CB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #11624: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #11625: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #11626: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #11627: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #11628: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #11629: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #11630: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #11631: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #11632: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #11633: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #11634: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #11635: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #11636: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #11637: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #11638: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #11639: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #11640: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #11641: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #11642: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #11643: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #11644: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #11645: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #11646: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #11647: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 2374 at Wed May 10 13:04:10 UTC 2017 kill -USR1 2374 httpserv: normal termination httpserv -b -p 9218 2>/dev/null; httpserv with PID 2374 killed at Wed May 10 13:04:10 UTC 2017 httpserv starting at Wed May 10 13:04:10 UTC 2017 httpserv -D -p 9218 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.1556 & trying to connect to httpserv at Wed May 10 13:04:10 UTC 2017 tstclnt -p 9218 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9218 (address=::1) tstclnt: exiting with return code 0 kill -0 17794 >/dev/null 2>/dev/null httpserv with PID 17794 found at Wed May 10 13:04:10 UTC 2017 httpserv with PID 17794 started at Wed May 10 13:04:10 UTC 2017 chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #11648: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125860 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11649: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #11650: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #11651: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125861 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11652: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #11653: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #11654: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11655: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 510125862 -7 Bridge@Army < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11656: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11657: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 510125863 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11658: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11659: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #11660: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #11661: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11662: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 510125864 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11663: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11664: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #11665: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #11666: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #11667: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125861 (0x1e67e725) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 13:04:14 2017 Not After : Tue May 10 13:04:14 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:cb:c7:23:f7:79:e6:20:32:d4:4f:9b:66:ed:7f:31: 5c:e3:44:d5:f4:8a:de:e0:e0:84:cd:4a:f0:10:ba:6e: dd:08:c7:27:68:dc:cc:f4:95:1c:d9:8b:df:c0:b2:80: c7:01:3a:ac:a6:02:f3:1f:c4:ef:43:36:bc:a8:a5:4c: 12:0d:17:d2:f8:90:62:35:05:8e:33:80:a5:72:78:bd: 66:5c:fc:81:18:47:f7:58:7f:0d:92:8e:fe:2c:f9:b7: 29:dd:b8:fb:dd:63:06:1a:2f:7c:f0:21:7c:fb:05:59: 49:e6:ca:70:5f:3a:16:2c:43:21:9b:53:37:58:62:95: ee:7c:38:1a:99:ab:29:c7:12:e7:10:80:d1:46:a7:41: 84:59:ad:01:c9:17:71:12:28:09:e2:35:a9:c4:2a:77: 38:9f:8b:54:5d:c5:01:58:ea:d2:46:2b:c9:70:6f:7b: ff:cd:ab:f1:fe:5b:e2:4f:51:82:bb:c5:2f:c9:a3:ba: da:24:79:fe:f9:dd:d9:95:4c:bf:cb:59:cb:60:37:b3: 72:b3:46:46:40:56:37:72:41:96:c1:6a:3e:0d:2c:94: 5c:8c:38:a8:c5:40:14:1d:ff:e4:0b:af:37:e7:47:8b: b9:d8:da:76:1a:5c:3b:d1:86:3a:73:fb:69:af:95:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:a9:e2:30:02:d0:47:32:66:57:a5:f9:90:f2:a5:8e: a0:65:7d:6c:c6:9f:61:59:cf:ea:0e:25:b7:5c:ba:eb: b0:b7:44:f4:96:94:ea:eb:f8:8d:fe:05:fb:be:60:b4: 1b:99:88:fb:da:d0:d2:29:e4:ac:6d:e7:51:ca:2c:fa: da:34:3a:ea:48:53:12:f4:22:7a:d2:8a:cd:5a:3e:49: 66:7f:65:6f:81:ad:6c:d3:16:bd:d6:b1:2d:bb:b9:2e: 02:d0:52:58:b8:5e:27:d4:4e:f9:bf:70:1e:a2:1c:dd: 0c:65:cc:54:e7:67:9b:01:13:03:9e:a8:8e:00:6c:b8: eb:b4:f4:92:71:08:3b:87:b1:28:25:7e:13:36:20:a0: 14:f8:bd:c5:bd:e3:65:ca:13:04:6d:fe:19:3f:1a:b8: 63:6f:24:58:3b:af:80:06:87:ed:46:89:5d:17:5a:4f: 59:51:94:1e:d5:3c:9d:cc:48:cf:c4:b3:b4:c9:7a:47: be:64:6a:9f:10:70:86:07:cb:49:90:3d:a8:54:ce:22: 68:2c:29:7a:c5:c2:f0:8c:6a:7a:28:e6:8d:6d:da:d9: 71:9c:ff:d2:bc:4d:ec:5e:e3:0b:3a:6a:29:26:e6:88: e8:5e:1d:f9:27:ca:7c:32:20:a9:56:70:a3:27:14:97 Fingerprint (SHA-256): 0E:6A:3A:38:06:CF:7F:4D:AE:80:69:2B:07:25:69:D5:FA:DE:6B:4F:A6:92:19:05:71:89:4E:D0:B4:0B:10:2F Fingerprint (SHA1): 04:3E:9E:D9:97:98:6E:7B:5F:4B:3A:B3:68:46:A4:A6:C7:5C:7C:2D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #11668: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125860 (0x1e67e724) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 13:04:12 2017 Not After : Tue May 10 13:04:12 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:bf:3a:e8:62:7f:31:95:4f:ca:85:67:29:c4:10:8f: 15:2b:b1:25:c4:45:8d:90:4b:36:51:50:cf:62:5c:db: eb:be:90:61:71:30:66:44:f0:7a:57:54:1f:55:1f:e1: d7:61:23:e0:0e:a8:99:84:e8:fe:6b:1a:79:f2:6a:85: 6e:c9:6d:8b:d5:6f:f4:44:03:54:eb:13:12:02:62:3c: c7:75:22:79:4c:16:cb:91:81:8e:27:3f:8b:08:ad:94: b7:99:9a:82:88:b4:18:7d:d0:c5:2a:0d:99:6d:5b:22: cb:a6:ef:c2:fa:79:78:ca:2e:cd:f2:3a:df:2d:16:96: c2:cd:3e:af:24:73:0c:cd:c7:4d:3f:ba:cd:0e:31:84: 4d:c8:a0:85:89:03:f9:00:96:df:d2:79:cb:aa:54:c0: 25:57:76:ff:bb:f0:43:d6:51:5c:b8:07:0c:a2:d5:8f: 4d:29:8b:ff:c5:c8:6e:c2:40:6f:1e:42:dd:f8:78:12: ec:c8:c2:51:bf:e6:bd:91:b5:c8:65:c5:24:de:eb:ff: 83:95:7b:b2:e2:25:a2:54:b9:50:f7:e7:06:5b:a2:d2: a0:af:3b:87:a0:37:41:17:d0:9c:d7:8b:34:db:15:c4: ee:28:49:31:13:33:ea:56:e4:14:fb:d1:44:92:4b:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:f5:14:cb:d4:a3:dc:04:26:d7:ad:56:b3:91:dd:4d: 37:7e:28:02:ab:4f:a9:eb:18:6e:04:14:89:b6:a4:b6: 11:9e:4c:25:64:1a:0e:fc:fe:59:5d:b7:7b:11:4a:b0: 9f:2e:9d:de:f6:b8:e0:db:c6:94:d9:70:a0:ee:e4:6d: 5c:5d:7c:4b:27:18:10:b8:57:dd:6e:0c:20:8f:fe:b3: 1d:77:0d:4f:d3:69:e8:dd:28:f9:c2:d5:ac:dc:8f:de: 8b:c8:a4:25:a7:2f:30:3a:a8:8c:43:ef:ed:f2:ac:98: 98:50:49:7e:63:fb:d3:ba:b8:ce:8c:e0:e0:5f:a6:cf: e5:d3:d8:9b:05:28:28:14:86:97:57:94:fc:7d:8b:60: 8c:24:02:28:77:4e:ff:b1:b6:5a:99:4b:81:85:58:b9: 88:ef:80:15:61:d8:6d:f6:42:2b:b4:41:72:9e:e1:1f: 01:a4:b9:49:4f:24:06:7e:4c:c1:46:66:34:af:af:48: 9d:22:2f:d2:b8:5a:8d:1d:8a:a8:97:d7:e8:66:d5:b4: 4c:44:97:a8:5c:b4:5f:1b:63:2f:cd:7b:b6:b3:6f:9a: dc:8a:52:cf:8c:40:7c:5d:f6:9a:b7:b5:90:cf:6b:99: 3c:53:f4:52:4f:92:e8:20:d3:d0:5c:56:61:a6:17:10 Fingerprint (SHA-256): 2C:4F:BB:4F:2C:04:40:02:B2:52:12:14:16:7D:55:DA:F3:BB:85:9A:49:0A:C3:4B:7E:6A:A7:A0:91:B5:95:41 Fingerprint (SHA1): 1D:D5:9D:C8:F4:55:D6:92:67:FA:E3:71:BC:02:79:11:B2:80:3C:39 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #11669: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #11670: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #11671: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #11672: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125860 (0x1e67e724) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 13:04:12 2017 Not After : Tue May 10 13:04:12 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:bf:3a:e8:62:7f:31:95:4f:ca:85:67:29:c4:10:8f: 15:2b:b1:25:c4:45:8d:90:4b:36:51:50:cf:62:5c:db: eb:be:90:61:71:30:66:44:f0:7a:57:54:1f:55:1f:e1: d7:61:23:e0:0e:a8:99:84:e8:fe:6b:1a:79:f2:6a:85: 6e:c9:6d:8b:d5:6f:f4:44:03:54:eb:13:12:02:62:3c: c7:75:22:79:4c:16:cb:91:81:8e:27:3f:8b:08:ad:94: b7:99:9a:82:88:b4:18:7d:d0:c5:2a:0d:99:6d:5b:22: cb:a6:ef:c2:fa:79:78:ca:2e:cd:f2:3a:df:2d:16:96: c2:cd:3e:af:24:73:0c:cd:c7:4d:3f:ba:cd:0e:31:84: 4d:c8:a0:85:89:03:f9:00:96:df:d2:79:cb:aa:54:c0: 25:57:76:ff:bb:f0:43:d6:51:5c:b8:07:0c:a2:d5:8f: 4d:29:8b:ff:c5:c8:6e:c2:40:6f:1e:42:dd:f8:78:12: ec:c8:c2:51:bf:e6:bd:91:b5:c8:65:c5:24:de:eb:ff: 83:95:7b:b2:e2:25:a2:54:b9:50:f7:e7:06:5b:a2:d2: a0:af:3b:87:a0:37:41:17:d0:9c:d7:8b:34:db:15:c4: ee:28:49:31:13:33:ea:56:e4:14:fb:d1:44:92:4b:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:f5:14:cb:d4:a3:dc:04:26:d7:ad:56:b3:91:dd:4d: 37:7e:28:02:ab:4f:a9:eb:18:6e:04:14:89:b6:a4:b6: 11:9e:4c:25:64:1a:0e:fc:fe:59:5d:b7:7b:11:4a:b0: 9f:2e:9d:de:f6:b8:e0:db:c6:94:d9:70:a0:ee:e4:6d: 5c:5d:7c:4b:27:18:10:b8:57:dd:6e:0c:20:8f:fe:b3: 1d:77:0d:4f:d3:69:e8:dd:28:f9:c2:d5:ac:dc:8f:de: 8b:c8:a4:25:a7:2f:30:3a:a8:8c:43:ef:ed:f2:ac:98: 98:50:49:7e:63:fb:d3:ba:b8:ce:8c:e0:e0:5f:a6:cf: e5:d3:d8:9b:05:28:28:14:86:97:57:94:fc:7d:8b:60: 8c:24:02:28:77:4e:ff:b1:b6:5a:99:4b:81:85:58:b9: 88:ef:80:15:61:d8:6d:f6:42:2b:b4:41:72:9e:e1:1f: 01:a4:b9:49:4f:24:06:7e:4c:c1:46:66:34:af:af:48: 9d:22:2f:d2:b8:5a:8d:1d:8a:a8:97:d7:e8:66:d5:b4: 4c:44:97:a8:5c:b4:5f:1b:63:2f:cd:7b:b6:b3:6f:9a: dc:8a:52:cf:8c:40:7c:5d:f6:9a:b7:b5:90:cf:6b:99: 3c:53:f4:52:4f:92:e8:20:d3:d0:5c:56:61:a6:17:10 Fingerprint (SHA-256): 2C:4F:BB:4F:2C:04:40:02:B2:52:12:14:16:7D:55:DA:F3:BB:85:9A:49:0A:C3:4B:7E:6A:A7:A0:91:B5:95:41 Fingerprint (SHA1): 1D:D5:9D:C8:F4:55:D6:92:67:FA:E3:71:BC:02:79:11:B2:80:3C:39 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #11673: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125861 (0x1e67e725) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 13:04:14 2017 Not After : Tue May 10 13:04:14 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:cb:c7:23:f7:79:e6:20:32:d4:4f:9b:66:ed:7f:31: 5c:e3:44:d5:f4:8a:de:e0:e0:84:cd:4a:f0:10:ba:6e: dd:08:c7:27:68:dc:cc:f4:95:1c:d9:8b:df:c0:b2:80: c7:01:3a:ac:a6:02:f3:1f:c4:ef:43:36:bc:a8:a5:4c: 12:0d:17:d2:f8:90:62:35:05:8e:33:80:a5:72:78:bd: 66:5c:fc:81:18:47:f7:58:7f:0d:92:8e:fe:2c:f9:b7: 29:dd:b8:fb:dd:63:06:1a:2f:7c:f0:21:7c:fb:05:59: 49:e6:ca:70:5f:3a:16:2c:43:21:9b:53:37:58:62:95: ee:7c:38:1a:99:ab:29:c7:12:e7:10:80:d1:46:a7:41: 84:59:ad:01:c9:17:71:12:28:09:e2:35:a9:c4:2a:77: 38:9f:8b:54:5d:c5:01:58:ea:d2:46:2b:c9:70:6f:7b: ff:cd:ab:f1:fe:5b:e2:4f:51:82:bb:c5:2f:c9:a3:ba: da:24:79:fe:f9:dd:d9:95:4c:bf:cb:59:cb:60:37:b3: 72:b3:46:46:40:56:37:72:41:96:c1:6a:3e:0d:2c:94: 5c:8c:38:a8:c5:40:14:1d:ff:e4:0b:af:37:e7:47:8b: b9:d8:da:76:1a:5c:3b:d1:86:3a:73:fb:69:af:95:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:a9:e2:30:02:d0:47:32:66:57:a5:f9:90:f2:a5:8e: a0:65:7d:6c:c6:9f:61:59:cf:ea:0e:25:b7:5c:ba:eb: b0:b7:44:f4:96:94:ea:eb:f8:8d:fe:05:fb:be:60:b4: 1b:99:88:fb:da:d0:d2:29:e4:ac:6d:e7:51:ca:2c:fa: da:34:3a:ea:48:53:12:f4:22:7a:d2:8a:cd:5a:3e:49: 66:7f:65:6f:81:ad:6c:d3:16:bd:d6:b1:2d:bb:b9:2e: 02:d0:52:58:b8:5e:27:d4:4e:f9:bf:70:1e:a2:1c:dd: 0c:65:cc:54:e7:67:9b:01:13:03:9e:a8:8e:00:6c:b8: eb:b4:f4:92:71:08:3b:87:b1:28:25:7e:13:36:20:a0: 14:f8:bd:c5:bd:e3:65:ca:13:04:6d:fe:19:3f:1a:b8: 63:6f:24:58:3b:af:80:06:87:ed:46:89:5d:17:5a:4f: 59:51:94:1e:d5:3c:9d:cc:48:cf:c4:b3:b4:c9:7a:47: be:64:6a:9f:10:70:86:07:cb:49:90:3d:a8:54:ce:22: 68:2c:29:7a:c5:c2:f0:8c:6a:7a:28:e6:8d:6d:da:d9: 71:9c:ff:d2:bc:4d:ec:5e:e3:0b:3a:6a:29:26:e6:88: e8:5e:1d:f9:27:ca:7c:32:20:a9:56:70:a3:27:14:97 Fingerprint (SHA-256): 0E:6A:3A:38:06:CF:7F:4D:AE:80:69:2B:07:25:69:D5:FA:DE:6B:4F:A6:92:19:05:71:89:4E:D0:B4:0B:10:2F Fingerprint (SHA1): 04:3E:9E:D9:97:98:6E:7B:5F:4B:3A:B3:68:46:A4:A6:C7:5C:7C:2D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #11674: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #11675: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #11676: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #11677: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #11678: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #11679: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125861 (0x1e67e725) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 13:04:14 2017 Not After : Tue May 10 13:04:14 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:cb:c7:23:f7:79:e6:20:32:d4:4f:9b:66:ed:7f:31: 5c:e3:44:d5:f4:8a:de:e0:e0:84:cd:4a:f0:10:ba:6e: dd:08:c7:27:68:dc:cc:f4:95:1c:d9:8b:df:c0:b2:80: c7:01:3a:ac:a6:02:f3:1f:c4:ef:43:36:bc:a8:a5:4c: 12:0d:17:d2:f8:90:62:35:05:8e:33:80:a5:72:78:bd: 66:5c:fc:81:18:47:f7:58:7f:0d:92:8e:fe:2c:f9:b7: 29:dd:b8:fb:dd:63:06:1a:2f:7c:f0:21:7c:fb:05:59: 49:e6:ca:70:5f:3a:16:2c:43:21:9b:53:37:58:62:95: ee:7c:38:1a:99:ab:29:c7:12:e7:10:80:d1:46:a7:41: 84:59:ad:01:c9:17:71:12:28:09:e2:35:a9:c4:2a:77: 38:9f:8b:54:5d:c5:01:58:ea:d2:46:2b:c9:70:6f:7b: ff:cd:ab:f1:fe:5b:e2:4f:51:82:bb:c5:2f:c9:a3:ba: da:24:79:fe:f9:dd:d9:95:4c:bf:cb:59:cb:60:37:b3: 72:b3:46:46:40:56:37:72:41:96:c1:6a:3e:0d:2c:94: 5c:8c:38:a8:c5:40:14:1d:ff:e4:0b:af:37:e7:47:8b: b9:d8:da:76:1a:5c:3b:d1:86:3a:73:fb:69:af:95:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:a9:e2:30:02:d0:47:32:66:57:a5:f9:90:f2:a5:8e: a0:65:7d:6c:c6:9f:61:59:cf:ea:0e:25:b7:5c:ba:eb: b0:b7:44:f4:96:94:ea:eb:f8:8d:fe:05:fb:be:60:b4: 1b:99:88:fb:da:d0:d2:29:e4:ac:6d:e7:51:ca:2c:fa: da:34:3a:ea:48:53:12:f4:22:7a:d2:8a:cd:5a:3e:49: 66:7f:65:6f:81:ad:6c:d3:16:bd:d6:b1:2d:bb:b9:2e: 02:d0:52:58:b8:5e:27:d4:4e:f9:bf:70:1e:a2:1c:dd: 0c:65:cc:54:e7:67:9b:01:13:03:9e:a8:8e:00:6c:b8: eb:b4:f4:92:71:08:3b:87:b1:28:25:7e:13:36:20:a0: 14:f8:bd:c5:bd:e3:65:ca:13:04:6d:fe:19:3f:1a:b8: 63:6f:24:58:3b:af:80:06:87:ed:46:89:5d:17:5a:4f: 59:51:94:1e:d5:3c:9d:cc:48:cf:c4:b3:b4:c9:7a:47: be:64:6a:9f:10:70:86:07:cb:49:90:3d:a8:54:ce:22: 68:2c:29:7a:c5:c2:f0:8c:6a:7a:28:e6:8d:6d:da:d9: 71:9c:ff:d2:bc:4d:ec:5e:e3:0b:3a:6a:29:26:e6:88: e8:5e:1d:f9:27:ca:7c:32:20:a9:56:70:a3:27:14:97 Fingerprint (SHA-256): 0E:6A:3A:38:06:CF:7F:4D:AE:80:69:2B:07:25:69:D5:FA:DE:6B:4F:A6:92:19:05:71:89:4E:D0:B4:0B:10:2F Fingerprint (SHA1): 04:3E:9E:D9:97:98:6E:7B:5F:4B:3A:B3:68:46:A4:A6:C7:5C:7C:2D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #11680: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125861 (0x1e67e725) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 13:04:14 2017 Not After : Tue May 10 13:04:14 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:cb:c7:23:f7:79:e6:20:32:d4:4f:9b:66:ed:7f:31: 5c:e3:44:d5:f4:8a:de:e0:e0:84:cd:4a:f0:10:ba:6e: dd:08:c7:27:68:dc:cc:f4:95:1c:d9:8b:df:c0:b2:80: c7:01:3a:ac:a6:02:f3:1f:c4:ef:43:36:bc:a8:a5:4c: 12:0d:17:d2:f8:90:62:35:05:8e:33:80:a5:72:78:bd: 66:5c:fc:81:18:47:f7:58:7f:0d:92:8e:fe:2c:f9:b7: 29:dd:b8:fb:dd:63:06:1a:2f:7c:f0:21:7c:fb:05:59: 49:e6:ca:70:5f:3a:16:2c:43:21:9b:53:37:58:62:95: ee:7c:38:1a:99:ab:29:c7:12:e7:10:80:d1:46:a7:41: 84:59:ad:01:c9:17:71:12:28:09:e2:35:a9:c4:2a:77: 38:9f:8b:54:5d:c5:01:58:ea:d2:46:2b:c9:70:6f:7b: ff:cd:ab:f1:fe:5b:e2:4f:51:82:bb:c5:2f:c9:a3:ba: da:24:79:fe:f9:dd:d9:95:4c:bf:cb:59:cb:60:37:b3: 72:b3:46:46:40:56:37:72:41:96:c1:6a:3e:0d:2c:94: 5c:8c:38:a8:c5:40:14:1d:ff:e4:0b:af:37:e7:47:8b: b9:d8:da:76:1a:5c:3b:d1:86:3a:73:fb:69:af:95:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:a9:e2:30:02:d0:47:32:66:57:a5:f9:90:f2:a5:8e: a0:65:7d:6c:c6:9f:61:59:cf:ea:0e:25:b7:5c:ba:eb: b0:b7:44:f4:96:94:ea:eb:f8:8d:fe:05:fb:be:60:b4: 1b:99:88:fb:da:d0:d2:29:e4:ac:6d:e7:51:ca:2c:fa: da:34:3a:ea:48:53:12:f4:22:7a:d2:8a:cd:5a:3e:49: 66:7f:65:6f:81:ad:6c:d3:16:bd:d6:b1:2d:bb:b9:2e: 02:d0:52:58:b8:5e:27:d4:4e:f9:bf:70:1e:a2:1c:dd: 0c:65:cc:54:e7:67:9b:01:13:03:9e:a8:8e:00:6c:b8: eb:b4:f4:92:71:08:3b:87:b1:28:25:7e:13:36:20:a0: 14:f8:bd:c5:bd:e3:65:ca:13:04:6d:fe:19:3f:1a:b8: 63:6f:24:58:3b:af:80:06:87:ed:46:89:5d:17:5a:4f: 59:51:94:1e:d5:3c:9d:cc:48:cf:c4:b3:b4:c9:7a:47: be:64:6a:9f:10:70:86:07:cb:49:90:3d:a8:54:ce:22: 68:2c:29:7a:c5:c2:f0:8c:6a:7a:28:e6:8d:6d:da:d9: 71:9c:ff:d2:bc:4d:ec:5e:e3:0b:3a:6a:29:26:e6:88: e8:5e:1d:f9:27:ca:7c:32:20:a9:56:70:a3:27:14:97 Fingerprint (SHA-256): 0E:6A:3A:38:06:CF:7F:4D:AE:80:69:2B:07:25:69:D5:FA:DE:6B:4F:A6:92:19:05:71:89:4E:D0:B4:0B:10:2F Fingerprint (SHA1): 04:3E:9E:D9:97:98:6E:7B:5F:4B:3A:B3:68:46:A4:A6:C7:5C:7C:2D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #11681: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #11682: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #11683: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #11684: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #11685: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #11686: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125860 (0x1e67e724) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 13:04:12 2017 Not After : Tue May 10 13:04:12 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:bf:3a:e8:62:7f:31:95:4f:ca:85:67:29:c4:10:8f: 15:2b:b1:25:c4:45:8d:90:4b:36:51:50:cf:62:5c:db: eb:be:90:61:71:30:66:44:f0:7a:57:54:1f:55:1f:e1: d7:61:23:e0:0e:a8:99:84:e8:fe:6b:1a:79:f2:6a:85: 6e:c9:6d:8b:d5:6f:f4:44:03:54:eb:13:12:02:62:3c: c7:75:22:79:4c:16:cb:91:81:8e:27:3f:8b:08:ad:94: b7:99:9a:82:88:b4:18:7d:d0:c5:2a:0d:99:6d:5b:22: cb:a6:ef:c2:fa:79:78:ca:2e:cd:f2:3a:df:2d:16:96: c2:cd:3e:af:24:73:0c:cd:c7:4d:3f:ba:cd:0e:31:84: 4d:c8:a0:85:89:03:f9:00:96:df:d2:79:cb:aa:54:c0: 25:57:76:ff:bb:f0:43:d6:51:5c:b8:07:0c:a2:d5:8f: 4d:29:8b:ff:c5:c8:6e:c2:40:6f:1e:42:dd:f8:78:12: ec:c8:c2:51:bf:e6:bd:91:b5:c8:65:c5:24:de:eb:ff: 83:95:7b:b2:e2:25:a2:54:b9:50:f7:e7:06:5b:a2:d2: a0:af:3b:87:a0:37:41:17:d0:9c:d7:8b:34:db:15:c4: ee:28:49:31:13:33:ea:56:e4:14:fb:d1:44:92:4b:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:f5:14:cb:d4:a3:dc:04:26:d7:ad:56:b3:91:dd:4d: 37:7e:28:02:ab:4f:a9:eb:18:6e:04:14:89:b6:a4:b6: 11:9e:4c:25:64:1a:0e:fc:fe:59:5d:b7:7b:11:4a:b0: 9f:2e:9d:de:f6:b8:e0:db:c6:94:d9:70:a0:ee:e4:6d: 5c:5d:7c:4b:27:18:10:b8:57:dd:6e:0c:20:8f:fe:b3: 1d:77:0d:4f:d3:69:e8:dd:28:f9:c2:d5:ac:dc:8f:de: 8b:c8:a4:25:a7:2f:30:3a:a8:8c:43:ef:ed:f2:ac:98: 98:50:49:7e:63:fb:d3:ba:b8:ce:8c:e0:e0:5f:a6:cf: e5:d3:d8:9b:05:28:28:14:86:97:57:94:fc:7d:8b:60: 8c:24:02:28:77:4e:ff:b1:b6:5a:99:4b:81:85:58:b9: 88:ef:80:15:61:d8:6d:f6:42:2b:b4:41:72:9e:e1:1f: 01:a4:b9:49:4f:24:06:7e:4c:c1:46:66:34:af:af:48: 9d:22:2f:d2:b8:5a:8d:1d:8a:a8:97:d7:e8:66:d5:b4: 4c:44:97:a8:5c:b4:5f:1b:63:2f:cd:7b:b6:b3:6f:9a: dc:8a:52:cf:8c:40:7c:5d:f6:9a:b7:b5:90:cf:6b:99: 3c:53:f4:52:4f:92:e8:20:d3:d0:5c:56:61:a6:17:10 Fingerprint (SHA-256): 2C:4F:BB:4F:2C:04:40:02:B2:52:12:14:16:7D:55:DA:F3:BB:85:9A:49:0A:C3:4B:7E:6A:A7:A0:91:B5:95:41 Fingerprint (SHA1): 1D:D5:9D:C8:F4:55:D6:92:67:FA:E3:71:BC:02:79:11:B2:80:3C:39 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #11687: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125860 (0x1e67e724) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 13:04:12 2017 Not After : Tue May 10 13:04:12 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:bf:3a:e8:62:7f:31:95:4f:ca:85:67:29:c4:10:8f: 15:2b:b1:25:c4:45:8d:90:4b:36:51:50:cf:62:5c:db: eb:be:90:61:71:30:66:44:f0:7a:57:54:1f:55:1f:e1: d7:61:23:e0:0e:a8:99:84:e8:fe:6b:1a:79:f2:6a:85: 6e:c9:6d:8b:d5:6f:f4:44:03:54:eb:13:12:02:62:3c: c7:75:22:79:4c:16:cb:91:81:8e:27:3f:8b:08:ad:94: b7:99:9a:82:88:b4:18:7d:d0:c5:2a:0d:99:6d:5b:22: cb:a6:ef:c2:fa:79:78:ca:2e:cd:f2:3a:df:2d:16:96: c2:cd:3e:af:24:73:0c:cd:c7:4d:3f:ba:cd:0e:31:84: 4d:c8:a0:85:89:03:f9:00:96:df:d2:79:cb:aa:54:c0: 25:57:76:ff:bb:f0:43:d6:51:5c:b8:07:0c:a2:d5:8f: 4d:29:8b:ff:c5:c8:6e:c2:40:6f:1e:42:dd:f8:78:12: ec:c8:c2:51:bf:e6:bd:91:b5:c8:65:c5:24:de:eb:ff: 83:95:7b:b2:e2:25:a2:54:b9:50:f7:e7:06:5b:a2:d2: a0:af:3b:87:a0:37:41:17:d0:9c:d7:8b:34:db:15:c4: ee:28:49:31:13:33:ea:56:e4:14:fb:d1:44:92:4b:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:f5:14:cb:d4:a3:dc:04:26:d7:ad:56:b3:91:dd:4d: 37:7e:28:02:ab:4f:a9:eb:18:6e:04:14:89:b6:a4:b6: 11:9e:4c:25:64:1a:0e:fc:fe:59:5d:b7:7b:11:4a:b0: 9f:2e:9d:de:f6:b8:e0:db:c6:94:d9:70:a0:ee:e4:6d: 5c:5d:7c:4b:27:18:10:b8:57:dd:6e:0c:20:8f:fe:b3: 1d:77:0d:4f:d3:69:e8:dd:28:f9:c2:d5:ac:dc:8f:de: 8b:c8:a4:25:a7:2f:30:3a:a8:8c:43:ef:ed:f2:ac:98: 98:50:49:7e:63:fb:d3:ba:b8:ce:8c:e0:e0:5f:a6:cf: e5:d3:d8:9b:05:28:28:14:86:97:57:94:fc:7d:8b:60: 8c:24:02:28:77:4e:ff:b1:b6:5a:99:4b:81:85:58:b9: 88:ef:80:15:61:d8:6d:f6:42:2b:b4:41:72:9e:e1:1f: 01:a4:b9:49:4f:24:06:7e:4c:c1:46:66:34:af:af:48: 9d:22:2f:d2:b8:5a:8d:1d:8a:a8:97:d7:e8:66:d5:b4: 4c:44:97:a8:5c:b4:5f:1b:63:2f:cd:7b:b6:b3:6f:9a: dc:8a:52:cf:8c:40:7c:5d:f6:9a:b7:b5:90:cf:6b:99: 3c:53:f4:52:4f:92:e8:20:d3:d0:5c:56:61:a6:17:10 Fingerprint (SHA-256): 2C:4F:BB:4F:2C:04:40:02:B2:52:12:14:16:7D:55:DA:F3:BB:85:9A:49:0A:C3:4B:7E:6A:A7:A0:91:B5:95:41 Fingerprint (SHA1): 1D:D5:9D:C8:F4:55:D6:92:67:FA:E3:71:BC:02:79:11:B2:80:3C:39 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #11688: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #11689: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125865 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11690: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #11691: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #11692: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125866 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11693: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #11694: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #11695: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125867 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11696: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #11697: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #11698: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125868 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11699: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #11700: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #11701: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125869 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11702: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #11703: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #11704: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125870 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11705: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #11706: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #11707: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125871 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11708: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #11709: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #11710: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125872 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11711: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #11712: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #11713: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125873 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11714: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #11715: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #11716: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11717: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 510125874 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11718: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11719: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 510125875 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11720: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11721: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 510125876 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11722: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11723: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #11724: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #11725: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11726: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 510125877 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11727: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11728: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 510125878 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11729: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11730: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 510125879 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11731: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11732: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #11733: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #11734: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11735: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 510125880 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11736: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11737: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 510125881 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11738: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11739: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 510125882 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11740: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11741: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #11742: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #11743: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11744: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 510125883 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11745: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11746: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 510125884 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11747: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11748: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 510125885 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11749: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11750: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #11751: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #11752: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11753: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 510125886 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11754: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11755: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #11756: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11757: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510125887 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11758: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11759: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125865 (0x1e67e729) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Wed May 10 13:04:28 2017 Not After : Tue May 10 13:04:28 2067 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:8e:89:36:c8:c5:38:00:4e:29:b3:a3:e1:4b:38:0f: 4d:67:bc:28:c7:35:34:ec:60:8f:0b:1e:85:db:d1:70: 09:5e:69:79:52:b2:c4:f1:ca:5b:aa:45:e4:17:2a:80: 3b:73:bb:e8:20:b8:64:c8:78:66:5f:62:86:ec:69:eb: 4d:9b:fa:d3:3f:23:51:97:5c:f9:62:13:a2:f1:23:f4: ca:e1:c3:ca:d5:0a:c5:1a:93:76:9d:b5:96:44:c2:5c: 27:2f:c9:58:05:89:bb:be:80:c1:3c:94:1c:45:6f:1d: 5d:34:18:27:23:9c:03:5e:a3:2c:cb:34:69:55:0b:fd: 19:b1:cb:a5:bd:42:56:aa:b5:b2:2d:93:8a:19:5f:df: 68:2a:d8:10:4f:f6:ec:10:aa:81:dd:09:58:d3:57:db: fc:fb:f3:b0:71:ee:20:36:93:b5:1c:7e:d4:83:53:ea: 66:bb:f9:9d:a3:d8:d9:35:31:14:7b:18:67:c9:ed:1c: 11:5c:4c:10:70:ab:83:10:1b:fc:03:03:60:50:00:84: 69:f9:b5:6f:f9:b6:5f:65:b3:00:b6:34:c1:23:74:38: 36:79:5c:7d:88:a1:a6:c1:b4:0f:de:9a:53:98:e2:3f: 54:af:d7:d3:45:e0:7a:86:5b:1a:59:72:02:ec:8d:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:10:62:c1:47:23:3d:d0:1f:78:96:13:df:29:a8:fd: 82:1a:88:64:c6:2b:61:2f:85:6c:e9:bd:a7:f2:97:52: 82:73:21:d3:48:08:ff:11:c6:2e:bc:6b:76:e3:dc:6b: ca:2f:39:e5:a9:77:90:18:fd:24:95:93:e2:33:e3:da: fc:53:24:70:b0:9e:e3:4e:b5:b5:30:c0:0f:6f:57:b2: 79:e7:36:c7:fd:cf:a1:f5:c1:32:db:30:d2:c7:7a:76: e9:15:b5:f5:78:b4:1e:8d:59:c7:7b:6d:1e:2a:97:56: 1f:4d:dd:9f:3d:b8:4c:94:d5:e9:4a:4b:52:f0:7d:ce: 98:c5:59:c7:bc:78:35:c0:77:ba:f6:df:e1:c4:b1:44: b1:06:98:69:e6:0b:a5:2f:d3:29:7c:f6:d0:1d:dd:62: ba:23:6e:ab:7a:fa:0b:23:80:65:28:26:9a:4a:dd:91: 07:83:59:fe:a7:b1:68:29:05:de:17:79:38:61:7a:b9: 09:c7:ed:11:52:09:53:59:e9:19:14:71:19:b5:73:77: a3:a0:96:ab:00:1a:75:41:b1:45:52:66:a1:73:20:58: be:4a:61:36:5a:b1:97:f0:d5:e1:f2:30:2d:f0:44:b3: f7:e6:78:d8:81:c4:89:14:a6:ba:7b:52:f8:50:2f:6e Fingerprint (SHA-256): CB:20:99:03:28:DB:CE:38:17:A9:74:4E:E0:A7:93:26:0A:69:26:B5:56:F9:3A:F4:E5:B8:70:CA:16:8D:37:62 Fingerprint (SHA1): 90:4D:48:E9:C0:E2:08:15:E3:41:5C:ED:A3:FD:D9:21:35:FB:2E:0A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #11760: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125866 (0x1e67e72a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Wed May 10 13:04:31 2017 Not After : Tue May 10 13:04:31 2067 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:2c:11:f2:f2:6d:d1:d1:d2:06:fb:73:9a:b7:b8:57: 69:8a:50:98:04:df:89:05:88:b8:62:cd:51:37:d5:9d: ba:e5:a5:7e:0c:13:d8:e5:ba:77:4c:9e:e8:a4:3f:ba: 41:b2:97:06:f9:ed:54:4e:4e:ae:6f:a0:52:a7:05:66: 76:ef:7a:6f:39:18:38:83:20:3a:1f:dc:be:28:30:1c: d3:04:74:bc:17:1d:e4:f0:01:e9:50:fa:81:71:8e:fe: 92:73:6d:ff:06:9d:fc:f3:bc:fd:e3:08:7a:64:98:76: 8c:f1:3f:ef:34:23:70:b3:e3:31:a0:61:8b:37:e6:bc: 0d:b1:9d:a2:ba:60:3c:7f:29:5d:8d:1f:de:29:f4:9c: 8b:43:a7:d9:b7:af:d1:3d:9e:1e:08:91:b6:16:de:57: 9c:a1:64:a6:d0:08:53:ef:c3:e4:ac:b9:8c:0a:f1:37: 2a:37:be:60:65:d2:1b:c6:0d:cd:31:00:14:53:00:4d: 19:f8:e8:7e:ff:b1:13:15:37:c0:17:f6:64:a9:f8:90: f1:13:59:8a:44:04:94:ea:f6:89:2e:8a:76:41:e5:f0: 62:ea:c1:47:89:61:51:b3:2a:fd:e1:35:5f:33:b5:a0: 65:c1:12:c0:0a:e7:6b:ab:4e:78:a9:2d:f5:97:c4:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:9e:73:6c:e5:05:d9:61:cf:92:cd:da:e0:86:61:d1: 12:98:4c:ca:2e:aa:07:be:7b:0b:fc:58:21:97:22:a1: ad:2e:ef:ca:d6:4b:63:2f:e7:75:94:21:a3:29:e8:8f: 7f:d3:2b:05:6f:10:ac:44:5c:02:3b:3b:d0:83:54:74: 95:13:94:cd:51:24:4f:92:ed:e4:e9:38:ac:b1:ef:e7: 81:3f:ac:6f:6b:85:aa:07:da:f6:43:86:db:0e:35:0d: f6:71:43:89:51:1b:c9:4d:44:c4:c5:17:62:77:cd:ee: 08:d2:0f:a6:37:1e:8a:1e:f6:ca:bf:25:1e:8e:da:09: 8e:58:48:02:e7:3a:d7:46:4a:33:f8:7f:04:fc:1e:2b: 68:43:1a:14:0a:e5:7f:3a:08:de:82:4a:00:8d:12:32: 55:70:27:fa:05:54:2f:12:ed:76:72:15:b7:78:bc:aa: 38:5f:2c:83:d8:c6:ec:fa:e6:fc:36:6e:dc:0f:29:a3: 15:6c:c3:e8:18:a2:27:42:54:ed:96:13:a0:6d:25:33: 3d:65:37:c0:7e:49:e6:1b:cd:1d:29:06:2a:8b:7d:b5: 0e:0b:8d:98:5e:f2:59:de:67:df:ca:ef:6c:a5:52:3e: 27:c5:8f:e1:ee:be:e7:ab:d1:d8:a9:9e:56:73:c4:6d Fingerprint (SHA-256): A2:EE:EE:08:2B:A9:95:B7:FA:B2:F8:7C:AF:CC:40:05:14:B2:D0:4D:A7:B5:34:40:B4:40:F1:99:D8:C7:42:3B Fingerprint (SHA1): 34:0E:09:00:EB:48:5F:CF:E7:19:58:2D:DB:DC:E7:8C:ED:6C:4E:37 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #11761: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125867 (0x1e67e72b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Wed May 10 13:04:33 2017 Not After : Tue May 10 13:04:33 2067 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b3:fc:97:94:c5:08:1f:80:cb:44:b6:47:fc:64:f6: ba:14:09:66:20:e8:e2:f5:ac:d8:5c:a8:ac:a1:79:e5: db:7d:08:b3:65:8c:ce:71:d0:a8:d2:97:77:81:10:e9: bc:a2:b6:fe:60:28:ba:8a:a2:1e:45:47:31:87:68:86: 4d:bd:e7:fc:9c:a4:1e:d4:8e:b3:80:3f:31:e7:d7:fb: 7f:9b:75:50:ad:ab:01:c2:36:24:ca:72:f1:73:a6:a8: dd:7a:43:04:cc:2d:7b:cc:6f:28:b0:da:84:22:96:1b: 9d:60:87:4b:41:95:0f:31:6f:0b:98:06:58:2d:6c:36: 73:9e:1b:43:13:4a:e3:8f:b4:a2:65:7c:ad:b3:a8:2b: 45:ba:3c:d7:19:aa:a2:7d:b3:48:bb:07:f0:50:41:7e: 4e:9d:87:76:45:3f:c5:6e:07:a7:db:9f:b2:4e:5d:f9: 7e:a8:51:fd:19:43:98:23:19:3a:4b:6f:40:a7:74:4f: 32:b1:69:86:d3:5d:d4:39:4b:2e:f9:70:5d:1f:37:dd: 6b:11:f2:31:36:b6:15:ec:ea:9c:b2:5c:7e:23:32:81: 46:18:e3:13:23:87:85:2c:0f:bb:8d:73:af:e5:ed:2f: 18:af:77:be:9d:d0:7b:15:15:30:7a:47:1f:4b:15:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:ab:d5:d4:0e:86:b7:13:9c:94:1b:38:a8:d8:40:ee: c9:f6:b3:c7:1d:6c:c2:af:99:0b:b7:d3:4a:3c:42:36: 27:ff:fd:ab:57:b3:6c:3e:34:43:4b:4b:6f:4f:02:11: 58:3e:da:2e:3a:59:f9:11:68:92:d2:12:9e:86:0f:13: a7:e5:65:30:6b:cb:b0:55:7e:fe:34:a1:05:e2:d4:ca: 62:8e:1d:fc:90:94:fc:55:8c:c9:0a:26:b3:72:28:f2: ce:d1:34:8c:e8:b5:47:66:46:38:21:1c:13:b9:3f:8e: 9a:07:23:75:7e:65:8b:e3:46:91:8d:8a:01:a6:25:db: ad:79:96:02:f0:b7:12:53:42:4f:97:c0:1c:be:12:37: ff:51:43:b2:21:8b:d8:b0:90:b7:ee:c6:3e:8a:08:98: 35:34:c1:e9:96:72:e3:55:6b:0c:f9:64:ae:2e:ae:ea: a1:08:d4:55:ce:5f:fd:36:7c:27:51:90:a3:21:53:3f: a6:98:31:d3:6d:af:4a:82:da:39:0e:d1:12:d5:7c:18: 39:34:93:0f:7c:20:57:22:e1:57:1b:4d:5c:b9:db:cc: 74:d1:2e:ac:15:7c:cd:b0:2a:fe:a3:09:84:e5:5e:74: 5d:6b:73:0e:c4:fe:ba:34:0d:53:ab:05:07:30:34:1e Fingerprint (SHA-256): 57:81:BA:3E:7E:9B:0C:C9:38:B4:11:AA:03:45:5D:7A:24:25:A0:83:93:90:A4:C1:BC:FC:2C:BA:94:8D:A7:BC Fingerprint (SHA1): F0:E1:D6:28:88:7A:3D:30:B0:38:F7:8B:E4:7B:A3:EF:50:35:E4:7A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #11762: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125868 (0x1e67e72c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Wed May 10 13:04:35 2017 Not After : Tue May 10 13:04:35 2067 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:34:f7:2a:ab:f9:20:60:77:74:e1:d2:9f:35:9e:f9: 73:be:26:e8:74:eb:fd:07:98:64:26:ea:c4:bf:f6:a3: f1:31:5c:e3:15:8c:da:77:e4:f1:1a:c3:01:cc:68:28: da:29:77:a9:c4:33:29:33:2c:2a:a8:cf:e5:58:b0:47: 96:93:14:2a:73:5a:14:12:ca:f0:18:aa:6d:86:50:bd: cd:ab:c3:19:c1:18:6f:99:26:ed:c9:3d:4e:c6:43:49: 55:1a:eb:90:f3:f8:f9:99:d7:58:78:d1:3d:bb:43:ef: b7:fe:f6:81:d0:e1:23:06:40:cd:97:b0:61:b2:90:59: e6:bc:08:7a:3e:d9:f9:ad:06:05:84:5a:4e:28:f5:e8: f3:f9:23:06:51:86:6c:95:b3:84:fe:93:f8:ad:8a:e9: 49:bb:6f:1e:f5:f9:f5:28:9f:62:b8:96:25:7e:94:df: a7:01:33:1b:6d:e1:04:00:4c:57:9a:e1:d9:2d:1d:c5: ee:d6:b8:2a:e5:89:6c:d3:5d:4a:c3:4c:ef:af:a6:18: 8d:d0:24:85:b1:1f:10:1f:9d:cc:59:07:99:09:66:fe: be:97:4b:73:28:5e:f3:6a:63:e0:3e:22:22:78:92:9e: 07:48:e3:f4:4c:26:56:34:02:b5:d8:1e:02:63:d2:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:8a:93:3f:bc:60:ec:5e:88:68:ee:59:5b:a8:14:56: 5c:37:d6:08:d8:1a:13:3e:31:32:eb:bb:66:69:46:90: 04:e3:43:82:01:cf:f6:43:28:b3:31:df:3e:0f:71:5a: 02:8b:ad:da:0e:cd:83:ae:3e:8d:d6:51:25:95:34:10: 2e:92:55:ac:de:77:68:57:ad:91:48:2c:7c:07:54:c8: 11:b3:2b:25:22:c3:f5:27:a4:85:07:f4:5f:93:04:e8: 5e:58:83:94:6c:20:0a:28:64:ca:e2:c0:63:31:ee:57: 48:60:42:67:a8:3d:6d:90:20:65:97:ae:15:ab:02:a9: 34:44:13:46:c4:8f:c9:d1:ee:8f:69:3a:9a:c5:b2:ac: 3e:9d:54:95:bb:30:9a:d5:f0:62:41:7a:36:10:84:64: 31:50:5d:66:fa:5d:9b:3f:40:b0:50:b6:d7:2a:1a:2f: 0d:03:73:91:5d:87:5c:9a:a0:a6:ce:47:24:93:ab:73: cc:4a:6f:63:d7:9c:5f:f3:c5:0a:b0:36:7d:0d:e3:be: 1d:d1:4e:a1:26:3c:79:c6:b5:9e:5b:65:f1:16:58:fb: 89:be:7a:02:1e:42:21:49:76:ea:6a:a7:89:e4:ee:0b: 27:03:da:3b:3c:26:2c:e8:9b:6f:b2:c3:4e:79:92:7c Fingerprint (SHA-256): DB:87:A3:E1:12:71:3C:07:16:A9:59:77:76:49:9D:A9:8C:34:F6:42:37:F6:17:F1:7D:3A:85:C3:6A:3E:6A:A7 Fingerprint (SHA1): E4:8D:1C:EA:B8:D0:37:35:7B:F2:C8:44:68:22:B7:00:4C:72:CA:22 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #11763: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125869 (0x1e67e72d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Wed May 10 13:04:37 2017 Not After : Tue May 10 13:04:37 2067 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:51:92:b3:e9:df:cb:bc:79:ec:95:9a:49:4e:d8:2c: 84:f7:38:3a:1c:eb:ed:48:b7:15:66:dc:51:88:95:17: d2:de:06:73:9f:5a:30:14:95:ba:8e:e9:02:81:15:9d: da:30:e0:2a:02:d0:1d:48:82:b3:06:9f:53:77:a5:c3: af:e2:58:82:cc:47:b8:74:74:19:32:63:a7:a9:9f:ba: 6c:e4:b6:56:d1:69:48:a6:df:f9:24:9e:27:3e:89:61: 58:92:a7:49:3d:45:d8:1b:16:d7:ce:6a:33:a3:70:82: 40:a9:8d:22:91:9d:2b:06:6a:48:c4:64:74:f4:e0:9a: d4:68:36:18:5a:40:fb:55:68:5e:25:b6:d5:8c:95:c3: 2d:85:05:c8:a1:b8:3d:2e:46:eb:1c:1a:49:7c:9e:42: d4:df:47:e5:d1:b0:bf:4f:ce:00:a6:bc:77:7d:1f:90: 5c:1f:58:c3:83:81:94:9a:77:5d:54:dd:09:de:d6:b0: aa:d2:19:00:1c:9e:95:0d:65:25:a2:9e:b1:9e:b0:63: 5b:3d:81:e1:69:71:d7:19:95:84:59:d7:41:f6:af:86: 46:c7:f9:46:43:59:b7:9e:e3:93:72:93:57:1c:ed:0d: 65:04:9d:8c:92:f6:45:4c:fb:3c:20:70:db:3a:03:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:00:88:62:d6:46:2c:25:34:f8:a3:a4:49:4f:b7:ac: cc:f8:b3:b8:9b:d7:c0:1e:f4:4e:64:e4:45:da:3b:39: 7a:2d:01:31:84:e5:9a:e0:0c:21:78:5b:e3:45:5d:0e: 94:1e:cb:b0:1b:3d:a6:f9:12:e2:b1:ab:d3:08:3d:1a: 3c:52:85:ca:65:62:ed:fb:de:0c:8f:d1:6c:cb:5d:e9: 4b:87:a5:39:0f:bf:a7:c7:e3:1e:f0:e7:0b:17:5f:cb: 85:af:69:f0:15:4a:ae:01:da:1a:6f:7c:a6:2f:2f:12: d2:d7:c5:5c:1b:f5:64:c0:85:e1:c7:d6:59:53:73:33: 30:d8:92:d3:ea:40:cc:a8:2a:0d:ce:78:0d:a1:2b:ae: 1d:9b:8b:70:bb:02:83:a6:0a:b1:0d:99:8e:6b:e5:67: dd:46:cb:04:10:93:c3:86:87:bb:0f:ab:2b:1f:d6:4b: 3e:09:cc:f8:48:55:0d:4e:ca:82:1d:61:e1:e9:7a:98: 7b:ab:b8:dc:3b:87:47:d6:5f:6a:ac:3b:09:20:96:53: ff:5a:01:a9:2a:c7:13:a2:9a:04:ca:2f:54:04:47:50: b7:2a:f0:6e:98:c7:18:87:1c:3f:c6:4f:eb:73:79:40: c6:bf:fe:85:23:db:8d:f0:14:30:af:81:0e:3a:bf:e9 Fingerprint (SHA-256): 2E:55:9D:D0:BE:22:09:BB:CF:99:CE:01:E1:AD:39:4E:11:CF:CB:1C:94:9E:F0:D0:5A:A8:8A:DE:99:C1:CD:67 Fingerprint (SHA1): 9C:BA:CA:15:8E:BD:81:17:52:A2:DA:80:EE:A3:32:D6:B7:CA:C2:33 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #11764: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125870 (0x1e67e72e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Wed May 10 13:04:40 2017 Not After : Tue May 10 13:04:40 2067 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:17:fd:21:10:de:5b:ff:7f:33:51:6c:af:51:3e:d6: df:cb:d5:0e:1c:ab:84:0a:8a:40:f2:d3:e7:6d:b7:84: a4:27:2f:24:94:14:e2:a5:30:d2:e4:55:a7:f3:66:a2: 29:82:81:69:8d:24:cd:d1:3d:24:51:36:47:9f:c1:f3: 4d:1f:37:32:2d:ac:9d:f2:28:59:41:c2:09:c5:f4:64: 56:65:59:61:ee:73:79:a3:8f:5d:53:e1:3a:73:7e:bf: 36:ec:74:10:a8:00:41:a1:32:81:2f:8c:63:c3:50:c8: a6:57:26:9d:07:d5:46:96:6f:76:7d:20:e4:96:11:20: a1:a9:77:8a:b9:1a:98:64:fe:31:e0:fe:95:8b:02:12: 47:77:58:76:45:e7:e1:ea:3f:9b:b7:cc:bb:28:d1:43: 94:68:b9:c3:6c:99:88:3c:5f:26:19:54:35:60:bd:60: 3b:72:18:4e:3f:56:b5:9c:d5:42:80:52:75:11:d3:48: f0:a7:8e:ef:c1:e2:36:ec:d7:81:09:c9:2a:8f:bb:4e: 36:58:80:80:69:9e:72:98:50:f6:a5:80:76:cc:b4:b8: e4:30:d6:f7:53:b1:5e:0e:f3:c2:f4:0a:07:17:21:48: 87:ea:56:f6:88:91:14:3a:98:b6:af:1e:0e:dd:1d:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:af:f4:3e:88:a1:0f:78:14:ac:eb:13:e0:8d:53:65: e0:f6:51:4e:97:48:00:2e:0e:c0:55:bf:91:3b:12:db: a2:4e:76:55:8c:80:a4:c6:a6:91:cd:93:53:f1:e1:b6: 8b:02:39:3d:1b:68:cc:bd:8e:86:93:65:8b:88:ba:3c: 8d:8a:ff:69:3e:42:b2:3b:1d:d4:42:cb:de:08:22:42: 8e:07:2d:0c:5c:b1:48:76:77:45:46:6d:63:13:ef:a6: 77:61:87:d5:72:1c:fa:77:f5:63:84:d8:77:8c:1c:2d: 76:04:30:f0:40:b7:90:6a:3c:70:8e:9e:0c:ef:71:c9: 3d:41:89:a0:ed:64:91:dd:9d:58:63:08:57:97:e1:ae: b3:ac:b2:05:0d:8f:4c:7e:ea:2c:0f:cc:0a:91:87:fe: 7a:cb:c8:a8:71:ae:af:44:7e:38:fd:04:12:37:0e:53: 6d:3b:4c:a2:8f:3b:8f:18:b3:9b:c9:18:6e:71:38:10: 65:e2:1c:bd:4d:85:44:af:07:0f:87:ef:af:14:db:86: d1:e5:44:85:bc:23:6a:59:57:30:a7:b6:6e:d0:0a:85: 65:6a:01:7a:97:ec:de:5e:b4:c1:75:d0:09:e3:a6:ae: 12:8f:c9:ff:80:32:9a:69:d8:03:39:74:06:65:24:42 Fingerprint (SHA-256): 8C:70:A1:8C:ED:E7:1F:5F:D8:9F:56:78:73:A5:8E:AE:13:D2:04:8E:DD:A0:99:6F:E6:79:C9:92:C2:95:59:64 Fingerprint (SHA1): D5:D8:B6:B7:1E:15:E9:62:AF:79:5E:BE:64:F1:94:77:4C:6A:74:BB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #11765: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125871 (0x1e67e72f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Wed May 10 13:04:42 2017 Not After : Tue May 10 13:04:42 2067 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:17:55:e3:1e:87:cc:16:82:81:7c:a5:44:ee:77:2f: 06:40:68:6e:ea:ad:b0:df:86:39:39:90:58:5f:67:c6: 69:8b:6c:84:c9:07:4a:cf:e2:cb:5b:9f:ea:8d:7c:ff: f7:3c:e9:fb:0e:99:95:c5:be:8e:c1:a0:fa:29:b2:a1: 81:66:42:ed:c5:fd:a0:28:1e:a7:ca:7b:1a:75:39:dd: 04:73:29:a6:a1:1b:e1:15:69:25:af:1d:08:b4:3d:ca: 8d:6f:e3:9c:30:d8:2f:5e:04:d5:dc:e1:bf:b8:04:c0: 69:40:c2:b5:0d:d0:4b:71:42:15:3b:b2:ce:87:07:23: bf:c2:1a:89:df:1f:7f:65:c9:91:3a:f0:ca:a6:37:60: b3:ab:d1:1d:b1:6b:c2:01:01:99:1c:00:68:ff:2a:9f: 52:47:d1:d4:0c:18:c2:16:c8:76:08:11:58:92:32:29: 98:79:cb:4e:f6:10:1a:71:05:df:87:2a:5e:b4:f2:5b: 83:67:41:43:ee:94:5e:61:3f:f0:7b:84:db:0c:91:6e: 0f:5c:7b:be:ee:09:ee:67:b8:d9:7d:f2:0b:e8:b3:f0: a5:fc:7f:7a:67:9a:89:53:48:29:35:9c:a5:e0:45:9e: b0:6b:99:53:53:67:d5:c6:07:e2:00:ee:56:e3:e0:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:82:0f:e3:6e:03:72:18:90:af:ec:47:d9:3b:27:2b: 00:66:e6:84:70:2c:8b:ab:32:45:ef:be:5e:6f:59:8f: 73:28:1d:5e:fd:da:ef:b5:c6:68:a3:7b:c2:32:72:a5: f6:cb:6e:3f:12:d2:43:48:c7:b7:0f:87:11:98:9a:1a: 5d:8a:bb:6c:d3:f4:74:db:e1:1a:ba:5f:4f:1e:88:9b: e4:5d:b5:92:26:d7:78:2a:97:85:78:cc:82:82:04:71: c0:fb:35:02:3e:76:d5:e0:44:eb:11:f7:9b:93:46:53: 2c:da:ed:e7:1a:34:8e:a5:07:db:18:dd:0b:77:98:c1: 6e:72:47:87:37:3e:2a:16:3f:4b:01:ad:29:28:0d:75: 54:fd:57:71:4e:b5:2a:1d:4a:30:ed:09:9b:2e:19:7c: b7:b2:af:24:a7:02:7b:00:e3:7f:63:3c:70:7c:57:e2: 07:ee:b0:2b:1a:5c:dd:92:dc:9c:0e:81:5b:aa:0a:1e: 62:51:3d:0d:e2:d1:b9:75:7a:53:16:d8:fc:78:22:64: db:f3:02:a4:ef:df:1a:df:59:33:a0:69:44:1f:d6:af: ba:fe:a5:7e:d9:be:56:15:d7:85:3c:29:c1:0c:33:c5: 11:fb:70:f3:e2:f8:5b:ad:e8:71:a9:c5:1a:a7:ab:bb Fingerprint (SHA-256): B4:F0:7A:16:E5:28:17:F8:9B:80:29:62:DE:88:50:91:03:CD:0C:00:A3:24:7D:80:E3:67:3C:67:C2:D9:9B:B4 Fingerprint (SHA1): E0:A5:DF:5D:AD:D5:58:BA:A8:82:67:75:8C:D5:EC:AD:D1:69:FF:90 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #11766: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125872 (0x1e67e730) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Wed May 10 13:04:44 2017 Not After : Tue May 10 13:04:44 2067 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:e6:6e:3c:a7:2c:4e:ee:f4:dc:78:19:df:a2:54:04: f9:5e:78:03:dd:d2:d4:5b:29:33:b2:05:04:39:18:fb: 48:43:72:af:8f:7c:cc:4d:02:7a:12:4c:d0:ce:eb:a7: 41:f9:46:7b:f7:3d:00:76:a3:5c:3e:09:6a:e6:52:05: 8a:b8:35:fc:8c:01:93:61:39:69:c8:11:f4:0f:d7:8f: 74:68:37:6c:27:c7:12:31:61:b2:b8:b6:14:a3:db:b4: 35:13:91:cf:41:b0:09:23:29:66:12:ba:a9:43:cf:8c: b2:c6:aa:13:5f:c9:c8:d8:20:25:d1:06:5c:dc:19:d3: 94:26:c7:55:d6:36:ca:00:75:82:9f:47:22:a0:6e:8f: fd:66:ea:ed:91:92:79:25:6b:f3:98:ac:54:30:fe:1d: 64:52:66:12:76:79:7c:08:db:d7:4b:b7:c2:25:3c:db: 4e:73:14:c6:cb:3e:3f:df:f0:71:62:b1:ed:51:0a:7f: 23:d0:56:5c:a8:90:52:db:a1:06:c4:ed:d1:b8:70:ed: c0:17:55:ce:bb:71:31:c5:7f:0c:ee:71:f1:f5:20:51: 22:6b:9d:e3:e6:82:4c:77:59:2d:f4:6a:99:b7:cb:3e: da:7d:af:61:e3:b1:1a:ef:5e:e6:66:4b:95:24:8c:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1e:ed:ac:44:bf:b5:c3:c6:fb:d5:6f:ec:a8:3a:eb:bf: 98:3c:4b:27:10:87:54:48:99:9c:37:12:d9:4a:da:01: 0d:59:6c:f8:d0:0d:6c:44:f8:37:5c:e4:cd:fb:bc:96: 41:85:a7:9d:5e:3f:59:bf:20:cd:ab:ce:25:49:f6:d8: d2:93:70:2b:e9:f4:ff:e4:00:67:ea:a5:17:15:c9:fe: 35:de:9e:6e:68:01:aa:8a:0e:48:d3:88:49:3a:78:95: 4d:b1:b4:10:77:85:65:90:e0:88:64:18:54:fd:3f:c4: 1f:22:71:f1:5b:67:e4:1b:21:f6:6b:27:1f:49:25:8b: c0:88:26:6a:5e:a8:57:af:e0:3f:ec:dd:92:1d:fd:58: dd:59:bc:ec:9c:68:1d:50:17:06:37:5d:ea:00:65:35: f7:b9:29:89:05:48:da:bb:54:3a:21:9c:44:2b:89:bc: 14:19:0c:25:1f:04:ac:5d:ac:86:a5:cb:04:c0:d7:9c: 95:37:3f:2b:67:f3:c2:34:28:68:a8:e4:12:d6:32:6f: 5f:bd:f8:a4:62:9c:e7:e9:76:05:02:63:0d:7d:6e:27: ce:66:ce:cb:33:68:f7:a8:b5:63:41:c5:f6:18:52:8e: b7:69:bd:34:12:e9:c9:66:60:b2:a3:94:be:5f:90:04 Fingerprint (SHA-256): 17:33:35:1C:56:08:13:DE:41:E4:8B:62:A0:5C:98:1A:40:38:CF:79:C0:B9:F0:30:30:95:64:31:43:0C:83:5F Fingerprint (SHA1): AA:A8:6F:0F:8A:AF:17:A8:1D:41:4E:6A:D6:39:75:0D:26:4D:1C:F8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #11767: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125873 (0x1e67e731) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Wed May 10 13:04:46 2017 Not After : Tue May 10 13:04:46 2067 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e7:41:5c:67:d6:76:d5:ac:f9:2f:52:1d:01:10:58: 5c:03:81:1c:a3:47:56:f0:80:cd:34:4c:31:72:a0:29: 06:8f:23:c9:54:ad:d9:bf:66:cd:de:87:16:e8:e1:e2: 8c:31:dc:0c:90:5a:d5:42:a9:9b:17:64:09:be:4d:32: c7:5a:4d:40:a2:81:09:3b:68:47:5d:77:1d:35:b8:c4: a7:73:de:d6:67:47:b6:7f:e2:37:3a:5c:5d:53:1a:1e: 4e:3e:e1:f5:0e:5e:16:6e:e3:fe:2b:87:85:4d:d7:3b: 08:a1:60:aa:72:38:1a:d0:bd:20:b9:07:e1:30:69:77: 31:c9:18:e8:4f:d8:58:a5:80:7d:a1:61:e1:89:ab:88: e2:36:3f:59:62:1e:60:97:fc:b6:40:3c:be:eb:0d:1f: a0:5e:7f:10:39:8d:e5:b2:cd:03:1c:ca:bb:68:38:d9: a2:d2:c9:3a:b9:56:92:23:77:a6:62:9b:a7:36:cf:69: 27:e0:99:f8:f9:b8:e6:bb:c9:f7:80:e9:7b:e6:08:b2: 81:5e:77:ec:f3:51:f4:e7:a3:5f:76:2c:77:b6:14:8f: fc:cf:d5:0e:fb:30:ac:7d:a5:18:ae:60:5b:f1:60:cb: 47:05:11:ad:02:bb:7b:14:72:4f:98:56:5e:06:d7:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:e6:f7:95:f8:5e:5b:c4:17:dd:ac:06:10:92:7f:e2: 83:77:ab:39:af:63:76:32:e8:6e:e5:d8:84:de:22:2b: 13:b4:b1:31:07:95:63:c2:29:09:75:9a:42:06:69:0e: 25:9a:34:19:ff:4e:fd:bd:30:b4:5d:8f:f2:8c:c6:83: 11:cc:27:24:54:97:2b:4c:7c:e0:86:51:14:73:8d:98: 49:d2:8c:39:ad:00:b0:70:59:07:3d:7f:b0:49:d0:83: c6:43:ae:5d:eb:b7:e4:04:e8:08:2f:b8:50:a7:c8:61: 73:1e:de:78:d8:70:72:c9:c1:25:38:5c:d7:04:f4:bd: bb:c1:dc:66:8d:4d:b9:43:c9:2c:d2:94:5a:73:df:14: 9b:2d:75:95:d2:68:ea:ef:36:60:4e:79:6a:ee:6a:34: 28:29:39:2c:c3:e6:89:4a:05:a6:e5:24:6f:f0:69:ab: a4:2b:9e:a3:c9:2a:7a:74:f1:14:2a:7c:8c:13:60:97: fb:89:47:53:02:30:6a:d5:13:4d:88:ad:3c:17:a7:64: c4:74:9b:9f:06:26:84:57:64:f9:45:5e:22:0a:e6:c7: 2f:b8:53:6b:99:25:03:5c:4b:62:d5:1f:de:0a:e6:b3: 54:08:58:91:b5:51:b8:ac:56:c3:6e:6e:29:fb:6e:4d Fingerprint (SHA-256): DC:3D:86:55:53:5D:1D:E8:B4:04:89:A2:18:8B:CB:C3:B8:0A:90:D7:04:3A:E1:C9:0E:2C:61:D4:AB:DB:6C:2C Fingerprint (SHA1): B0:EE:66:4D:40:A8:DC:90:FE:99:F2:00:99:69:6F:58:1E:1B:B4:16 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #11768: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #11769: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125888 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11770: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #11771: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #11772: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11773: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510125889 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11774: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11775: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #11776: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11777: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510125890 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11778: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11779: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #11780: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11781: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 510125891 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11782: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11783: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #11784: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125888 (0x1e67e740) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:05:10 2017 Not After : Tue May 10 13:05:10 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:34:ab:67:58:cb:43:e9:0c:af:70:7f:02:db:c1:67: e2:ea:7f:d0:4b:af:82:d6:66:46:81:79:9d:4b:02:57: a0:e1:7a:d3:fe:aa:0b:af:07:7d:db:c9:e4:76:32:c9: f8:07:fc:7b:08:ff:04:50:7c:88:74:46:94:06:73:7a: 29:72:4d:37:97:84:21:e7:34:56:09:72:ef:ff:b6:8d: 79:8f:dc:4f:e7:5e:42:85:6a:93:e6:65:47:74:95:78: 09:75:80:a0:3f:a9:f8:da:a8:25:8d:f4:af:42:e3:c5: 55:c4:cd:39:b6:4e:ed:db:08:fd:2b:ef:bc:94:46:15: 0e:53:e9:fc:6c:55:87:f8:a8:55:5b:d6:1f:70:ca:94: c1:98:cd:9d:00:ee:12:e1:e6:9a:d9:80:45:43:01:3a: 08:23:e4:9c:02:a8:74:53:3a:5c:69:34:c9:9b:19:c2: 4c:e7:fa:b5:25:6f:81:ad:ca:d6:71:d5:66:17:62:d6: 21:a2:80:a1:da:dd:ab:ad:bf:15:94:b5:f0:f8:9c:83: 2a:27:f7:0f:4b:8f:f9:07:11:54:e2:12:97:11:64:fe: 63:c4:5d:2e:66:f6:20:e7:66:3d:ee:1e:2c:dd:6e:41: 2f:e0:3b:95:9e:19:2e:b1:e6:a5:8a:14:ca:6f:7e:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:43:52:27:91:c7:2f:d9:5b:fc:e1:bd:fd:7f:ea:be: 24:b7:a1:18:30:c5:42:1b:2e:86:eb:d4:1a:32:cb:b0: eb:38:f6:fd:2b:0f:b9:79:34:ae:1f:19:af:3a:b8:70: 41:62:70:af:fc:5d:cb:ef:9e:8e:33:64:1c:a6:48:98: e9:c3:a1:a5:eb:61:b8:a0:75:17:eb:0c:5d:fa:2a:fa: 80:7f:a8:c4:4d:bb:f5:87:9e:f7:81:be:6e:5a:aa:e1: e0:cf:5e:e5:f6:a8:ac:6f:04:e3:68:64:c0:53:cf:45: 4d:0f:ee:a5:ef:1e:2f:0b:e1:52:37:ab:31:9f:51:d1: c2:96:74:0b:45:ad:3f:76:a3:e9:95:31:86:1f:5f:7c: af:c4:2d:11:bb:92:fe:ff:d0:f2:ce:c3:7b:2a:89:3b: cb:38:e7:18:73:ac:66:15:0a:39:cf:27:98:58:0a:44: bc:63:a2:f8:eb:34:fe:cc:09:8e:a9:59:0f:1c:17:bc: ec:e7:21:75:c0:27:26:25:a1:24:70:4d:ab:37:f8:b4: 70:45:51:ac:30:a0:3e:5c:ce:ca:f1:50:78:14:23:66: 41:ed:ce:1e:cf:ee:d2:e3:8e:38:49:ff:e9:fa:96:cd: 5e:f7:67:2a:87:0d:d9:9e:e1:a3:47:e1:ad:3e:a4:25 Fingerprint (SHA-256): E2:44:7E:3E:53:1A:00:0A:32:8A:B3:42:59:69:C9:49:A2:36:5C:98:5F:5A:CE:A4:7B:E0:28:C7:B6:9F:0C:55 Fingerprint (SHA1): 99:7D:47:D7:17:0D:55:CC:CE:BE:B0:A1:0A:2D:6E:F7:42:95:F1:C0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11785: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11786: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125889 (0x1e67e741) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:05:13 2017 Not After : Tue May 10 13:05:13 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:d8:66:03:b5:5e:09:a5:76:e8:23:51:42:b2:56:0e: 18:3d:ba:09:69:78:4c:99:f3:97:0e:61:34:22:6e:33: 4b:70:c5:05:3b:86:91:f7:6b:7a:aa:8b:e0:b8:8f:6d: 3b:88:8e:1f:ed:a6:b4:d3:0d:2a:1d:11:27:5c:f0:c2: 6e:2f:23:3e:d9:bd:30:6c:d4:75:66:19:16:e5:0c:df: 2a:f1:79:7f:51:d5:45:4d:f3:5e:e0:5a:e9:04:13:02: 0b:4c:5d:a0:e1:b9:67:9a:4e:71:ec:9d:7d:02:fe:04: c7:9c:6a:71:e4:3e:e7:3c:bc:2f:c3:18:aa:cd:3f:9a: cf:39:2c:77:7c:de:a3:10:c3:b2:f9:ef:c9:3f:42:a6: bf:9d:88:d4:99:b8:a7:3b:9b:5e:23:ac:86:71:26:c6: 01:71:cc:d3:1d:69:d8:15:80:61:36:2a:21:3a:1c:9c: fa:df:63:55:28:2d:09:49:34:a3:73:07:ee:e3:da:52: 46:0e:5d:e6:2e:c7:93:ea:f6:45:5b:0d:a3:d6:d0:a5: 6e:5a:16:cf:01:64:e5:25:62:db:9f:45:9e:c1:e8:d0: 73:1f:65:a4:ce:c4:11:2e:1b:bc:ab:af:3f:8a:43:8c: 62:a8:1c:fd:b5:89:12:10:fc:fe:ac:6e:45:66:42:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:21:94:47:df:65:47:87:a6:13:97:77:f0:fe:dd:07: 22:b7:b7:7b:38:5d:f5:ea:93:50:1d:c2:51:25:31:04: ba:87:39:c2:01:74:09:d1:97:f1:4d:9d:71:35:50:85: 01:6d:07:d9:07:e4:bd:08:2f:3d:32:4d:72:ed:c7:58: 8a:d3:22:13:aa:67:4e:52:11:4d:ec:07:9d:a4:35:2d: 5c:a1:5f:b7:1f:29:4a:4c:9f:31:4f:95:ef:81:cf:13: 4b:6f:56:59:2d:1c:43:e5:69:8c:87:bd:b9:6a:36:ec: 7e:38:32:c7:90:61:88:e9:29:41:a3:ac:05:60:4c:44: 56:93:fd:10:77:29:46:23:87:ff:c5:97:b3:19:ff:33: 20:28:ca:c9:e4:44:00:35:d3:54:b3:28:b8:82:c7:94: 2a:fd:e6:f7:5b:f0:ef:ea:2f:5a:86:61:c0:2a:6a:0a: c5:84:a2:e4:74:4e:75:4d:b6:73:4f:41:1b:55:63:16: b4:27:b7:2b:b4:a4:9f:ee:ef:d8:32:5e:1c:ee:d7:34: 19:af:f3:fb:e0:e9:4a:a8:c6:f9:b0:c2:26:43:ac:fa: 80:33:67:d8:68:f8:35:b4:19:29:fb:b1:00:92:d7:a7: 48:d6:6e:86:ac:da:27:7d:90:99:c2:2e:71:22:03:be Fingerprint (SHA-256): 7F:2C:F4:8B:EF:1C:12:9D:F7:1B:EE:98:B8:9F:2A:06:5C:1A:17:FC:F9:1D:5F:A0:1C:11:14:10:23:67:88:A9 Fingerprint (SHA1): 17:AF:18:83:3E:A8:5C:6C:66:4C:C8:A3:76:67:6E:F7:0A:8B:45:7C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #11787: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11788: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125890 (0x1e67e742) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 13:05:15 2017 Not After : Tue May 10 13:05:15 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:57:43:25:e9:c0:15:eb:ed:3b:75:46:7c:aa:eb:c8: a2:4c:3e:eb:75:7b:fc:d1:a4:4b:f8:f1:b6:e8:f5:a8: 80:ee:55:fb:34:ac:b3:91:20:7e:77:42:41:a8:29:14: 43:82:1d:fb:22:04:2f:d7:19:44:f3:69:fc:35:a4:30: f4:59:1f:2c:1f:dc:2a:96:70:aa:a1:25:13:e5:9f:ff: d9:eb:22:2a:e7:9b:86:c9:1b:1a:ce:ce:63:26:f0:a6: 37:1e:2c:71:b6:40:dc:9a:cc:4a:6e:13:ad:ec:48:f6: b3:2b:1b:5b:16:6b:59:d2:0d:cf:c4:c5:a2:a8:92:79: 83:fc:f1:09:71:a6:74:d6:3e:54:66:65:78:25:ac:7d: 59:2e:9b:9d:d8:73:3d:5f:7c:45:96:22:1b:46:63:af: c6:f2:b0:03:c9:1e:66:77:83:f3:ec:e5:e6:3e:50:14: 83:d0:1f:63:2a:5b:d4:e4:3f:63:ca:63:1d:b7:ed:82: 87:a9:1d:1c:a7:1f:6d:8a:81:86:77:fb:c8:86:0d:e7: 5c:58:1a:4e:17:0b:ab:87:f6:1c:67:5e:58:c8:e5:73: 34:6d:fe:b8:86:f1:f5:1b:9b:72:f7:03:ae:f0:bf:d7: 40:0d:c1:c6:7c:42:e5:ce:1f:d3:41:90:db:d1:7e:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:bf:cc:8b:f5:a2:e1:52:b9:ed:0d:46:c8:bf:70:57: ce:ad:6f:57:6b:ba:54:f3:fa:74:6f:a3:ab:a6:8d:b2: be:41:19:37:c3:d7:24:1e:da:f9:0f:71:99:07:84:6a: 1b:3d:a5:3b:77:b7:6b:db:3d:23:a8:42:cd:e5:ed:47: 09:a6:61:60:31:91:a5:79:99:53:ef:7a:ea:07:04:27: ec:3e:b2:e5:31:cd:29:a1:17:bd:03:06:d1:0c:9a:1d: 96:4a:bd:e7:10:8c:11:b1:a4:c3:bd:eb:ad:24:ca:9e: e5:4f:6d:60:67:41:02:01:1b:c1:7f:a5:cd:88:03:0a: 0c:90:09:e6:60:8e:66:dd:15:4a:57:cd:4c:46:78:cb: 09:40:a5:0d:71:30:6a:33:9f:0b:79:51:bb:ee:11:06: 9a:7a:a2:70:ae:1c:a1:2c:2a:6e:8a:0a:12:f4:7f:81: b5:41:56:29:05:f2:2e:d3:8a:48:20:28:b0:44:b1:98: 03:75:13:2a:e6:d4:c4:31:29:5e:00:be:c0:74:67:13: 00:43:f7:26:ee:e7:40:82:5c:6b:88:05:e8:e3:2c:6c: 96:42:82:67:4d:24:b1:e2:08:27:2f:0c:fd:79:7a:6e: 27:22:a9:9a:04:b2:42:04:16:2f:30:0d:4e:ad:97:04 Fingerprint (SHA-256): F8:14:B3:8E:20:BA:24:90:87:AB:DC:3D:FE:F4:DE:2A:1D:75:CC:8D:14:4B:2D:57:5A:12:97:51:E4:93:48:18 Fingerprint (SHA1): EA:F5:16:85:4A:96:E9:D6:7F:C4:F2:1D:39:F4:D5:B0:74:7E:EB:A7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #11789: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11790: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #11791: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #11792: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #11793: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125888 (0x1e67e740) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:05:10 2017 Not After : Tue May 10 13:05:10 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:34:ab:67:58:cb:43:e9:0c:af:70:7f:02:db:c1:67: e2:ea:7f:d0:4b:af:82:d6:66:46:81:79:9d:4b:02:57: a0:e1:7a:d3:fe:aa:0b:af:07:7d:db:c9:e4:76:32:c9: f8:07:fc:7b:08:ff:04:50:7c:88:74:46:94:06:73:7a: 29:72:4d:37:97:84:21:e7:34:56:09:72:ef:ff:b6:8d: 79:8f:dc:4f:e7:5e:42:85:6a:93:e6:65:47:74:95:78: 09:75:80:a0:3f:a9:f8:da:a8:25:8d:f4:af:42:e3:c5: 55:c4:cd:39:b6:4e:ed:db:08:fd:2b:ef:bc:94:46:15: 0e:53:e9:fc:6c:55:87:f8:a8:55:5b:d6:1f:70:ca:94: c1:98:cd:9d:00:ee:12:e1:e6:9a:d9:80:45:43:01:3a: 08:23:e4:9c:02:a8:74:53:3a:5c:69:34:c9:9b:19:c2: 4c:e7:fa:b5:25:6f:81:ad:ca:d6:71:d5:66:17:62:d6: 21:a2:80:a1:da:dd:ab:ad:bf:15:94:b5:f0:f8:9c:83: 2a:27:f7:0f:4b:8f:f9:07:11:54:e2:12:97:11:64:fe: 63:c4:5d:2e:66:f6:20:e7:66:3d:ee:1e:2c:dd:6e:41: 2f:e0:3b:95:9e:19:2e:b1:e6:a5:8a:14:ca:6f:7e:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:43:52:27:91:c7:2f:d9:5b:fc:e1:bd:fd:7f:ea:be: 24:b7:a1:18:30:c5:42:1b:2e:86:eb:d4:1a:32:cb:b0: eb:38:f6:fd:2b:0f:b9:79:34:ae:1f:19:af:3a:b8:70: 41:62:70:af:fc:5d:cb:ef:9e:8e:33:64:1c:a6:48:98: e9:c3:a1:a5:eb:61:b8:a0:75:17:eb:0c:5d:fa:2a:fa: 80:7f:a8:c4:4d:bb:f5:87:9e:f7:81:be:6e:5a:aa:e1: e0:cf:5e:e5:f6:a8:ac:6f:04:e3:68:64:c0:53:cf:45: 4d:0f:ee:a5:ef:1e:2f:0b:e1:52:37:ab:31:9f:51:d1: c2:96:74:0b:45:ad:3f:76:a3:e9:95:31:86:1f:5f:7c: af:c4:2d:11:bb:92:fe:ff:d0:f2:ce:c3:7b:2a:89:3b: cb:38:e7:18:73:ac:66:15:0a:39:cf:27:98:58:0a:44: bc:63:a2:f8:eb:34:fe:cc:09:8e:a9:59:0f:1c:17:bc: ec:e7:21:75:c0:27:26:25:a1:24:70:4d:ab:37:f8:b4: 70:45:51:ac:30:a0:3e:5c:ce:ca:f1:50:78:14:23:66: 41:ed:ce:1e:cf:ee:d2:e3:8e:38:49:ff:e9:fa:96:cd: 5e:f7:67:2a:87:0d:d9:9e:e1:a3:47:e1:ad:3e:a4:25 Fingerprint (SHA-256): E2:44:7E:3E:53:1A:00:0A:32:8A:B3:42:59:69:C9:49:A2:36:5C:98:5F:5A:CE:A4:7B:E0:28:C7:B6:9F:0C:55 Fingerprint (SHA1): 99:7D:47:D7:17:0D:55:CC:CE:BE:B0:A1:0A:2D:6E:F7:42:95:F1:C0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11794: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11795: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125889 (0x1e67e741) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:05:13 2017 Not After : Tue May 10 13:05:13 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:d8:66:03:b5:5e:09:a5:76:e8:23:51:42:b2:56:0e: 18:3d:ba:09:69:78:4c:99:f3:97:0e:61:34:22:6e:33: 4b:70:c5:05:3b:86:91:f7:6b:7a:aa:8b:e0:b8:8f:6d: 3b:88:8e:1f:ed:a6:b4:d3:0d:2a:1d:11:27:5c:f0:c2: 6e:2f:23:3e:d9:bd:30:6c:d4:75:66:19:16:e5:0c:df: 2a:f1:79:7f:51:d5:45:4d:f3:5e:e0:5a:e9:04:13:02: 0b:4c:5d:a0:e1:b9:67:9a:4e:71:ec:9d:7d:02:fe:04: c7:9c:6a:71:e4:3e:e7:3c:bc:2f:c3:18:aa:cd:3f:9a: cf:39:2c:77:7c:de:a3:10:c3:b2:f9:ef:c9:3f:42:a6: bf:9d:88:d4:99:b8:a7:3b:9b:5e:23:ac:86:71:26:c6: 01:71:cc:d3:1d:69:d8:15:80:61:36:2a:21:3a:1c:9c: fa:df:63:55:28:2d:09:49:34:a3:73:07:ee:e3:da:52: 46:0e:5d:e6:2e:c7:93:ea:f6:45:5b:0d:a3:d6:d0:a5: 6e:5a:16:cf:01:64:e5:25:62:db:9f:45:9e:c1:e8:d0: 73:1f:65:a4:ce:c4:11:2e:1b:bc:ab:af:3f:8a:43:8c: 62:a8:1c:fd:b5:89:12:10:fc:fe:ac:6e:45:66:42:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:21:94:47:df:65:47:87:a6:13:97:77:f0:fe:dd:07: 22:b7:b7:7b:38:5d:f5:ea:93:50:1d:c2:51:25:31:04: ba:87:39:c2:01:74:09:d1:97:f1:4d:9d:71:35:50:85: 01:6d:07:d9:07:e4:bd:08:2f:3d:32:4d:72:ed:c7:58: 8a:d3:22:13:aa:67:4e:52:11:4d:ec:07:9d:a4:35:2d: 5c:a1:5f:b7:1f:29:4a:4c:9f:31:4f:95:ef:81:cf:13: 4b:6f:56:59:2d:1c:43:e5:69:8c:87:bd:b9:6a:36:ec: 7e:38:32:c7:90:61:88:e9:29:41:a3:ac:05:60:4c:44: 56:93:fd:10:77:29:46:23:87:ff:c5:97:b3:19:ff:33: 20:28:ca:c9:e4:44:00:35:d3:54:b3:28:b8:82:c7:94: 2a:fd:e6:f7:5b:f0:ef:ea:2f:5a:86:61:c0:2a:6a:0a: c5:84:a2:e4:74:4e:75:4d:b6:73:4f:41:1b:55:63:16: b4:27:b7:2b:b4:a4:9f:ee:ef:d8:32:5e:1c:ee:d7:34: 19:af:f3:fb:e0:e9:4a:a8:c6:f9:b0:c2:26:43:ac:fa: 80:33:67:d8:68:f8:35:b4:19:29:fb:b1:00:92:d7:a7: 48:d6:6e:86:ac:da:27:7d:90:99:c2:2e:71:22:03:be Fingerprint (SHA-256): 7F:2C:F4:8B:EF:1C:12:9D:F7:1B:EE:98:B8:9F:2A:06:5C:1A:17:FC:F9:1D:5F:A0:1C:11:14:10:23:67:88:A9 Fingerprint (SHA1): 17:AF:18:83:3E:A8:5C:6C:66:4C:C8:A3:76:67:6E:F7:0A:8B:45:7C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #11796: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11797: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125890 (0x1e67e742) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 13:05:15 2017 Not After : Tue May 10 13:05:15 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:57:43:25:e9:c0:15:eb:ed:3b:75:46:7c:aa:eb:c8: a2:4c:3e:eb:75:7b:fc:d1:a4:4b:f8:f1:b6:e8:f5:a8: 80:ee:55:fb:34:ac:b3:91:20:7e:77:42:41:a8:29:14: 43:82:1d:fb:22:04:2f:d7:19:44:f3:69:fc:35:a4:30: f4:59:1f:2c:1f:dc:2a:96:70:aa:a1:25:13:e5:9f:ff: d9:eb:22:2a:e7:9b:86:c9:1b:1a:ce:ce:63:26:f0:a6: 37:1e:2c:71:b6:40:dc:9a:cc:4a:6e:13:ad:ec:48:f6: b3:2b:1b:5b:16:6b:59:d2:0d:cf:c4:c5:a2:a8:92:79: 83:fc:f1:09:71:a6:74:d6:3e:54:66:65:78:25:ac:7d: 59:2e:9b:9d:d8:73:3d:5f:7c:45:96:22:1b:46:63:af: c6:f2:b0:03:c9:1e:66:77:83:f3:ec:e5:e6:3e:50:14: 83:d0:1f:63:2a:5b:d4:e4:3f:63:ca:63:1d:b7:ed:82: 87:a9:1d:1c:a7:1f:6d:8a:81:86:77:fb:c8:86:0d:e7: 5c:58:1a:4e:17:0b:ab:87:f6:1c:67:5e:58:c8:e5:73: 34:6d:fe:b8:86:f1:f5:1b:9b:72:f7:03:ae:f0:bf:d7: 40:0d:c1:c6:7c:42:e5:ce:1f:d3:41:90:db:d1:7e:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:bf:cc:8b:f5:a2:e1:52:b9:ed:0d:46:c8:bf:70:57: ce:ad:6f:57:6b:ba:54:f3:fa:74:6f:a3:ab:a6:8d:b2: be:41:19:37:c3:d7:24:1e:da:f9:0f:71:99:07:84:6a: 1b:3d:a5:3b:77:b7:6b:db:3d:23:a8:42:cd:e5:ed:47: 09:a6:61:60:31:91:a5:79:99:53:ef:7a:ea:07:04:27: ec:3e:b2:e5:31:cd:29:a1:17:bd:03:06:d1:0c:9a:1d: 96:4a:bd:e7:10:8c:11:b1:a4:c3:bd:eb:ad:24:ca:9e: e5:4f:6d:60:67:41:02:01:1b:c1:7f:a5:cd:88:03:0a: 0c:90:09:e6:60:8e:66:dd:15:4a:57:cd:4c:46:78:cb: 09:40:a5:0d:71:30:6a:33:9f:0b:79:51:bb:ee:11:06: 9a:7a:a2:70:ae:1c:a1:2c:2a:6e:8a:0a:12:f4:7f:81: b5:41:56:29:05:f2:2e:d3:8a:48:20:28:b0:44:b1:98: 03:75:13:2a:e6:d4:c4:31:29:5e:00:be:c0:74:67:13: 00:43:f7:26:ee:e7:40:82:5c:6b:88:05:e8:e3:2c:6c: 96:42:82:67:4d:24:b1:e2:08:27:2f:0c:fd:79:7a:6e: 27:22:a9:9a:04:b2:42:04:16:2f:30:0d:4e:ad:97:04 Fingerprint (SHA-256): F8:14:B3:8E:20:BA:24:90:87:AB:DC:3D:FE:F4:DE:2A:1D:75:CC:8D:14:4B:2D:57:5A:12:97:51:E4:93:48:18 Fingerprint (SHA1): EA:F5:16:85:4A:96:E9:D6:7F:C4:F2:1D:39:F4:D5:B0:74:7E:EB:A7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #11798: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11799: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #11800: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125892 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11801: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #11802: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #11803: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11804: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510125893 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11805: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11806: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #11807: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11808: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510125894 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11809: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11810: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #11811: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11812: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 510125895 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11813: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11814: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #11815: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11816: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 510125896 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11817: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11818: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #11819: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125892 (0x1e67e744) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:05:24 2017 Not After : Tue May 10 13:05:24 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:b3:41:53:0a:97:46:76:e6:c9:5a:56:2c:cb:4d:ea: 7e:67:7c:aa:53:cb:78:23:6d:a9:8e:5e:89:38:28:e3: 59:d5:bd:a3:7c:56:46:1c:bf:48:5f:25:59:c0:4b:26: 23:c4:13:15:6d:21:01:d9:f0:b6:92:87:3f:25:08:af: 03:d8:a7:f8:de:00:10:af:40:dd:a4:c7:4e:52:23:4a: d3:84:37:36:95:f4:e0:b9:2a:94:5e:af:79:44:6b:f8: d8:8b:12:0e:9d:73:22:d0:81:db:b2:58:38:43:51:d4: 11:53:08:5e:1b:f2:12:00:63:29:fc:79:aa:30:d6:1d: 5f:8e:64:d6:bb:65:25:8e:76:94:f5:e7:79:33:a2:0a: 2b:ab:d7:fc:73:20:e1:6c:4d:07:8c:1a:73:c9:52:67: e4:38:73:df:fa:29:c2:4e:78:d3:28:24:3c:55:e7:c7: 34:ec:86:df:73:4d:f6:0f:63:b0:44:3d:9d:7d:33:42: ea:8e:42:b8:a4:8d:0b:a1:60:de:ec:09:bf:b9:2e:46: 5f:ba:a3:a0:60:82:21:66:2f:e7:d6:3f:55:3e:05:89: 2c:27:54:3e:5a:26:4f:8a:1a:69:02:ee:a7:4e:73:8b: fc:13:09:ee:42:56:53:ea:e0:4c:93:53:c6:fc:50:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:0e:9f:83:9f:3f:ad:27:be:36:b3:93:04:8d:f8:ea: 58:b4:cf:38:7f:71:6c:ef:8e:84:f6:c3:db:07:24:98: dd:d4:f1:78:78:96:0e:d3:de:be:77:cc:cb:f1:69:89: 83:52:cd:4d:29:ea:21:c1:4a:23:3d:b7:5d:02:85:8f: d9:55:e7:df:83:e4:1c:e0:69:1b:be:33:55:73:dd:e6: b3:8b:51:30:36:45:be:e4:39:0c:02:96:ed:aa:28:79: de:8c:5f:29:94:27:d2:6a:b4:55:9a:58:19:fc:5a:13: 80:03:6a:5e:8c:47:4d:a3:bc:23:2f:1e:b2:bd:81:2b: e1:a0:25:75:34:37:2e:61:12:bc:fa:85:cb:1a:73:24: 39:5c:8c:f7:df:2f:d0:ba:fc:45:0d:cc:80:de:4a:6b: bf:b2:1a:27:17:0f:7d:5b:81:8a:d0:f6:6b:67:90:74: 27:cc:4a:eb:9e:9b:b7:84:f9:19:7e:5b:5b:24:f2:3e: db:02:7d:52:23:30:6b:98:92:5c:b2:5d:6a:fb:f5:8b: f8:7d:ed:a6:ae:28:48:99:a7:5d:de:1b:da:ca:8d:78: d5:9d:70:ce:18:e0:c5:ad:a2:3c:45:4a:71:4f:5f:2f: df:e4:e5:5c:bc:fb:a4:e8:e8:45:d8:67:62:0d:3b:24 Fingerprint (SHA-256): 0F:CE:D0:CF:C1:55:DA:9E:F3:F3:FA:4C:83:D0:F6:EC:BF:54:A3:9E:01:4F:0F:52:3F:FB:DE:A2:1D:68:B9:B8 Fingerprint (SHA1): C8:6B:24:6F:A0:CC:12:E4:12:FD:E5:2C:71:13:66:DC:6D:B2:6C:B3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11820: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11821: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125893 (0x1e67e745) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:05:27 2017 Not After : Tue May 10 13:05:27 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:1c:fb:ea:87:8d:ee:46:1c:1a:dd:75:99:9a:c2:d8: 74:2f:83:1a:b9:24:2e:60:e4:48:1d:5e:4d:fd:f3:36: 9e:63:ae:d2:18:32:f7:71:4f:3c:5c:54:d5:13:cf:2f: 3b:f7:3d:85:e5:01:6d:1d:9e:17:ac:56:24:0b:7a:a5: 1e:2e:03:bb:9d:77:27:c0:33:30:d0:57:77:b2:33:05: 94:f7:87:c1:d5:ed:59:16:bc:8a:82:0c:46:8e:0e:b4: 95:53:71:f6:61:68:96:a7:e9:43:bc:a1:c8:5a:fd:b4: c5:73:2d:7f:71:25:74:a6:0b:eb:21:2d:b4:9e:29:1e: 7e:18:fc:c7:88:f9:ba:64:f3:63:ed:cc:85:fe:8c:c8: 7d:0e:9d:7f:31:69:80:e7:c1:1f:cd:50:ce:3d:11:7c: 5b:d4:dc:a0:73:ea:05:c4:55:e4:d0:0a:7a:e6:6d:e0: 8b:87:dd:dd:a4:17:36:13:f1:a3:91:9d:8e:65:18:32: 91:22:18:46:d5:ad:b7:22:54:f1:bc:d4:8b:c0:51:04: 39:1d:cf:19:44:7e:75:72:b6:33:a8:ec:c6:de:0b:e3: e6:ae:80:76:27:79:ec:e0:4d:a1:6c:63:03:76:f6:bd: d3:99:16:77:28:30:7d:32:9d:7d:c0:5c:7e:3f:4c:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 26:b7:b1:05:50:bb:e1:36:ab:89:1b:53:3b:0d:84:0c: 4e:de:39:2c:ae:14:83:22:54:f8:b4:3e:92:1c:3a:5e: 11:72:8a:a9:01:0b:5a:2e:8e:29:55:fa:d2:0d:f8:48: 18:c1:ef:44:d2:9b:bf:89:7e:e5:a6:c1:d5:36:1a:1f: a5:95:ad:f8:3e:f4:32:72:e1:2d:61:fe:0d:11:80:4d: 0e:98:d2:11:43:6a:40:a7:10:47:dd:34:a9:a0:26:3a: ae:f3:46:24:9c:d2:71:16:c7:64:df:42:71:42:0b:f8: 01:a4:dd:c2:28:84:f0:dd:18:4a:a0:33:64:09:34:e1: ff:70:60:ab:23:b9:0f:bc:d7:59:19:76:eb:89:9c:e1: 26:19:53:04:05:c9:a5:8b:2a:2c:a6:3b:e8:73:71:eb: af:18:29:4c:e2:97:6a:c3:12:69:45:19:4d:a7:63:28: 8d:6a:cf:e0:86:d1:6f:ee:38:a7:d7:92:91:48:da:68: 87:95:3d:f2:aa:29:5c:1d:4a:72:6a:5f:c1:63:06:f6: 08:37:46:09:1e:08:3e:ae:61:1b:8e:05:70:32:52:83: 7c:93:56:29:1b:1c:1c:f2:c9:48:ea:a2:5c:7a:9a:04: 93:29:60:8a:5a:3d:cd:10:10:5e:ad:6a:15:65:94:a4 Fingerprint (SHA-256): 13:3F:C9:91:B8:58:39:A3:F7:71:16:99:22:AA:96:44:27:17:E9:97:8C:B1:38:7C:0B:43:44:3A:AF:A6:D1:83 Fingerprint (SHA1): 1C:8F:1A:5C:62:DE:54:59:63:CE:75:47:D6:19:CE:02:3F:A7:34:D5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #11822: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11823: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125894 (0x1e67e746) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 13:05:29 2017 Not After : Tue May 10 13:05:29 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:99:47:01:9c:ca:8c:15:10:e8:c3:c8:7d:de:e6:f6: 1f:78:ae:0c:40:91:37:b4:ab:63:74:0f:2a:56:59:79: 17:8a:30:85:bb:49:22:1d:a2:fa:36:9d:e0:eb:64:2b: e8:a8:20:e3:2c:2d:c2:35:b3:02:80:57:e4:a4:85:6c: 09:e0:a2:a2:b8:a4:a8:4b:22:00:d3:fd:73:1d:2c:3b: db:c1:8f:fe:a6:e2:05:76:ad:b8:bd:1a:16:59:8b:b6: 54:87:5f:31:7d:c7:ee:6c:bd:61:cc:46:c6:b0:d4:4d: ee:b3:1f:33:d3:cc:6a:dd:55:1e:88:24:3b:dd:5f:58: 20:72:d0:39:45:bd:4f:69:9c:26:69:37:aa:33:cd:2e: a1:02:cb:eb:db:4e:93:81:d3:d6:12:b8:9f:dc:a5:db: 3d:6a:d0:54:97:b9:d3:c1:49:11:5b:72:99:c9:b9:6d: c7:a6:e8:70:69:e6:eb:bc:d9:45:15:b6:4c:05:13:71: 6f:a8:3e:f9:e8:09:0e:55:28:3b:9d:92:c4:84:cb:bf: ab:dc:2d:5a:1b:7a:39:d6:93:f2:d0:f7:5b:4d:2b:12: fa:ca:d6:c5:1d:59:f7:ab:ce:74:51:96:df:5e:65:5f: 6a:ff:06:2c:46:1d:2d:d5:8e:c9:b5:88:a5:02:b2:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:95:cb:21:b4:9b:39:5c:e2:0a:9b:60:d6:ff:04:17: 9b:9c:3a:a3:63:d0:1f:41:4b:42:48:d7:bf:60:7d:43: 1b:69:54:0e:61:7a:9c:08:4f:aa:18:6f:ee:83:88:89: 90:75:c7:a8:21:e4:ac:86:84:72:0b:88:e5:de:b1:23: d4:26:1e:46:71:48:99:c6:18:4b:c6:73:27:12:8d:5e: db:ff:a0:48:4d:e7:5f:2e:19:c1:78:e8:b2:4a:5f:58: 89:41:08:7c:fe:35:cc:89:9b:33:4c:03:2f:2f:56:15: aa:fc:d7:91:fd:7e:88:f7:ef:9e:ea:86:d5:60:b1:e3: 5f:1c:18:de:05:d3:d5:5c:38:11:7b:c3:1e:d2:67:b3: a0:d2:63:1c:01:fa:99:0a:c1:9e:4c:e8:7d:8e:a1:00: a6:24:22:28:f0:60:9e:51:dd:c5:eb:51:5a:a6:c8:e1: ab:ff:5e:dc:f2:3a:75:49:63:25:56:37:62:f8:75:97: f9:58:73:b5:a8:73:c3:d3:33:63:f8:64:50:1a:25:3d: a9:e9:ce:30:f0:78:d4:b7:23:da:50:1f:4f:91:52:25: 95:9e:29:2f:d8:e2:83:1b:5e:30:ed:d0:32:3c:af:2f: 97:36:13:a9:43:97:24:47:5c:73:72:1c:f7:4c:c6:7f Fingerprint (SHA-256): 23:49:4E:32:C6:81:29:EA:D9:7D:57:A9:A1:FF:DC:36:30:69:C9:14:3F:54:40:0A:4D:CB:1E:F8:DA:6B:BB:BA Fingerprint (SHA1): 85:6A:17:46:DB:77:A0:24:9B:80:F3:D1:A4:55:5C:34:09:D9:C9:BB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #11824: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11825: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #11826: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #11827: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #11828: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125892 (0x1e67e744) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:05:24 2017 Not After : Tue May 10 13:05:24 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:b3:41:53:0a:97:46:76:e6:c9:5a:56:2c:cb:4d:ea: 7e:67:7c:aa:53:cb:78:23:6d:a9:8e:5e:89:38:28:e3: 59:d5:bd:a3:7c:56:46:1c:bf:48:5f:25:59:c0:4b:26: 23:c4:13:15:6d:21:01:d9:f0:b6:92:87:3f:25:08:af: 03:d8:a7:f8:de:00:10:af:40:dd:a4:c7:4e:52:23:4a: d3:84:37:36:95:f4:e0:b9:2a:94:5e:af:79:44:6b:f8: d8:8b:12:0e:9d:73:22:d0:81:db:b2:58:38:43:51:d4: 11:53:08:5e:1b:f2:12:00:63:29:fc:79:aa:30:d6:1d: 5f:8e:64:d6:bb:65:25:8e:76:94:f5:e7:79:33:a2:0a: 2b:ab:d7:fc:73:20:e1:6c:4d:07:8c:1a:73:c9:52:67: e4:38:73:df:fa:29:c2:4e:78:d3:28:24:3c:55:e7:c7: 34:ec:86:df:73:4d:f6:0f:63:b0:44:3d:9d:7d:33:42: ea:8e:42:b8:a4:8d:0b:a1:60:de:ec:09:bf:b9:2e:46: 5f:ba:a3:a0:60:82:21:66:2f:e7:d6:3f:55:3e:05:89: 2c:27:54:3e:5a:26:4f:8a:1a:69:02:ee:a7:4e:73:8b: fc:13:09:ee:42:56:53:ea:e0:4c:93:53:c6:fc:50:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:0e:9f:83:9f:3f:ad:27:be:36:b3:93:04:8d:f8:ea: 58:b4:cf:38:7f:71:6c:ef:8e:84:f6:c3:db:07:24:98: dd:d4:f1:78:78:96:0e:d3:de:be:77:cc:cb:f1:69:89: 83:52:cd:4d:29:ea:21:c1:4a:23:3d:b7:5d:02:85:8f: d9:55:e7:df:83:e4:1c:e0:69:1b:be:33:55:73:dd:e6: b3:8b:51:30:36:45:be:e4:39:0c:02:96:ed:aa:28:79: de:8c:5f:29:94:27:d2:6a:b4:55:9a:58:19:fc:5a:13: 80:03:6a:5e:8c:47:4d:a3:bc:23:2f:1e:b2:bd:81:2b: e1:a0:25:75:34:37:2e:61:12:bc:fa:85:cb:1a:73:24: 39:5c:8c:f7:df:2f:d0:ba:fc:45:0d:cc:80:de:4a:6b: bf:b2:1a:27:17:0f:7d:5b:81:8a:d0:f6:6b:67:90:74: 27:cc:4a:eb:9e:9b:b7:84:f9:19:7e:5b:5b:24:f2:3e: db:02:7d:52:23:30:6b:98:92:5c:b2:5d:6a:fb:f5:8b: f8:7d:ed:a6:ae:28:48:99:a7:5d:de:1b:da:ca:8d:78: d5:9d:70:ce:18:e0:c5:ad:a2:3c:45:4a:71:4f:5f:2f: df:e4:e5:5c:bc:fb:a4:e8:e8:45:d8:67:62:0d:3b:24 Fingerprint (SHA-256): 0F:CE:D0:CF:C1:55:DA:9E:F3:F3:FA:4C:83:D0:F6:EC:BF:54:A3:9E:01:4F:0F:52:3F:FB:DE:A2:1D:68:B9:B8 Fingerprint (SHA1): C8:6B:24:6F:A0:CC:12:E4:12:FD:E5:2C:71:13:66:DC:6D:B2:6C:B3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11829: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11830: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125893 (0x1e67e745) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:05:27 2017 Not After : Tue May 10 13:05:27 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:1c:fb:ea:87:8d:ee:46:1c:1a:dd:75:99:9a:c2:d8: 74:2f:83:1a:b9:24:2e:60:e4:48:1d:5e:4d:fd:f3:36: 9e:63:ae:d2:18:32:f7:71:4f:3c:5c:54:d5:13:cf:2f: 3b:f7:3d:85:e5:01:6d:1d:9e:17:ac:56:24:0b:7a:a5: 1e:2e:03:bb:9d:77:27:c0:33:30:d0:57:77:b2:33:05: 94:f7:87:c1:d5:ed:59:16:bc:8a:82:0c:46:8e:0e:b4: 95:53:71:f6:61:68:96:a7:e9:43:bc:a1:c8:5a:fd:b4: c5:73:2d:7f:71:25:74:a6:0b:eb:21:2d:b4:9e:29:1e: 7e:18:fc:c7:88:f9:ba:64:f3:63:ed:cc:85:fe:8c:c8: 7d:0e:9d:7f:31:69:80:e7:c1:1f:cd:50:ce:3d:11:7c: 5b:d4:dc:a0:73:ea:05:c4:55:e4:d0:0a:7a:e6:6d:e0: 8b:87:dd:dd:a4:17:36:13:f1:a3:91:9d:8e:65:18:32: 91:22:18:46:d5:ad:b7:22:54:f1:bc:d4:8b:c0:51:04: 39:1d:cf:19:44:7e:75:72:b6:33:a8:ec:c6:de:0b:e3: e6:ae:80:76:27:79:ec:e0:4d:a1:6c:63:03:76:f6:bd: d3:99:16:77:28:30:7d:32:9d:7d:c0:5c:7e:3f:4c:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 26:b7:b1:05:50:bb:e1:36:ab:89:1b:53:3b:0d:84:0c: 4e:de:39:2c:ae:14:83:22:54:f8:b4:3e:92:1c:3a:5e: 11:72:8a:a9:01:0b:5a:2e:8e:29:55:fa:d2:0d:f8:48: 18:c1:ef:44:d2:9b:bf:89:7e:e5:a6:c1:d5:36:1a:1f: a5:95:ad:f8:3e:f4:32:72:e1:2d:61:fe:0d:11:80:4d: 0e:98:d2:11:43:6a:40:a7:10:47:dd:34:a9:a0:26:3a: ae:f3:46:24:9c:d2:71:16:c7:64:df:42:71:42:0b:f8: 01:a4:dd:c2:28:84:f0:dd:18:4a:a0:33:64:09:34:e1: ff:70:60:ab:23:b9:0f:bc:d7:59:19:76:eb:89:9c:e1: 26:19:53:04:05:c9:a5:8b:2a:2c:a6:3b:e8:73:71:eb: af:18:29:4c:e2:97:6a:c3:12:69:45:19:4d:a7:63:28: 8d:6a:cf:e0:86:d1:6f:ee:38:a7:d7:92:91:48:da:68: 87:95:3d:f2:aa:29:5c:1d:4a:72:6a:5f:c1:63:06:f6: 08:37:46:09:1e:08:3e:ae:61:1b:8e:05:70:32:52:83: 7c:93:56:29:1b:1c:1c:f2:c9:48:ea:a2:5c:7a:9a:04: 93:29:60:8a:5a:3d:cd:10:10:5e:ad:6a:15:65:94:a4 Fingerprint (SHA-256): 13:3F:C9:91:B8:58:39:A3:F7:71:16:99:22:AA:96:44:27:17:E9:97:8C:B1:38:7C:0B:43:44:3A:AF:A6:D1:83 Fingerprint (SHA1): 1C:8F:1A:5C:62:DE:54:59:63:CE:75:47:D6:19:CE:02:3F:A7:34:D5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #11831: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11832: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125894 (0x1e67e746) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 13:05:29 2017 Not After : Tue May 10 13:05:29 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:99:47:01:9c:ca:8c:15:10:e8:c3:c8:7d:de:e6:f6: 1f:78:ae:0c:40:91:37:b4:ab:63:74:0f:2a:56:59:79: 17:8a:30:85:bb:49:22:1d:a2:fa:36:9d:e0:eb:64:2b: e8:a8:20:e3:2c:2d:c2:35:b3:02:80:57:e4:a4:85:6c: 09:e0:a2:a2:b8:a4:a8:4b:22:00:d3:fd:73:1d:2c:3b: db:c1:8f:fe:a6:e2:05:76:ad:b8:bd:1a:16:59:8b:b6: 54:87:5f:31:7d:c7:ee:6c:bd:61:cc:46:c6:b0:d4:4d: ee:b3:1f:33:d3:cc:6a:dd:55:1e:88:24:3b:dd:5f:58: 20:72:d0:39:45:bd:4f:69:9c:26:69:37:aa:33:cd:2e: a1:02:cb:eb:db:4e:93:81:d3:d6:12:b8:9f:dc:a5:db: 3d:6a:d0:54:97:b9:d3:c1:49:11:5b:72:99:c9:b9:6d: c7:a6:e8:70:69:e6:eb:bc:d9:45:15:b6:4c:05:13:71: 6f:a8:3e:f9:e8:09:0e:55:28:3b:9d:92:c4:84:cb:bf: ab:dc:2d:5a:1b:7a:39:d6:93:f2:d0:f7:5b:4d:2b:12: fa:ca:d6:c5:1d:59:f7:ab:ce:74:51:96:df:5e:65:5f: 6a:ff:06:2c:46:1d:2d:d5:8e:c9:b5:88:a5:02:b2:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:95:cb:21:b4:9b:39:5c:e2:0a:9b:60:d6:ff:04:17: 9b:9c:3a:a3:63:d0:1f:41:4b:42:48:d7:bf:60:7d:43: 1b:69:54:0e:61:7a:9c:08:4f:aa:18:6f:ee:83:88:89: 90:75:c7:a8:21:e4:ac:86:84:72:0b:88:e5:de:b1:23: d4:26:1e:46:71:48:99:c6:18:4b:c6:73:27:12:8d:5e: db:ff:a0:48:4d:e7:5f:2e:19:c1:78:e8:b2:4a:5f:58: 89:41:08:7c:fe:35:cc:89:9b:33:4c:03:2f:2f:56:15: aa:fc:d7:91:fd:7e:88:f7:ef:9e:ea:86:d5:60:b1:e3: 5f:1c:18:de:05:d3:d5:5c:38:11:7b:c3:1e:d2:67:b3: a0:d2:63:1c:01:fa:99:0a:c1:9e:4c:e8:7d:8e:a1:00: a6:24:22:28:f0:60:9e:51:dd:c5:eb:51:5a:a6:c8:e1: ab:ff:5e:dc:f2:3a:75:49:63:25:56:37:62:f8:75:97: f9:58:73:b5:a8:73:c3:d3:33:63:f8:64:50:1a:25:3d: a9:e9:ce:30:f0:78:d4:b7:23:da:50:1f:4f:91:52:25: 95:9e:29:2f:d8:e2:83:1b:5e:30:ed:d0:32:3c:af:2f: 97:36:13:a9:43:97:24:47:5c:73:72:1c:f7:4c:c6:7f Fingerprint (SHA-256): 23:49:4E:32:C6:81:29:EA:D9:7D:57:A9:A1:FF:DC:36:30:69:C9:14:3F:54:40:0A:4D:CB:1E:F8:DA:6B:BB:BA Fingerprint (SHA1): 85:6A:17:46:DB:77:A0:24:9B:80:F3:D1:A4:55:5C:34:09:D9:C9:BB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #11833: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11834: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125892 (0x1e67e744) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:05:24 2017 Not After : Tue May 10 13:05:24 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:b3:41:53:0a:97:46:76:e6:c9:5a:56:2c:cb:4d:ea: 7e:67:7c:aa:53:cb:78:23:6d:a9:8e:5e:89:38:28:e3: 59:d5:bd:a3:7c:56:46:1c:bf:48:5f:25:59:c0:4b:26: 23:c4:13:15:6d:21:01:d9:f0:b6:92:87:3f:25:08:af: 03:d8:a7:f8:de:00:10:af:40:dd:a4:c7:4e:52:23:4a: d3:84:37:36:95:f4:e0:b9:2a:94:5e:af:79:44:6b:f8: d8:8b:12:0e:9d:73:22:d0:81:db:b2:58:38:43:51:d4: 11:53:08:5e:1b:f2:12:00:63:29:fc:79:aa:30:d6:1d: 5f:8e:64:d6:bb:65:25:8e:76:94:f5:e7:79:33:a2:0a: 2b:ab:d7:fc:73:20:e1:6c:4d:07:8c:1a:73:c9:52:67: e4:38:73:df:fa:29:c2:4e:78:d3:28:24:3c:55:e7:c7: 34:ec:86:df:73:4d:f6:0f:63:b0:44:3d:9d:7d:33:42: ea:8e:42:b8:a4:8d:0b:a1:60:de:ec:09:bf:b9:2e:46: 5f:ba:a3:a0:60:82:21:66:2f:e7:d6:3f:55:3e:05:89: 2c:27:54:3e:5a:26:4f:8a:1a:69:02:ee:a7:4e:73:8b: fc:13:09:ee:42:56:53:ea:e0:4c:93:53:c6:fc:50:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:0e:9f:83:9f:3f:ad:27:be:36:b3:93:04:8d:f8:ea: 58:b4:cf:38:7f:71:6c:ef:8e:84:f6:c3:db:07:24:98: dd:d4:f1:78:78:96:0e:d3:de:be:77:cc:cb:f1:69:89: 83:52:cd:4d:29:ea:21:c1:4a:23:3d:b7:5d:02:85:8f: d9:55:e7:df:83:e4:1c:e0:69:1b:be:33:55:73:dd:e6: b3:8b:51:30:36:45:be:e4:39:0c:02:96:ed:aa:28:79: de:8c:5f:29:94:27:d2:6a:b4:55:9a:58:19:fc:5a:13: 80:03:6a:5e:8c:47:4d:a3:bc:23:2f:1e:b2:bd:81:2b: e1:a0:25:75:34:37:2e:61:12:bc:fa:85:cb:1a:73:24: 39:5c:8c:f7:df:2f:d0:ba:fc:45:0d:cc:80:de:4a:6b: bf:b2:1a:27:17:0f:7d:5b:81:8a:d0:f6:6b:67:90:74: 27:cc:4a:eb:9e:9b:b7:84:f9:19:7e:5b:5b:24:f2:3e: db:02:7d:52:23:30:6b:98:92:5c:b2:5d:6a:fb:f5:8b: f8:7d:ed:a6:ae:28:48:99:a7:5d:de:1b:da:ca:8d:78: d5:9d:70:ce:18:e0:c5:ad:a2:3c:45:4a:71:4f:5f:2f: df:e4:e5:5c:bc:fb:a4:e8:e8:45:d8:67:62:0d:3b:24 Fingerprint (SHA-256): 0F:CE:D0:CF:C1:55:DA:9E:F3:F3:FA:4C:83:D0:F6:EC:BF:54:A3:9E:01:4F:0F:52:3F:FB:DE:A2:1D:68:B9:B8 Fingerprint (SHA1): C8:6B:24:6F:A0:CC:12:E4:12:FD:E5:2C:71:13:66:DC:6D:B2:6C:B3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11835: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125892 (0x1e67e744) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:05:24 2017 Not After : Tue May 10 13:05:24 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:b3:41:53:0a:97:46:76:e6:c9:5a:56:2c:cb:4d:ea: 7e:67:7c:aa:53:cb:78:23:6d:a9:8e:5e:89:38:28:e3: 59:d5:bd:a3:7c:56:46:1c:bf:48:5f:25:59:c0:4b:26: 23:c4:13:15:6d:21:01:d9:f0:b6:92:87:3f:25:08:af: 03:d8:a7:f8:de:00:10:af:40:dd:a4:c7:4e:52:23:4a: d3:84:37:36:95:f4:e0:b9:2a:94:5e:af:79:44:6b:f8: d8:8b:12:0e:9d:73:22:d0:81:db:b2:58:38:43:51:d4: 11:53:08:5e:1b:f2:12:00:63:29:fc:79:aa:30:d6:1d: 5f:8e:64:d6:bb:65:25:8e:76:94:f5:e7:79:33:a2:0a: 2b:ab:d7:fc:73:20:e1:6c:4d:07:8c:1a:73:c9:52:67: e4:38:73:df:fa:29:c2:4e:78:d3:28:24:3c:55:e7:c7: 34:ec:86:df:73:4d:f6:0f:63:b0:44:3d:9d:7d:33:42: ea:8e:42:b8:a4:8d:0b:a1:60:de:ec:09:bf:b9:2e:46: 5f:ba:a3:a0:60:82:21:66:2f:e7:d6:3f:55:3e:05:89: 2c:27:54:3e:5a:26:4f:8a:1a:69:02:ee:a7:4e:73:8b: fc:13:09:ee:42:56:53:ea:e0:4c:93:53:c6:fc:50:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:0e:9f:83:9f:3f:ad:27:be:36:b3:93:04:8d:f8:ea: 58:b4:cf:38:7f:71:6c:ef:8e:84:f6:c3:db:07:24:98: dd:d4:f1:78:78:96:0e:d3:de:be:77:cc:cb:f1:69:89: 83:52:cd:4d:29:ea:21:c1:4a:23:3d:b7:5d:02:85:8f: d9:55:e7:df:83:e4:1c:e0:69:1b:be:33:55:73:dd:e6: b3:8b:51:30:36:45:be:e4:39:0c:02:96:ed:aa:28:79: de:8c:5f:29:94:27:d2:6a:b4:55:9a:58:19:fc:5a:13: 80:03:6a:5e:8c:47:4d:a3:bc:23:2f:1e:b2:bd:81:2b: e1:a0:25:75:34:37:2e:61:12:bc:fa:85:cb:1a:73:24: 39:5c:8c:f7:df:2f:d0:ba:fc:45:0d:cc:80:de:4a:6b: bf:b2:1a:27:17:0f:7d:5b:81:8a:d0:f6:6b:67:90:74: 27:cc:4a:eb:9e:9b:b7:84:f9:19:7e:5b:5b:24:f2:3e: db:02:7d:52:23:30:6b:98:92:5c:b2:5d:6a:fb:f5:8b: f8:7d:ed:a6:ae:28:48:99:a7:5d:de:1b:da:ca:8d:78: d5:9d:70:ce:18:e0:c5:ad:a2:3c:45:4a:71:4f:5f:2f: df:e4:e5:5c:bc:fb:a4:e8:e8:45:d8:67:62:0d:3b:24 Fingerprint (SHA-256): 0F:CE:D0:CF:C1:55:DA:9E:F3:F3:FA:4C:83:D0:F6:EC:BF:54:A3:9E:01:4F:0F:52:3F:FB:DE:A2:1D:68:B9:B8 Fingerprint (SHA1): C8:6B:24:6F:A0:CC:12:E4:12:FD:E5:2C:71:13:66:DC:6D:B2:6C:B3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11836: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125893 (0x1e67e745) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:05:27 2017 Not After : Tue May 10 13:05:27 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:1c:fb:ea:87:8d:ee:46:1c:1a:dd:75:99:9a:c2:d8: 74:2f:83:1a:b9:24:2e:60:e4:48:1d:5e:4d:fd:f3:36: 9e:63:ae:d2:18:32:f7:71:4f:3c:5c:54:d5:13:cf:2f: 3b:f7:3d:85:e5:01:6d:1d:9e:17:ac:56:24:0b:7a:a5: 1e:2e:03:bb:9d:77:27:c0:33:30:d0:57:77:b2:33:05: 94:f7:87:c1:d5:ed:59:16:bc:8a:82:0c:46:8e:0e:b4: 95:53:71:f6:61:68:96:a7:e9:43:bc:a1:c8:5a:fd:b4: c5:73:2d:7f:71:25:74:a6:0b:eb:21:2d:b4:9e:29:1e: 7e:18:fc:c7:88:f9:ba:64:f3:63:ed:cc:85:fe:8c:c8: 7d:0e:9d:7f:31:69:80:e7:c1:1f:cd:50:ce:3d:11:7c: 5b:d4:dc:a0:73:ea:05:c4:55:e4:d0:0a:7a:e6:6d:e0: 8b:87:dd:dd:a4:17:36:13:f1:a3:91:9d:8e:65:18:32: 91:22:18:46:d5:ad:b7:22:54:f1:bc:d4:8b:c0:51:04: 39:1d:cf:19:44:7e:75:72:b6:33:a8:ec:c6:de:0b:e3: e6:ae:80:76:27:79:ec:e0:4d:a1:6c:63:03:76:f6:bd: d3:99:16:77:28:30:7d:32:9d:7d:c0:5c:7e:3f:4c:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 26:b7:b1:05:50:bb:e1:36:ab:89:1b:53:3b:0d:84:0c: 4e:de:39:2c:ae:14:83:22:54:f8:b4:3e:92:1c:3a:5e: 11:72:8a:a9:01:0b:5a:2e:8e:29:55:fa:d2:0d:f8:48: 18:c1:ef:44:d2:9b:bf:89:7e:e5:a6:c1:d5:36:1a:1f: a5:95:ad:f8:3e:f4:32:72:e1:2d:61:fe:0d:11:80:4d: 0e:98:d2:11:43:6a:40:a7:10:47:dd:34:a9:a0:26:3a: ae:f3:46:24:9c:d2:71:16:c7:64:df:42:71:42:0b:f8: 01:a4:dd:c2:28:84:f0:dd:18:4a:a0:33:64:09:34:e1: ff:70:60:ab:23:b9:0f:bc:d7:59:19:76:eb:89:9c:e1: 26:19:53:04:05:c9:a5:8b:2a:2c:a6:3b:e8:73:71:eb: af:18:29:4c:e2:97:6a:c3:12:69:45:19:4d:a7:63:28: 8d:6a:cf:e0:86:d1:6f:ee:38:a7:d7:92:91:48:da:68: 87:95:3d:f2:aa:29:5c:1d:4a:72:6a:5f:c1:63:06:f6: 08:37:46:09:1e:08:3e:ae:61:1b:8e:05:70:32:52:83: 7c:93:56:29:1b:1c:1c:f2:c9:48:ea:a2:5c:7a:9a:04: 93:29:60:8a:5a:3d:cd:10:10:5e:ad:6a:15:65:94:a4 Fingerprint (SHA-256): 13:3F:C9:91:B8:58:39:A3:F7:71:16:99:22:AA:96:44:27:17:E9:97:8C:B1:38:7C:0B:43:44:3A:AF:A6:D1:83 Fingerprint (SHA1): 1C:8F:1A:5C:62:DE:54:59:63:CE:75:47:D6:19:CE:02:3F:A7:34:D5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #11837: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125893 (0x1e67e745) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:05:27 2017 Not After : Tue May 10 13:05:27 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:1c:fb:ea:87:8d:ee:46:1c:1a:dd:75:99:9a:c2:d8: 74:2f:83:1a:b9:24:2e:60:e4:48:1d:5e:4d:fd:f3:36: 9e:63:ae:d2:18:32:f7:71:4f:3c:5c:54:d5:13:cf:2f: 3b:f7:3d:85:e5:01:6d:1d:9e:17:ac:56:24:0b:7a:a5: 1e:2e:03:bb:9d:77:27:c0:33:30:d0:57:77:b2:33:05: 94:f7:87:c1:d5:ed:59:16:bc:8a:82:0c:46:8e:0e:b4: 95:53:71:f6:61:68:96:a7:e9:43:bc:a1:c8:5a:fd:b4: c5:73:2d:7f:71:25:74:a6:0b:eb:21:2d:b4:9e:29:1e: 7e:18:fc:c7:88:f9:ba:64:f3:63:ed:cc:85:fe:8c:c8: 7d:0e:9d:7f:31:69:80:e7:c1:1f:cd:50:ce:3d:11:7c: 5b:d4:dc:a0:73:ea:05:c4:55:e4:d0:0a:7a:e6:6d:e0: 8b:87:dd:dd:a4:17:36:13:f1:a3:91:9d:8e:65:18:32: 91:22:18:46:d5:ad:b7:22:54:f1:bc:d4:8b:c0:51:04: 39:1d:cf:19:44:7e:75:72:b6:33:a8:ec:c6:de:0b:e3: e6:ae:80:76:27:79:ec:e0:4d:a1:6c:63:03:76:f6:bd: d3:99:16:77:28:30:7d:32:9d:7d:c0:5c:7e:3f:4c:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 26:b7:b1:05:50:bb:e1:36:ab:89:1b:53:3b:0d:84:0c: 4e:de:39:2c:ae:14:83:22:54:f8:b4:3e:92:1c:3a:5e: 11:72:8a:a9:01:0b:5a:2e:8e:29:55:fa:d2:0d:f8:48: 18:c1:ef:44:d2:9b:bf:89:7e:e5:a6:c1:d5:36:1a:1f: a5:95:ad:f8:3e:f4:32:72:e1:2d:61:fe:0d:11:80:4d: 0e:98:d2:11:43:6a:40:a7:10:47:dd:34:a9:a0:26:3a: ae:f3:46:24:9c:d2:71:16:c7:64:df:42:71:42:0b:f8: 01:a4:dd:c2:28:84:f0:dd:18:4a:a0:33:64:09:34:e1: ff:70:60:ab:23:b9:0f:bc:d7:59:19:76:eb:89:9c:e1: 26:19:53:04:05:c9:a5:8b:2a:2c:a6:3b:e8:73:71:eb: af:18:29:4c:e2:97:6a:c3:12:69:45:19:4d:a7:63:28: 8d:6a:cf:e0:86:d1:6f:ee:38:a7:d7:92:91:48:da:68: 87:95:3d:f2:aa:29:5c:1d:4a:72:6a:5f:c1:63:06:f6: 08:37:46:09:1e:08:3e:ae:61:1b:8e:05:70:32:52:83: 7c:93:56:29:1b:1c:1c:f2:c9:48:ea:a2:5c:7a:9a:04: 93:29:60:8a:5a:3d:cd:10:10:5e:ad:6a:15:65:94:a4 Fingerprint (SHA-256): 13:3F:C9:91:B8:58:39:A3:F7:71:16:99:22:AA:96:44:27:17:E9:97:8C:B1:38:7C:0B:43:44:3A:AF:A6:D1:83 Fingerprint (SHA1): 1C:8F:1A:5C:62:DE:54:59:63:CE:75:47:D6:19:CE:02:3F:A7:34:D5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #11838: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125894 (0x1e67e746) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 13:05:29 2017 Not After : Tue May 10 13:05:29 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:99:47:01:9c:ca:8c:15:10:e8:c3:c8:7d:de:e6:f6: 1f:78:ae:0c:40:91:37:b4:ab:63:74:0f:2a:56:59:79: 17:8a:30:85:bb:49:22:1d:a2:fa:36:9d:e0:eb:64:2b: e8:a8:20:e3:2c:2d:c2:35:b3:02:80:57:e4:a4:85:6c: 09:e0:a2:a2:b8:a4:a8:4b:22:00:d3:fd:73:1d:2c:3b: db:c1:8f:fe:a6:e2:05:76:ad:b8:bd:1a:16:59:8b:b6: 54:87:5f:31:7d:c7:ee:6c:bd:61:cc:46:c6:b0:d4:4d: ee:b3:1f:33:d3:cc:6a:dd:55:1e:88:24:3b:dd:5f:58: 20:72:d0:39:45:bd:4f:69:9c:26:69:37:aa:33:cd:2e: a1:02:cb:eb:db:4e:93:81:d3:d6:12:b8:9f:dc:a5:db: 3d:6a:d0:54:97:b9:d3:c1:49:11:5b:72:99:c9:b9:6d: c7:a6:e8:70:69:e6:eb:bc:d9:45:15:b6:4c:05:13:71: 6f:a8:3e:f9:e8:09:0e:55:28:3b:9d:92:c4:84:cb:bf: ab:dc:2d:5a:1b:7a:39:d6:93:f2:d0:f7:5b:4d:2b:12: fa:ca:d6:c5:1d:59:f7:ab:ce:74:51:96:df:5e:65:5f: 6a:ff:06:2c:46:1d:2d:d5:8e:c9:b5:88:a5:02:b2:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:95:cb:21:b4:9b:39:5c:e2:0a:9b:60:d6:ff:04:17: 9b:9c:3a:a3:63:d0:1f:41:4b:42:48:d7:bf:60:7d:43: 1b:69:54:0e:61:7a:9c:08:4f:aa:18:6f:ee:83:88:89: 90:75:c7:a8:21:e4:ac:86:84:72:0b:88:e5:de:b1:23: d4:26:1e:46:71:48:99:c6:18:4b:c6:73:27:12:8d:5e: db:ff:a0:48:4d:e7:5f:2e:19:c1:78:e8:b2:4a:5f:58: 89:41:08:7c:fe:35:cc:89:9b:33:4c:03:2f:2f:56:15: aa:fc:d7:91:fd:7e:88:f7:ef:9e:ea:86:d5:60:b1:e3: 5f:1c:18:de:05:d3:d5:5c:38:11:7b:c3:1e:d2:67:b3: a0:d2:63:1c:01:fa:99:0a:c1:9e:4c:e8:7d:8e:a1:00: a6:24:22:28:f0:60:9e:51:dd:c5:eb:51:5a:a6:c8:e1: ab:ff:5e:dc:f2:3a:75:49:63:25:56:37:62:f8:75:97: f9:58:73:b5:a8:73:c3:d3:33:63:f8:64:50:1a:25:3d: a9:e9:ce:30:f0:78:d4:b7:23:da:50:1f:4f:91:52:25: 95:9e:29:2f:d8:e2:83:1b:5e:30:ed:d0:32:3c:af:2f: 97:36:13:a9:43:97:24:47:5c:73:72:1c:f7:4c:c6:7f Fingerprint (SHA-256): 23:49:4E:32:C6:81:29:EA:D9:7D:57:A9:A1:FF:DC:36:30:69:C9:14:3F:54:40:0A:4D:CB:1E:F8:DA:6B:BB:BA Fingerprint (SHA1): 85:6A:17:46:DB:77:A0:24:9B:80:F3:D1:A4:55:5C:34:09:D9:C9:BB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #11839: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125894 (0x1e67e746) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 13:05:29 2017 Not After : Tue May 10 13:05:29 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:99:47:01:9c:ca:8c:15:10:e8:c3:c8:7d:de:e6:f6: 1f:78:ae:0c:40:91:37:b4:ab:63:74:0f:2a:56:59:79: 17:8a:30:85:bb:49:22:1d:a2:fa:36:9d:e0:eb:64:2b: e8:a8:20:e3:2c:2d:c2:35:b3:02:80:57:e4:a4:85:6c: 09:e0:a2:a2:b8:a4:a8:4b:22:00:d3:fd:73:1d:2c:3b: db:c1:8f:fe:a6:e2:05:76:ad:b8:bd:1a:16:59:8b:b6: 54:87:5f:31:7d:c7:ee:6c:bd:61:cc:46:c6:b0:d4:4d: ee:b3:1f:33:d3:cc:6a:dd:55:1e:88:24:3b:dd:5f:58: 20:72:d0:39:45:bd:4f:69:9c:26:69:37:aa:33:cd:2e: a1:02:cb:eb:db:4e:93:81:d3:d6:12:b8:9f:dc:a5:db: 3d:6a:d0:54:97:b9:d3:c1:49:11:5b:72:99:c9:b9:6d: c7:a6:e8:70:69:e6:eb:bc:d9:45:15:b6:4c:05:13:71: 6f:a8:3e:f9:e8:09:0e:55:28:3b:9d:92:c4:84:cb:bf: ab:dc:2d:5a:1b:7a:39:d6:93:f2:d0:f7:5b:4d:2b:12: fa:ca:d6:c5:1d:59:f7:ab:ce:74:51:96:df:5e:65:5f: 6a:ff:06:2c:46:1d:2d:d5:8e:c9:b5:88:a5:02:b2:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:95:cb:21:b4:9b:39:5c:e2:0a:9b:60:d6:ff:04:17: 9b:9c:3a:a3:63:d0:1f:41:4b:42:48:d7:bf:60:7d:43: 1b:69:54:0e:61:7a:9c:08:4f:aa:18:6f:ee:83:88:89: 90:75:c7:a8:21:e4:ac:86:84:72:0b:88:e5:de:b1:23: d4:26:1e:46:71:48:99:c6:18:4b:c6:73:27:12:8d:5e: db:ff:a0:48:4d:e7:5f:2e:19:c1:78:e8:b2:4a:5f:58: 89:41:08:7c:fe:35:cc:89:9b:33:4c:03:2f:2f:56:15: aa:fc:d7:91:fd:7e:88:f7:ef:9e:ea:86:d5:60:b1:e3: 5f:1c:18:de:05:d3:d5:5c:38:11:7b:c3:1e:d2:67:b3: a0:d2:63:1c:01:fa:99:0a:c1:9e:4c:e8:7d:8e:a1:00: a6:24:22:28:f0:60:9e:51:dd:c5:eb:51:5a:a6:c8:e1: ab:ff:5e:dc:f2:3a:75:49:63:25:56:37:62:f8:75:97: f9:58:73:b5:a8:73:c3:d3:33:63:f8:64:50:1a:25:3d: a9:e9:ce:30:f0:78:d4:b7:23:da:50:1f:4f:91:52:25: 95:9e:29:2f:d8:e2:83:1b:5e:30:ed:d0:32:3c:af:2f: 97:36:13:a9:43:97:24:47:5c:73:72:1c:f7:4c:c6:7f Fingerprint (SHA-256): 23:49:4E:32:C6:81:29:EA:D9:7D:57:A9:A1:FF:DC:36:30:69:C9:14:3F:54:40:0A:4D:CB:1E:F8:DA:6B:BB:BA Fingerprint (SHA1): 85:6A:17:46:DB:77:A0:24:9B:80:F3:D1:A4:55:5C:34:09:D9:C9:BB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #11840: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #11841: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125897 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11842: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #11843: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #11844: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11845: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 510125898 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11846: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11847: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #11848: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11849: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510125899 --extCP --extIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #11850: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11851: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #11852: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11853: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 510125900 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11854: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11855: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #11856: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11857: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 510125901 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11858: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11859: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #11860: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11861: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 510125902 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11862: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11863: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #11864: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11865: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 510125903 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11866: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11867: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #11868: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #11869: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #11870: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #11871: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #11872: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125897 (0x1e67e749) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 13:05:41 2017 Not After : Tue May 10 13:05:41 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:a6:93:5c:e6:4a:c4:95:23:a7:12:32:30:77:40:3d: bf:25:7b:87:6d:e7:d3:8c:19:91:e8:ab:5e:e3:3e:83: 12:ab:79:c2:71:79:48:f9:c2:0a:41:32:8f:ca:74:2e: 1b:70:2d:80:31:a7:c3:e6:81:97:10:61:01:84:5c:c1: a0:19:98:57:a7:56:f3:b9:f1:00:66:83:0b:9c:07:2f: 92:f5:0e:fa:a8:7e:28:d4:ff:27:ff:7d:80:c8:74:b0: 4c:81:cb:7a:4c:81:57:50:9e:7d:cc:de:a7:8a:55:b5: 20:e3:30:9c:d6:4d:a9:fb:51:e9:18:66:2a:12:7b:75: e6:ae:81:33:1e:3d:73:e1:a8:2e:58:e2:0d:75:bd:57: 76:fa:f2:c8:41:4b:20:af:20:38:76:33:7c:dc:35:ca: a5:cb:29:6d:1d:5f:68:3f:38:16:6c:31:d2:87:30:e9: 4d:11:1a:95:b8:e4:c1:c4:fb:0f:13:11:ac:7d:3b:05: c0:6d:6a:53:f8:aa:3f:80:3e:30:d5:93:cc:94:d1:79: a8:fd:1f:69:44:e1:16:f0:64:5a:26:8f:0a:e8:2f:d8: 81:49:d1:2f:cd:35:5d:ab:0f:ad:22:2c:f9:da:8e:d8: ba:10:1b:56:d9:42:a9:d4:1c:db:91:ae:cd:3d:40:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:89:00:06:24:8f:ee:42:74:11:0f:34:c6:1f:8b:1d: 12:94:e9:82:05:f8:54:24:c5:4e:46:6c:74:34:96:96: 21:f3:74:5f:c2:dd:19:36:29:c6:ab:d9:4d:aa:25:e3: 3b:50:fa:fb:1a:77:20:aa:cc:dc:21:21:be:bd:4b:c9: 13:72:70:24:c2:6f:78:89:1a:b4:20:13:c3:54:0a:10: 4a:09:89:f1:b9:f5:5f:08:c7:e0:a3:ef:8c:8e:77:fd: 33:7b:47:f7:75:8c:48:6b:84:7c:f9:c8:4d:6c:75:c2: c5:2b:49:67:aa:a7:94:56:34:ee:f2:5d:c9:46:6c:f0: c0:0e:03:84:3a:4d:cc:9b:c2:17:59:55:fb:c6:ce:24: 74:cf:fe:04:e5:46:86:e5:0e:6b:60:8f:0b:6a:7e:0a: 20:3e:8e:99:0f:30:2d:1a:cb:9b:59:d6:09:2b:a4:21: 0d:ee:29:fa:d6:b7:71:65:59:0d:b3:95:44:da:a3:26: 3a:64:b9:e3:66:78:bd:0b:81:13:57:9f:cd:a3:04:08: ec:c2:84:6b:9f:61:09:d8:d3:7e:25:15:d2:5d:de:d6: 8d:e4:c6:85:01:b7:19:88:16:94:58:50:df:19:29:c2: fa:05:ec:90:65:68:e2:5a:44:8c:ca:1d:ec:2b:0d:49 Fingerprint (SHA-256): 55:1E:B4:7D:44:3B:E2:04:54:0D:EE:FC:C7:F7:05:A7:8E:AC:19:D0:34:09:5F:06:D6:90:81:22:F5:1E:6A:86 Fingerprint (SHA1): AB:D7:55:CD:61:31:1A:78:8E:19:EC:46:81:40:40:97:62:A6:E8:33 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11873: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11874: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11875: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11876: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125897 (0x1e67e749) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 13:05:41 2017 Not After : Tue May 10 13:05:41 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:a6:93:5c:e6:4a:c4:95:23:a7:12:32:30:77:40:3d: bf:25:7b:87:6d:e7:d3:8c:19:91:e8:ab:5e:e3:3e:83: 12:ab:79:c2:71:79:48:f9:c2:0a:41:32:8f:ca:74:2e: 1b:70:2d:80:31:a7:c3:e6:81:97:10:61:01:84:5c:c1: a0:19:98:57:a7:56:f3:b9:f1:00:66:83:0b:9c:07:2f: 92:f5:0e:fa:a8:7e:28:d4:ff:27:ff:7d:80:c8:74:b0: 4c:81:cb:7a:4c:81:57:50:9e:7d:cc:de:a7:8a:55:b5: 20:e3:30:9c:d6:4d:a9:fb:51:e9:18:66:2a:12:7b:75: e6:ae:81:33:1e:3d:73:e1:a8:2e:58:e2:0d:75:bd:57: 76:fa:f2:c8:41:4b:20:af:20:38:76:33:7c:dc:35:ca: a5:cb:29:6d:1d:5f:68:3f:38:16:6c:31:d2:87:30:e9: 4d:11:1a:95:b8:e4:c1:c4:fb:0f:13:11:ac:7d:3b:05: c0:6d:6a:53:f8:aa:3f:80:3e:30:d5:93:cc:94:d1:79: a8:fd:1f:69:44:e1:16:f0:64:5a:26:8f:0a:e8:2f:d8: 81:49:d1:2f:cd:35:5d:ab:0f:ad:22:2c:f9:da:8e:d8: ba:10:1b:56:d9:42:a9:d4:1c:db:91:ae:cd:3d:40:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:89:00:06:24:8f:ee:42:74:11:0f:34:c6:1f:8b:1d: 12:94:e9:82:05:f8:54:24:c5:4e:46:6c:74:34:96:96: 21:f3:74:5f:c2:dd:19:36:29:c6:ab:d9:4d:aa:25:e3: 3b:50:fa:fb:1a:77:20:aa:cc:dc:21:21:be:bd:4b:c9: 13:72:70:24:c2:6f:78:89:1a:b4:20:13:c3:54:0a:10: 4a:09:89:f1:b9:f5:5f:08:c7:e0:a3:ef:8c:8e:77:fd: 33:7b:47:f7:75:8c:48:6b:84:7c:f9:c8:4d:6c:75:c2: c5:2b:49:67:aa:a7:94:56:34:ee:f2:5d:c9:46:6c:f0: c0:0e:03:84:3a:4d:cc:9b:c2:17:59:55:fb:c6:ce:24: 74:cf:fe:04:e5:46:86:e5:0e:6b:60:8f:0b:6a:7e:0a: 20:3e:8e:99:0f:30:2d:1a:cb:9b:59:d6:09:2b:a4:21: 0d:ee:29:fa:d6:b7:71:65:59:0d:b3:95:44:da:a3:26: 3a:64:b9:e3:66:78:bd:0b:81:13:57:9f:cd:a3:04:08: ec:c2:84:6b:9f:61:09:d8:d3:7e:25:15:d2:5d:de:d6: 8d:e4:c6:85:01:b7:19:88:16:94:58:50:df:19:29:c2: fa:05:ec:90:65:68:e2:5a:44:8c:ca:1d:ec:2b:0d:49 Fingerprint (SHA-256): 55:1E:B4:7D:44:3B:E2:04:54:0D:EE:FC:C7:F7:05:A7:8E:AC:19:D0:34:09:5F:06:D6:90:81:22:F5:1E:6A:86 Fingerprint (SHA1): AB:D7:55:CD:61:31:1A:78:8E:19:EC:46:81:40:40:97:62:A6:E8:33 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11877: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #11878: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #11879: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125904 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11880: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #11881: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #11882: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11883: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 510125905 --extCP --extIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #11884: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11885: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #11886: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11887: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 510125906 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11888: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11889: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #11890: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11891: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 510125907 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11892: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11893: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #11894: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11895: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 510125908 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11896: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11897: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #11898: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11899: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 510125909 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11900: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11901: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #11902: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11903: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 510125910 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11904: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11905: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #11906: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11907: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 510125911 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11908: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11909: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #11910: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11911: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 510125912 --extCP --extIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #11912: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11913: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #11914: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11915: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 510125913 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11916: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11917: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #11918: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11919: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 510125914 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11920: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11921: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #11922: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11923: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 510125915 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11924: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11925: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #11926: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11927: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 510125916 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11928: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11929: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #11930: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11931: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 510125917 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11932: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11933: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #11934: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11935: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 510125918 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11936: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11937: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #11938: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11939: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 510125919 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11940: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11941: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #11942: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11943: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 510125920 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11944: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11945: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #11946: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11947: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 510125921 --extCP --extIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #11948: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11949: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #11950: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11951: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 510125922 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11952: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11953: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #11954: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11955: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 510125923 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11956: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11957: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #11958: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11959: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 510125924 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11960: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11961: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #11962: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11963: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 510125925 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11964: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11965: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #11966: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11967: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 510125926 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11968: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11969: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #11970: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11971: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 510125927 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11972: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11973: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #11974: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11975: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 510125928 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11976: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11977: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #11978: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11979: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 510125929 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11980: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11981: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #11982: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11983: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 510125930 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11984: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11985: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #11986: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11987: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 510125931 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11988: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11989: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #11990: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11991: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 510125932 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11992: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11993: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #11994: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11995: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 510125933 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #11996: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11997: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #11998: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125904 (0x1e67e750) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 13:06:03 2017 Not After : Tue May 10 13:06:03 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:18:48:cd:71:38:18:22:02:66:4f:86:a6:02:62:86: 28:a1:d8:9e:38:69:6a:bc:14:79:28:ba:b4:67:8b:d6: 79:8f:a1:1c:4c:be:79:40:1d:54:30:ed:3f:b9:82:f8: b0:0c:cf:68:7e:63:f3:46:83:1b:07:7e:da:32:70:ce: e3:f4:dd:bc:89:ec:e4:69:27:e1:8d:54:82:bf:b4:66: b8:32:20:46:c0:10:f4:96:5a:27:ef:16:7b:35:92:e1: b0:8b:b0:d7:4c:4e:01:49:f2:c7:61:e5:7c:43:66:e0: 58:3a:bb:e0:db:65:f6:47:8b:75:80:3d:e1:0b:7c:e8: 94:cc:1c:e6:8b:77:0b:60:33:eb:fc:3d:e8:ba:d8:6c: 8e:34:ca:59:23:66:e9:f2:d6:11:03:39:9d:13:a7:f7: 31:56:88:60:ca:34:89:f4:95:df:14:b3:86:74:77:ab: e5:7a:19:6d:b4:64:6b:0d:70:bf:d8:f2:72:e6:f6:c8: 78:d1:da:03:9d:66:e9:47:5b:b2:a5:8e:75:59:cc:7d: dd:42:0c:c3:ac:7f:2f:76:90:c4:ed:b2:5b:78:87:03: 58:83:ee:95:36:4f:e5:af:96:1f:0d:a1:d1:5f:ea:9b: 7c:00:6c:8d:49:72:80:e5:8d:2c:33:a6:dd:01:c7:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:c5:f4:23:d6:ea:f9:48:26:c5:f4:31:b1:1b:e8:59: 4e:51:34:0a:82:fa:3a:c8:f4:2a:70:ff:62:bf:68:43: d6:be:6d:a4:f8:ae:d8:71:3f:87:f5:79:ff:d0:6c:5a: 0c:47:57:8f:ac:c2:f4:19:a0:1f:c6:b3:14:0e:f5:71: c9:73:eb:42:90:a9:8a:96:fc:00:4e:3b:9a:b2:fc:1d: f0:89:29:b1:78:91:88:1a:79:aa:7a:08:fb:7b:5c:4c: 73:52:f6:54:0d:47:44:22:eb:2d:f8:fe:75:b0:e0:44: a1:4d:fc:05:f2:f1:a6:89:93:63:11:54:62:ca:db:12: 48:35:d8:2b:50:6f:4c:b0:ce:ec:82:bf:5f:62:e5:95: 3a:91:19:bb:a1:2b:43:c5:3f:7d:1a:d3:c5:ce:06:f2: 86:6a:e1:ac:c0:aa:cf:59:3f:0b:e9:a2:5f:e7:a5:d2: 2c:cc:27:d3:ef:dc:87:e0:fb:ed:6a:a9:12:8d:1d:cd: 4b:bc:15:26:19:c9:ff:09:ea:ff:35:5f:0a:41:8a:15: b6:b0:89:0b:b3:01:bb:f3:ab:a6:dd:9e:75:99:7d:40: 19:09:ea:13:54:88:ce:6d:35:e5:7c:1f:34:d6:c3:e7: a3:c0:d1:01:f1:a1:c1:3f:b9:2a:88:c6:80:bc:0f:8c Fingerprint (SHA-256): C4:FF:C1:66:0C:E8:24:9C:62:87:7B:DE:D1:69:3B:5D:57:B5:C6:18:E8:BF:A5:9C:A4:2E:1C:0C:F6:9C:18:1B Fingerprint (SHA1): 10:D1:C3:07:E7:96:15:66:4F:D9:49:F5:99:AA:DD:2B:D0:81:74:80 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #11999: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12000: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125904 (0x1e67e750) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 13:06:03 2017 Not After : Tue May 10 13:06:03 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:18:48:cd:71:38:18:22:02:66:4f:86:a6:02:62:86: 28:a1:d8:9e:38:69:6a:bc:14:79:28:ba:b4:67:8b:d6: 79:8f:a1:1c:4c:be:79:40:1d:54:30:ed:3f:b9:82:f8: b0:0c:cf:68:7e:63:f3:46:83:1b:07:7e:da:32:70:ce: e3:f4:dd:bc:89:ec:e4:69:27:e1:8d:54:82:bf:b4:66: b8:32:20:46:c0:10:f4:96:5a:27:ef:16:7b:35:92:e1: b0:8b:b0:d7:4c:4e:01:49:f2:c7:61:e5:7c:43:66:e0: 58:3a:bb:e0:db:65:f6:47:8b:75:80:3d:e1:0b:7c:e8: 94:cc:1c:e6:8b:77:0b:60:33:eb:fc:3d:e8:ba:d8:6c: 8e:34:ca:59:23:66:e9:f2:d6:11:03:39:9d:13:a7:f7: 31:56:88:60:ca:34:89:f4:95:df:14:b3:86:74:77:ab: e5:7a:19:6d:b4:64:6b:0d:70:bf:d8:f2:72:e6:f6:c8: 78:d1:da:03:9d:66:e9:47:5b:b2:a5:8e:75:59:cc:7d: dd:42:0c:c3:ac:7f:2f:76:90:c4:ed:b2:5b:78:87:03: 58:83:ee:95:36:4f:e5:af:96:1f:0d:a1:d1:5f:ea:9b: 7c:00:6c:8d:49:72:80:e5:8d:2c:33:a6:dd:01:c7:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:c5:f4:23:d6:ea:f9:48:26:c5:f4:31:b1:1b:e8:59: 4e:51:34:0a:82:fa:3a:c8:f4:2a:70:ff:62:bf:68:43: d6:be:6d:a4:f8:ae:d8:71:3f:87:f5:79:ff:d0:6c:5a: 0c:47:57:8f:ac:c2:f4:19:a0:1f:c6:b3:14:0e:f5:71: c9:73:eb:42:90:a9:8a:96:fc:00:4e:3b:9a:b2:fc:1d: f0:89:29:b1:78:91:88:1a:79:aa:7a:08:fb:7b:5c:4c: 73:52:f6:54:0d:47:44:22:eb:2d:f8:fe:75:b0:e0:44: a1:4d:fc:05:f2:f1:a6:89:93:63:11:54:62:ca:db:12: 48:35:d8:2b:50:6f:4c:b0:ce:ec:82:bf:5f:62:e5:95: 3a:91:19:bb:a1:2b:43:c5:3f:7d:1a:d3:c5:ce:06:f2: 86:6a:e1:ac:c0:aa:cf:59:3f:0b:e9:a2:5f:e7:a5:d2: 2c:cc:27:d3:ef:dc:87:e0:fb:ed:6a:a9:12:8d:1d:cd: 4b:bc:15:26:19:c9:ff:09:ea:ff:35:5f:0a:41:8a:15: b6:b0:89:0b:b3:01:bb:f3:ab:a6:dd:9e:75:99:7d:40: 19:09:ea:13:54:88:ce:6d:35:e5:7c:1f:34:d6:c3:e7: a3:c0:d1:01:f1:a1:c1:3f:b9:2a:88:c6:80:bc:0f:8c Fingerprint (SHA-256): C4:FF:C1:66:0C:E8:24:9C:62:87:7B:DE:D1:69:3B:5D:57:B5:C6:18:E8:BF:A5:9C:A4:2E:1C:0C:F6:9C:18:1B Fingerprint (SHA1): 10:D1:C3:07:E7:96:15:66:4F:D9:49:F5:99:AA:DD:2B:D0:81:74:80 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12001: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12002: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12003: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12004: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125904 (0x1e67e750) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 13:06:03 2017 Not After : Tue May 10 13:06:03 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:18:48:cd:71:38:18:22:02:66:4f:86:a6:02:62:86: 28:a1:d8:9e:38:69:6a:bc:14:79:28:ba:b4:67:8b:d6: 79:8f:a1:1c:4c:be:79:40:1d:54:30:ed:3f:b9:82:f8: b0:0c:cf:68:7e:63:f3:46:83:1b:07:7e:da:32:70:ce: e3:f4:dd:bc:89:ec:e4:69:27:e1:8d:54:82:bf:b4:66: b8:32:20:46:c0:10:f4:96:5a:27:ef:16:7b:35:92:e1: b0:8b:b0:d7:4c:4e:01:49:f2:c7:61:e5:7c:43:66:e0: 58:3a:bb:e0:db:65:f6:47:8b:75:80:3d:e1:0b:7c:e8: 94:cc:1c:e6:8b:77:0b:60:33:eb:fc:3d:e8:ba:d8:6c: 8e:34:ca:59:23:66:e9:f2:d6:11:03:39:9d:13:a7:f7: 31:56:88:60:ca:34:89:f4:95:df:14:b3:86:74:77:ab: e5:7a:19:6d:b4:64:6b:0d:70:bf:d8:f2:72:e6:f6:c8: 78:d1:da:03:9d:66:e9:47:5b:b2:a5:8e:75:59:cc:7d: dd:42:0c:c3:ac:7f:2f:76:90:c4:ed:b2:5b:78:87:03: 58:83:ee:95:36:4f:e5:af:96:1f:0d:a1:d1:5f:ea:9b: 7c:00:6c:8d:49:72:80:e5:8d:2c:33:a6:dd:01:c7:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:c5:f4:23:d6:ea:f9:48:26:c5:f4:31:b1:1b:e8:59: 4e:51:34:0a:82:fa:3a:c8:f4:2a:70:ff:62:bf:68:43: d6:be:6d:a4:f8:ae:d8:71:3f:87:f5:79:ff:d0:6c:5a: 0c:47:57:8f:ac:c2:f4:19:a0:1f:c6:b3:14:0e:f5:71: c9:73:eb:42:90:a9:8a:96:fc:00:4e:3b:9a:b2:fc:1d: f0:89:29:b1:78:91:88:1a:79:aa:7a:08:fb:7b:5c:4c: 73:52:f6:54:0d:47:44:22:eb:2d:f8:fe:75:b0:e0:44: a1:4d:fc:05:f2:f1:a6:89:93:63:11:54:62:ca:db:12: 48:35:d8:2b:50:6f:4c:b0:ce:ec:82:bf:5f:62:e5:95: 3a:91:19:bb:a1:2b:43:c5:3f:7d:1a:d3:c5:ce:06:f2: 86:6a:e1:ac:c0:aa:cf:59:3f:0b:e9:a2:5f:e7:a5:d2: 2c:cc:27:d3:ef:dc:87:e0:fb:ed:6a:a9:12:8d:1d:cd: 4b:bc:15:26:19:c9:ff:09:ea:ff:35:5f:0a:41:8a:15: b6:b0:89:0b:b3:01:bb:f3:ab:a6:dd:9e:75:99:7d:40: 19:09:ea:13:54:88:ce:6d:35:e5:7c:1f:34:d6:c3:e7: a3:c0:d1:01:f1:a1:c1:3f:b9:2a:88:c6:80:bc:0f:8c Fingerprint (SHA-256): C4:FF:C1:66:0C:E8:24:9C:62:87:7B:DE:D1:69:3B:5D:57:B5:C6:18:E8:BF:A5:9C:A4:2E:1C:0C:F6:9C:18:1B Fingerprint (SHA1): 10:D1:C3:07:E7:96:15:66:4F:D9:49:F5:99:AA:DD:2B:D0:81:74:80 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12005: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12006: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12007: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12008: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125904 (0x1e67e750) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 13:06:03 2017 Not After : Tue May 10 13:06:03 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:18:48:cd:71:38:18:22:02:66:4f:86:a6:02:62:86: 28:a1:d8:9e:38:69:6a:bc:14:79:28:ba:b4:67:8b:d6: 79:8f:a1:1c:4c:be:79:40:1d:54:30:ed:3f:b9:82:f8: b0:0c:cf:68:7e:63:f3:46:83:1b:07:7e:da:32:70:ce: e3:f4:dd:bc:89:ec:e4:69:27:e1:8d:54:82:bf:b4:66: b8:32:20:46:c0:10:f4:96:5a:27:ef:16:7b:35:92:e1: b0:8b:b0:d7:4c:4e:01:49:f2:c7:61:e5:7c:43:66:e0: 58:3a:bb:e0:db:65:f6:47:8b:75:80:3d:e1:0b:7c:e8: 94:cc:1c:e6:8b:77:0b:60:33:eb:fc:3d:e8:ba:d8:6c: 8e:34:ca:59:23:66:e9:f2:d6:11:03:39:9d:13:a7:f7: 31:56:88:60:ca:34:89:f4:95:df:14:b3:86:74:77:ab: e5:7a:19:6d:b4:64:6b:0d:70:bf:d8:f2:72:e6:f6:c8: 78:d1:da:03:9d:66:e9:47:5b:b2:a5:8e:75:59:cc:7d: dd:42:0c:c3:ac:7f:2f:76:90:c4:ed:b2:5b:78:87:03: 58:83:ee:95:36:4f:e5:af:96:1f:0d:a1:d1:5f:ea:9b: 7c:00:6c:8d:49:72:80:e5:8d:2c:33:a6:dd:01:c7:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:c5:f4:23:d6:ea:f9:48:26:c5:f4:31:b1:1b:e8:59: 4e:51:34:0a:82:fa:3a:c8:f4:2a:70:ff:62:bf:68:43: d6:be:6d:a4:f8:ae:d8:71:3f:87:f5:79:ff:d0:6c:5a: 0c:47:57:8f:ac:c2:f4:19:a0:1f:c6:b3:14:0e:f5:71: c9:73:eb:42:90:a9:8a:96:fc:00:4e:3b:9a:b2:fc:1d: f0:89:29:b1:78:91:88:1a:79:aa:7a:08:fb:7b:5c:4c: 73:52:f6:54:0d:47:44:22:eb:2d:f8:fe:75:b0:e0:44: a1:4d:fc:05:f2:f1:a6:89:93:63:11:54:62:ca:db:12: 48:35:d8:2b:50:6f:4c:b0:ce:ec:82:bf:5f:62:e5:95: 3a:91:19:bb:a1:2b:43:c5:3f:7d:1a:d3:c5:ce:06:f2: 86:6a:e1:ac:c0:aa:cf:59:3f:0b:e9:a2:5f:e7:a5:d2: 2c:cc:27:d3:ef:dc:87:e0:fb:ed:6a:a9:12:8d:1d:cd: 4b:bc:15:26:19:c9:ff:09:ea:ff:35:5f:0a:41:8a:15: b6:b0:89:0b:b3:01:bb:f3:ab:a6:dd:9e:75:99:7d:40: 19:09:ea:13:54:88:ce:6d:35:e5:7c:1f:34:d6:c3:e7: a3:c0:d1:01:f1:a1:c1:3f:b9:2a:88:c6:80:bc:0f:8c Fingerprint (SHA-256): C4:FF:C1:66:0C:E8:24:9C:62:87:7B:DE:D1:69:3B:5D:57:B5:C6:18:E8:BF:A5:9C:A4:2E:1C:0C:F6:9C:18:1B Fingerprint (SHA1): 10:D1:C3:07:E7:96:15:66:4F:D9:49:F5:99:AA:DD:2B:D0:81:74:80 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12009: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125904 (0x1e67e750) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 13:06:03 2017 Not After : Tue May 10 13:06:03 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:18:48:cd:71:38:18:22:02:66:4f:86:a6:02:62:86: 28:a1:d8:9e:38:69:6a:bc:14:79:28:ba:b4:67:8b:d6: 79:8f:a1:1c:4c:be:79:40:1d:54:30:ed:3f:b9:82:f8: b0:0c:cf:68:7e:63:f3:46:83:1b:07:7e:da:32:70:ce: e3:f4:dd:bc:89:ec:e4:69:27:e1:8d:54:82:bf:b4:66: b8:32:20:46:c0:10:f4:96:5a:27:ef:16:7b:35:92:e1: b0:8b:b0:d7:4c:4e:01:49:f2:c7:61:e5:7c:43:66:e0: 58:3a:bb:e0:db:65:f6:47:8b:75:80:3d:e1:0b:7c:e8: 94:cc:1c:e6:8b:77:0b:60:33:eb:fc:3d:e8:ba:d8:6c: 8e:34:ca:59:23:66:e9:f2:d6:11:03:39:9d:13:a7:f7: 31:56:88:60:ca:34:89:f4:95:df:14:b3:86:74:77:ab: e5:7a:19:6d:b4:64:6b:0d:70:bf:d8:f2:72:e6:f6:c8: 78:d1:da:03:9d:66:e9:47:5b:b2:a5:8e:75:59:cc:7d: dd:42:0c:c3:ac:7f:2f:76:90:c4:ed:b2:5b:78:87:03: 58:83:ee:95:36:4f:e5:af:96:1f:0d:a1:d1:5f:ea:9b: 7c:00:6c:8d:49:72:80:e5:8d:2c:33:a6:dd:01:c7:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:c5:f4:23:d6:ea:f9:48:26:c5:f4:31:b1:1b:e8:59: 4e:51:34:0a:82:fa:3a:c8:f4:2a:70:ff:62:bf:68:43: d6:be:6d:a4:f8:ae:d8:71:3f:87:f5:79:ff:d0:6c:5a: 0c:47:57:8f:ac:c2:f4:19:a0:1f:c6:b3:14:0e:f5:71: c9:73:eb:42:90:a9:8a:96:fc:00:4e:3b:9a:b2:fc:1d: f0:89:29:b1:78:91:88:1a:79:aa:7a:08:fb:7b:5c:4c: 73:52:f6:54:0d:47:44:22:eb:2d:f8:fe:75:b0:e0:44: a1:4d:fc:05:f2:f1:a6:89:93:63:11:54:62:ca:db:12: 48:35:d8:2b:50:6f:4c:b0:ce:ec:82:bf:5f:62:e5:95: 3a:91:19:bb:a1:2b:43:c5:3f:7d:1a:d3:c5:ce:06:f2: 86:6a:e1:ac:c0:aa:cf:59:3f:0b:e9:a2:5f:e7:a5:d2: 2c:cc:27:d3:ef:dc:87:e0:fb:ed:6a:a9:12:8d:1d:cd: 4b:bc:15:26:19:c9:ff:09:ea:ff:35:5f:0a:41:8a:15: b6:b0:89:0b:b3:01:bb:f3:ab:a6:dd:9e:75:99:7d:40: 19:09:ea:13:54:88:ce:6d:35:e5:7c:1f:34:d6:c3:e7: a3:c0:d1:01:f1:a1:c1:3f:b9:2a:88:c6:80:bc:0f:8c Fingerprint (SHA-256): C4:FF:C1:66:0C:E8:24:9C:62:87:7B:DE:D1:69:3B:5D:57:B5:C6:18:E8:BF:A5:9C:A4:2E:1C:0C:F6:9C:18:1B Fingerprint (SHA1): 10:D1:C3:07:E7:96:15:66:4F:D9:49:F5:99:AA:DD:2B:D0:81:74:80 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12010: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12011: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125904 (0x1e67e750) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 13:06:03 2017 Not After : Tue May 10 13:06:03 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:18:48:cd:71:38:18:22:02:66:4f:86:a6:02:62:86: 28:a1:d8:9e:38:69:6a:bc:14:79:28:ba:b4:67:8b:d6: 79:8f:a1:1c:4c:be:79:40:1d:54:30:ed:3f:b9:82:f8: b0:0c:cf:68:7e:63:f3:46:83:1b:07:7e:da:32:70:ce: e3:f4:dd:bc:89:ec:e4:69:27:e1:8d:54:82:bf:b4:66: b8:32:20:46:c0:10:f4:96:5a:27:ef:16:7b:35:92:e1: b0:8b:b0:d7:4c:4e:01:49:f2:c7:61:e5:7c:43:66:e0: 58:3a:bb:e0:db:65:f6:47:8b:75:80:3d:e1:0b:7c:e8: 94:cc:1c:e6:8b:77:0b:60:33:eb:fc:3d:e8:ba:d8:6c: 8e:34:ca:59:23:66:e9:f2:d6:11:03:39:9d:13:a7:f7: 31:56:88:60:ca:34:89:f4:95:df:14:b3:86:74:77:ab: e5:7a:19:6d:b4:64:6b:0d:70:bf:d8:f2:72:e6:f6:c8: 78:d1:da:03:9d:66:e9:47:5b:b2:a5:8e:75:59:cc:7d: dd:42:0c:c3:ac:7f:2f:76:90:c4:ed:b2:5b:78:87:03: 58:83:ee:95:36:4f:e5:af:96:1f:0d:a1:d1:5f:ea:9b: 7c:00:6c:8d:49:72:80:e5:8d:2c:33:a6:dd:01:c7:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:c5:f4:23:d6:ea:f9:48:26:c5:f4:31:b1:1b:e8:59: 4e:51:34:0a:82:fa:3a:c8:f4:2a:70:ff:62:bf:68:43: d6:be:6d:a4:f8:ae:d8:71:3f:87:f5:79:ff:d0:6c:5a: 0c:47:57:8f:ac:c2:f4:19:a0:1f:c6:b3:14:0e:f5:71: c9:73:eb:42:90:a9:8a:96:fc:00:4e:3b:9a:b2:fc:1d: f0:89:29:b1:78:91:88:1a:79:aa:7a:08:fb:7b:5c:4c: 73:52:f6:54:0d:47:44:22:eb:2d:f8:fe:75:b0:e0:44: a1:4d:fc:05:f2:f1:a6:89:93:63:11:54:62:ca:db:12: 48:35:d8:2b:50:6f:4c:b0:ce:ec:82:bf:5f:62:e5:95: 3a:91:19:bb:a1:2b:43:c5:3f:7d:1a:d3:c5:ce:06:f2: 86:6a:e1:ac:c0:aa:cf:59:3f:0b:e9:a2:5f:e7:a5:d2: 2c:cc:27:d3:ef:dc:87:e0:fb:ed:6a:a9:12:8d:1d:cd: 4b:bc:15:26:19:c9:ff:09:ea:ff:35:5f:0a:41:8a:15: b6:b0:89:0b:b3:01:bb:f3:ab:a6:dd:9e:75:99:7d:40: 19:09:ea:13:54:88:ce:6d:35:e5:7c:1f:34:d6:c3:e7: a3:c0:d1:01:f1:a1:c1:3f:b9:2a:88:c6:80:bc:0f:8c Fingerprint (SHA-256): C4:FF:C1:66:0C:E8:24:9C:62:87:7B:DE:D1:69:3B:5D:57:B5:C6:18:E8:BF:A5:9C:A4:2E:1C:0C:F6:9C:18:1B Fingerprint (SHA1): 10:D1:C3:07:E7:96:15:66:4F:D9:49:F5:99:AA:DD:2B:D0:81:74:80 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12012: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12013: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12014: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12015: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125904 (0x1e67e750) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 13:06:03 2017 Not After : Tue May 10 13:06:03 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:18:48:cd:71:38:18:22:02:66:4f:86:a6:02:62:86: 28:a1:d8:9e:38:69:6a:bc:14:79:28:ba:b4:67:8b:d6: 79:8f:a1:1c:4c:be:79:40:1d:54:30:ed:3f:b9:82:f8: b0:0c:cf:68:7e:63:f3:46:83:1b:07:7e:da:32:70:ce: e3:f4:dd:bc:89:ec:e4:69:27:e1:8d:54:82:bf:b4:66: b8:32:20:46:c0:10:f4:96:5a:27:ef:16:7b:35:92:e1: b0:8b:b0:d7:4c:4e:01:49:f2:c7:61:e5:7c:43:66:e0: 58:3a:bb:e0:db:65:f6:47:8b:75:80:3d:e1:0b:7c:e8: 94:cc:1c:e6:8b:77:0b:60:33:eb:fc:3d:e8:ba:d8:6c: 8e:34:ca:59:23:66:e9:f2:d6:11:03:39:9d:13:a7:f7: 31:56:88:60:ca:34:89:f4:95:df:14:b3:86:74:77:ab: e5:7a:19:6d:b4:64:6b:0d:70:bf:d8:f2:72:e6:f6:c8: 78:d1:da:03:9d:66:e9:47:5b:b2:a5:8e:75:59:cc:7d: dd:42:0c:c3:ac:7f:2f:76:90:c4:ed:b2:5b:78:87:03: 58:83:ee:95:36:4f:e5:af:96:1f:0d:a1:d1:5f:ea:9b: 7c:00:6c:8d:49:72:80:e5:8d:2c:33:a6:dd:01:c7:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:c5:f4:23:d6:ea:f9:48:26:c5:f4:31:b1:1b:e8:59: 4e:51:34:0a:82:fa:3a:c8:f4:2a:70:ff:62:bf:68:43: d6:be:6d:a4:f8:ae:d8:71:3f:87:f5:79:ff:d0:6c:5a: 0c:47:57:8f:ac:c2:f4:19:a0:1f:c6:b3:14:0e:f5:71: c9:73:eb:42:90:a9:8a:96:fc:00:4e:3b:9a:b2:fc:1d: f0:89:29:b1:78:91:88:1a:79:aa:7a:08:fb:7b:5c:4c: 73:52:f6:54:0d:47:44:22:eb:2d:f8:fe:75:b0:e0:44: a1:4d:fc:05:f2:f1:a6:89:93:63:11:54:62:ca:db:12: 48:35:d8:2b:50:6f:4c:b0:ce:ec:82:bf:5f:62:e5:95: 3a:91:19:bb:a1:2b:43:c5:3f:7d:1a:d3:c5:ce:06:f2: 86:6a:e1:ac:c0:aa:cf:59:3f:0b:e9:a2:5f:e7:a5:d2: 2c:cc:27:d3:ef:dc:87:e0:fb:ed:6a:a9:12:8d:1d:cd: 4b:bc:15:26:19:c9:ff:09:ea:ff:35:5f:0a:41:8a:15: b6:b0:89:0b:b3:01:bb:f3:ab:a6:dd:9e:75:99:7d:40: 19:09:ea:13:54:88:ce:6d:35:e5:7c:1f:34:d6:c3:e7: a3:c0:d1:01:f1:a1:c1:3f:b9:2a:88:c6:80:bc:0f:8c Fingerprint (SHA-256): C4:FF:C1:66:0C:E8:24:9C:62:87:7B:DE:D1:69:3B:5D:57:B5:C6:18:E8:BF:A5:9C:A4:2E:1C:0C:F6:9C:18:1B Fingerprint (SHA1): 10:D1:C3:07:E7:96:15:66:4F:D9:49:F5:99:AA:DD:2B:D0:81:74:80 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12016: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125904 (0x1e67e750) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 13:06:03 2017 Not After : Tue May 10 13:06:03 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:18:48:cd:71:38:18:22:02:66:4f:86:a6:02:62:86: 28:a1:d8:9e:38:69:6a:bc:14:79:28:ba:b4:67:8b:d6: 79:8f:a1:1c:4c:be:79:40:1d:54:30:ed:3f:b9:82:f8: b0:0c:cf:68:7e:63:f3:46:83:1b:07:7e:da:32:70:ce: e3:f4:dd:bc:89:ec:e4:69:27:e1:8d:54:82:bf:b4:66: b8:32:20:46:c0:10:f4:96:5a:27:ef:16:7b:35:92:e1: b0:8b:b0:d7:4c:4e:01:49:f2:c7:61:e5:7c:43:66:e0: 58:3a:bb:e0:db:65:f6:47:8b:75:80:3d:e1:0b:7c:e8: 94:cc:1c:e6:8b:77:0b:60:33:eb:fc:3d:e8:ba:d8:6c: 8e:34:ca:59:23:66:e9:f2:d6:11:03:39:9d:13:a7:f7: 31:56:88:60:ca:34:89:f4:95:df:14:b3:86:74:77:ab: e5:7a:19:6d:b4:64:6b:0d:70:bf:d8:f2:72:e6:f6:c8: 78:d1:da:03:9d:66:e9:47:5b:b2:a5:8e:75:59:cc:7d: dd:42:0c:c3:ac:7f:2f:76:90:c4:ed:b2:5b:78:87:03: 58:83:ee:95:36:4f:e5:af:96:1f:0d:a1:d1:5f:ea:9b: 7c:00:6c:8d:49:72:80:e5:8d:2c:33:a6:dd:01:c7:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:c5:f4:23:d6:ea:f9:48:26:c5:f4:31:b1:1b:e8:59: 4e:51:34:0a:82:fa:3a:c8:f4:2a:70:ff:62:bf:68:43: d6:be:6d:a4:f8:ae:d8:71:3f:87:f5:79:ff:d0:6c:5a: 0c:47:57:8f:ac:c2:f4:19:a0:1f:c6:b3:14:0e:f5:71: c9:73:eb:42:90:a9:8a:96:fc:00:4e:3b:9a:b2:fc:1d: f0:89:29:b1:78:91:88:1a:79:aa:7a:08:fb:7b:5c:4c: 73:52:f6:54:0d:47:44:22:eb:2d:f8:fe:75:b0:e0:44: a1:4d:fc:05:f2:f1:a6:89:93:63:11:54:62:ca:db:12: 48:35:d8:2b:50:6f:4c:b0:ce:ec:82:bf:5f:62:e5:95: 3a:91:19:bb:a1:2b:43:c5:3f:7d:1a:d3:c5:ce:06:f2: 86:6a:e1:ac:c0:aa:cf:59:3f:0b:e9:a2:5f:e7:a5:d2: 2c:cc:27:d3:ef:dc:87:e0:fb:ed:6a:a9:12:8d:1d:cd: 4b:bc:15:26:19:c9:ff:09:ea:ff:35:5f:0a:41:8a:15: b6:b0:89:0b:b3:01:bb:f3:ab:a6:dd:9e:75:99:7d:40: 19:09:ea:13:54:88:ce:6d:35:e5:7c:1f:34:d6:c3:e7: a3:c0:d1:01:f1:a1:c1:3f:b9:2a:88:c6:80:bc:0f:8c Fingerprint (SHA-256): C4:FF:C1:66:0C:E8:24:9C:62:87:7B:DE:D1:69:3B:5D:57:B5:C6:18:E8:BF:A5:9C:A4:2E:1C:0C:F6:9C:18:1B Fingerprint (SHA1): 10:D1:C3:07:E7:96:15:66:4F:D9:49:F5:99:AA:DD:2B:D0:81:74:80 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #12017: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125904 (0x1e67e750) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 13:06:03 2017 Not After : Tue May 10 13:06:03 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:18:48:cd:71:38:18:22:02:66:4f:86:a6:02:62:86: 28:a1:d8:9e:38:69:6a:bc:14:79:28:ba:b4:67:8b:d6: 79:8f:a1:1c:4c:be:79:40:1d:54:30:ed:3f:b9:82:f8: b0:0c:cf:68:7e:63:f3:46:83:1b:07:7e:da:32:70:ce: e3:f4:dd:bc:89:ec:e4:69:27:e1:8d:54:82:bf:b4:66: b8:32:20:46:c0:10:f4:96:5a:27:ef:16:7b:35:92:e1: b0:8b:b0:d7:4c:4e:01:49:f2:c7:61:e5:7c:43:66:e0: 58:3a:bb:e0:db:65:f6:47:8b:75:80:3d:e1:0b:7c:e8: 94:cc:1c:e6:8b:77:0b:60:33:eb:fc:3d:e8:ba:d8:6c: 8e:34:ca:59:23:66:e9:f2:d6:11:03:39:9d:13:a7:f7: 31:56:88:60:ca:34:89:f4:95:df:14:b3:86:74:77:ab: e5:7a:19:6d:b4:64:6b:0d:70:bf:d8:f2:72:e6:f6:c8: 78:d1:da:03:9d:66:e9:47:5b:b2:a5:8e:75:59:cc:7d: dd:42:0c:c3:ac:7f:2f:76:90:c4:ed:b2:5b:78:87:03: 58:83:ee:95:36:4f:e5:af:96:1f:0d:a1:d1:5f:ea:9b: 7c:00:6c:8d:49:72:80:e5:8d:2c:33:a6:dd:01:c7:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:c5:f4:23:d6:ea:f9:48:26:c5:f4:31:b1:1b:e8:59: 4e:51:34:0a:82:fa:3a:c8:f4:2a:70:ff:62:bf:68:43: d6:be:6d:a4:f8:ae:d8:71:3f:87:f5:79:ff:d0:6c:5a: 0c:47:57:8f:ac:c2:f4:19:a0:1f:c6:b3:14:0e:f5:71: c9:73:eb:42:90:a9:8a:96:fc:00:4e:3b:9a:b2:fc:1d: f0:89:29:b1:78:91:88:1a:79:aa:7a:08:fb:7b:5c:4c: 73:52:f6:54:0d:47:44:22:eb:2d:f8:fe:75:b0:e0:44: a1:4d:fc:05:f2:f1:a6:89:93:63:11:54:62:ca:db:12: 48:35:d8:2b:50:6f:4c:b0:ce:ec:82:bf:5f:62:e5:95: 3a:91:19:bb:a1:2b:43:c5:3f:7d:1a:d3:c5:ce:06:f2: 86:6a:e1:ac:c0:aa:cf:59:3f:0b:e9:a2:5f:e7:a5:d2: 2c:cc:27:d3:ef:dc:87:e0:fb:ed:6a:a9:12:8d:1d:cd: 4b:bc:15:26:19:c9:ff:09:ea:ff:35:5f:0a:41:8a:15: b6:b0:89:0b:b3:01:bb:f3:ab:a6:dd:9e:75:99:7d:40: 19:09:ea:13:54:88:ce:6d:35:e5:7c:1f:34:d6:c3:e7: a3:c0:d1:01:f1:a1:c1:3f:b9:2a:88:c6:80:bc:0f:8c Fingerprint (SHA-256): C4:FF:C1:66:0C:E8:24:9C:62:87:7B:DE:D1:69:3B:5D:57:B5:C6:18:E8:BF:A5:9C:A4:2E:1C:0C:F6:9C:18:1B Fingerprint (SHA1): 10:D1:C3:07:E7:96:15:66:4F:D9:49:F5:99:AA:DD:2B:D0:81:74:80 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #12018: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125904 (0x1e67e750) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 13:06:03 2017 Not After : Tue May 10 13:06:03 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:18:48:cd:71:38:18:22:02:66:4f:86:a6:02:62:86: 28:a1:d8:9e:38:69:6a:bc:14:79:28:ba:b4:67:8b:d6: 79:8f:a1:1c:4c:be:79:40:1d:54:30:ed:3f:b9:82:f8: b0:0c:cf:68:7e:63:f3:46:83:1b:07:7e:da:32:70:ce: e3:f4:dd:bc:89:ec:e4:69:27:e1:8d:54:82:bf:b4:66: b8:32:20:46:c0:10:f4:96:5a:27:ef:16:7b:35:92:e1: b0:8b:b0:d7:4c:4e:01:49:f2:c7:61:e5:7c:43:66:e0: 58:3a:bb:e0:db:65:f6:47:8b:75:80:3d:e1:0b:7c:e8: 94:cc:1c:e6:8b:77:0b:60:33:eb:fc:3d:e8:ba:d8:6c: 8e:34:ca:59:23:66:e9:f2:d6:11:03:39:9d:13:a7:f7: 31:56:88:60:ca:34:89:f4:95:df:14:b3:86:74:77:ab: e5:7a:19:6d:b4:64:6b:0d:70:bf:d8:f2:72:e6:f6:c8: 78:d1:da:03:9d:66:e9:47:5b:b2:a5:8e:75:59:cc:7d: dd:42:0c:c3:ac:7f:2f:76:90:c4:ed:b2:5b:78:87:03: 58:83:ee:95:36:4f:e5:af:96:1f:0d:a1:d1:5f:ea:9b: 7c:00:6c:8d:49:72:80:e5:8d:2c:33:a6:dd:01:c7:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:c5:f4:23:d6:ea:f9:48:26:c5:f4:31:b1:1b:e8:59: 4e:51:34:0a:82:fa:3a:c8:f4:2a:70:ff:62:bf:68:43: d6:be:6d:a4:f8:ae:d8:71:3f:87:f5:79:ff:d0:6c:5a: 0c:47:57:8f:ac:c2:f4:19:a0:1f:c6:b3:14:0e:f5:71: c9:73:eb:42:90:a9:8a:96:fc:00:4e:3b:9a:b2:fc:1d: f0:89:29:b1:78:91:88:1a:79:aa:7a:08:fb:7b:5c:4c: 73:52:f6:54:0d:47:44:22:eb:2d:f8:fe:75:b0:e0:44: a1:4d:fc:05:f2:f1:a6:89:93:63:11:54:62:ca:db:12: 48:35:d8:2b:50:6f:4c:b0:ce:ec:82:bf:5f:62:e5:95: 3a:91:19:bb:a1:2b:43:c5:3f:7d:1a:d3:c5:ce:06:f2: 86:6a:e1:ac:c0:aa:cf:59:3f:0b:e9:a2:5f:e7:a5:d2: 2c:cc:27:d3:ef:dc:87:e0:fb:ed:6a:a9:12:8d:1d:cd: 4b:bc:15:26:19:c9:ff:09:ea:ff:35:5f:0a:41:8a:15: b6:b0:89:0b:b3:01:bb:f3:ab:a6:dd:9e:75:99:7d:40: 19:09:ea:13:54:88:ce:6d:35:e5:7c:1f:34:d6:c3:e7: a3:c0:d1:01:f1:a1:c1:3f:b9:2a:88:c6:80:bc:0f:8c Fingerprint (SHA-256): C4:FF:C1:66:0C:E8:24:9C:62:87:7B:DE:D1:69:3B:5D:57:B5:C6:18:E8:BF:A5:9C:A4:2E:1C:0C:F6:9C:18:1B Fingerprint (SHA1): 10:D1:C3:07:E7:96:15:66:4F:D9:49:F5:99:AA:DD:2B:D0:81:74:80 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #12019: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125904 (0x1e67e750) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 13:06:03 2017 Not After : Tue May 10 13:06:03 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:18:48:cd:71:38:18:22:02:66:4f:86:a6:02:62:86: 28:a1:d8:9e:38:69:6a:bc:14:79:28:ba:b4:67:8b:d6: 79:8f:a1:1c:4c:be:79:40:1d:54:30:ed:3f:b9:82:f8: b0:0c:cf:68:7e:63:f3:46:83:1b:07:7e:da:32:70:ce: e3:f4:dd:bc:89:ec:e4:69:27:e1:8d:54:82:bf:b4:66: b8:32:20:46:c0:10:f4:96:5a:27:ef:16:7b:35:92:e1: b0:8b:b0:d7:4c:4e:01:49:f2:c7:61:e5:7c:43:66:e0: 58:3a:bb:e0:db:65:f6:47:8b:75:80:3d:e1:0b:7c:e8: 94:cc:1c:e6:8b:77:0b:60:33:eb:fc:3d:e8:ba:d8:6c: 8e:34:ca:59:23:66:e9:f2:d6:11:03:39:9d:13:a7:f7: 31:56:88:60:ca:34:89:f4:95:df:14:b3:86:74:77:ab: e5:7a:19:6d:b4:64:6b:0d:70:bf:d8:f2:72:e6:f6:c8: 78:d1:da:03:9d:66:e9:47:5b:b2:a5:8e:75:59:cc:7d: dd:42:0c:c3:ac:7f:2f:76:90:c4:ed:b2:5b:78:87:03: 58:83:ee:95:36:4f:e5:af:96:1f:0d:a1:d1:5f:ea:9b: 7c:00:6c:8d:49:72:80:e5:8d:2c:33:a6:dd:01:c7:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:c5:f4:23:d6:ea:f9:48:26:c5:f4:31:b1:1b:e8:59: 4e:51:34:0a:82:fa:3a:c8:f4:2a:70:ff:62:bf:68:43: d6:be:6d:a4:f8:ae:d8:71:3f:87:f5:79:ff:d0:6c:5a: 0c:47:57:8f:ac:c2:f4:19:a0:1f:c6:b3:14:0e:f5:71: c9:73:eb:42:90:a9:8a:96:fc:00:4e:3b:9a:b2:fc:1d: f0:89:29:b1:78:91:88:1a:79:aa:7a:08:fb:7b:5c:4c: 73:52:f6:54:0d:47:44:22:eb:2d:f8:fe:75:b0:e0:44: a1:4d:fc:05:f2:f1:a6:89:93:63:11:54:62:ca:db:12: 48:35:d8:2b:50:6f:4c:b0:ce:ec:82:bf:5f:62:e5:95: 3a:91:19:bb:a1:2b:43:c5:3f:7d:1a:d3:c5:ce:06:f2: 86:6a:e1:ac:c0:aa:cf:59:3f:0b:e9:a2:5f:e7:a5:d2: 2c:cc:27:d3:ef:dc:87:e0:fb:ed:6a:a9:12:8d:1d:cd: 4b:bc:15:26:19:c9:ff:09:ea:ff:35:5f:0a:41:8a:15: b6:b0:89:0b:b3:01:bb:f3:ab:a6:dd:9e:75:99:7d:40: 19:09:ea:13:54:88:ce:6d:35:e5:7c:1f:34:d6:c3:e7: a3:c0:d1:01:f1:a1:c1:3f:b9:2a:88:c6:80:bc:0f:8c Fingerprint (SHA-256): C4:FF:C1:66:0C:E8:24:9C:62:87:7B:DE:D1:69:3B:5D:57:B5:C6:18:E8:BF:A5:9C:A4:2E:1C:0C:F6:9C:18:1B Fingerprint (SHA1): 10:D1:C3:07:E7:96:15:66:4F:D9:49:F5:99:AA:DD:2B:D0:81:74:80 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #12020: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125904 (0x1e67e750) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 13:06:03 2017 Not After : Tue May 10 13:06:03 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:18:48:cd:71:38:18:22:02:66:4f:86:a6:02:62:86: 28:a1:d8:9e:38:69:6a:bc:14:79:28:ba:b4:67:8b:d6: 79:8f:a1:1c:4c:be:79:40:1d:54:30:ed:3f:b9:82:f8: b0:0c:cf:68:7e:63:f3:46:83:1b:07:7e:da:32:70:ce: e3:f4:dd:bc:89:ec:e4:69:27:e1:8d:54:82:bf:b4:66: b8:32:20:46:c0:10:f4:96:5a:27:ef:16:7b:35:92:e1: b0:8b:b0:d7:4c:4e:01:49:f2:c7:61:e5:7c:43:66:e0: 58:3a:bb:e0:db:65:f6:47:8b:75:80:3d:e1:0b:7c:e8: 94:cc:1c:e6:8b:77:0b:60:33:eb:fc:3d:e8:ba:d8:6c: 8e:34:ca:59:23:66:e9:f2:d6:11:03:39:9d:13:a7:f7: 31:56:88:60:ca:34:89:f4:95:df:14:b3:86:74:77:ab: e5:7a:19:6d:b4:64:6b:0d:70:bf:d8:f2:72:e6:f6:c8: 78:d1:da:03:9d:66:e9:47:5b:b2:a5:8e:75:59:cc:7d: dd:42:0c:c3:ac:7f:2f:76:90:c4:ed:b2:5b:78:87:03: 58:83:ee:95:36:4f:e5:af:96:1f:0d:a1:d1:5f:ea:9b: 7c:00:6c:8d:49:72:80:e5:8d:2c:33:a6:dd:01:c7:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:c5:f4:23:d6:ea:f9:48:26:c5:f4:31:b1:1b:e8:59: 4e:51:34:0a:82:fa:3a:c8:f4:2a:70:ff:62:bf:68:43: d6:be:6d:a4:f8:ae:d8:71:3f:87:f5:79:ff:d0:6c:5a: 0c:47:57:8f:ac:c2:f4:19:a0:1f:c6:b3:14:0e:f5:71: c9:73:eb:42:90:a9:8a:96:fc:00:4e:3b:9a:b2:fc:1d: f0:89:29:b1:78:91:88:1a:79:aa:7a:08:fb:7b:5c:4c: 73:52:f6:54:0d:47:44:22:eb:2d:f8:fe:75:b0:e0:44: a1:4d:fc:05:f2:f1:a6:89:93:63:11:54:62:ca:db:12: 48:35:d8:2b:50:6f:4c:b0:ce:ec:82:bf:5f:62:e5:95: 3a:91:19:bb:a1:2b:43:c5:3f:7d:1a:d3:c5:ce:06:f2: 86:6a:e1:ac:c0:aa:cf:59:3f:0b:e9:a2:5f:e7:a5:d2: 2c:cc:27:d3:ef:dc:87:e0:fb:ed:6a:a9:12:8d:1d:cd: 4b:bc:15:26:19:c9:ff:09:ea:ff:35:5f:0a:41:8a:15: b6:b0:89:0b:b3:01:bb:f3:ab:a6:dd:9e:75:99:7d:40: 19:09:ea:13:54:88:ce:6d:35:e5:7c:1f:34:d6:c3:e7: a3:c0:d1:01:f1:a1:c1:3f:b9:2a:88:c6:80:bc:0f:8c Fingerprint (SHA-256): C4:FF:C1:66:0C:E8:24:9C:62:87:7B:DE:D1:69:3B:5D:57:B5:C6:18:E8:BF:A5:9C:A4:2E:1C:0C:F6:9C:18:1B Fingerprint (SHA1): 10:D1:C3:07:E7:96:15:66:4F:D9:49:F5:99:AA:DD:2B:D0:81:74:80 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #12021: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12022: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #12023: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125934 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12024: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #12025: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #12026: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12027: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 510125935 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12028: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12029: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #12030: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12031: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 510125936 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12032: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12033: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #12034: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12035: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 510125937 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12036: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12037: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #12038: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12039: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 510125938 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12040: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12041: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #12042: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12043: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 510125939 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12044: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12045: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #12046: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12047: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 510125940 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12048: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12049: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #12050: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125934 (0x1e67e76e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:07:15 2017 Not After : Tue May 10 13:07:15 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:62:ad:28:da:d9:6d:9c:ff:cb:0a:73:0b:49:ca:91: 69:9d:2a:18:6b:99:75:ac:e3:f5:60:5c:23:17:1d:a2: ed:08:56:f0:6d:86:88:97:ac:55:82:27:29:16:69:1c: 00:8a:ad:cb:36:96:3e:e1:55:c4:2c:43:42:32:7d:c3: da:da:67:07:20:2b:17:a9:57:1d:5b:22:38:ac:5a:84: 5c:4d:84:b3:bf:11:60:c6:bd:df:03:cf:49:b0:8d:0e: 4c:24:c6:7c:4c:60:dc:c6:30:20:7d:99:5a:d6:67:86: 89:72:c4:93:24:d3:14:f7:2b:81:69:f4:e6:23:2c:1a: 9f:08:98:6c:33:4b:55:44:13:51:f1:c2:0c:c5:9e:97: 86:f5:91:c4:6b:ad:ca:84:b1:71:53:ef:d0:02:da:2e: ea:62:ee:07:f0:ba:d1:1f:d2:fc:a9:0e:b1:77:98:35: 02:76:87:0c:5e:27:03:48:05:a5:43:11:38:1a:72:00: f9:24:92:91:62:90:ae:f1:ee:1a:69:0d:fd:fc:15:17: 7f:a9:9c:c0:f1:9a:8e:c5:07:8e:d4:3a:c3:4f:29:f2: 76:6e:07:fe:dd:2d:8a:81:dc:a0:bd:9f:e9:35:e5:89: c3:8d:3d:ac:d5:dc:50:71:f3:23:b6:3e:bc:1d:9a:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1e:8b:7c:87:d0:2a:df:be:f0:b8:49:d1:04:e9:53:b2: 5a:50:f6:ae:a3:66:1c:44:9c:4a:ca:16:9f:cc:db:88: 82:75:16:01:62:b4:1e:69:68:9d:3f:70:48:02:c4:17: 1b:96:22:1c:03:15:eb:60:9f:8a:50:8a:b2:0a:80:78: 3d:ad:75:85:bf:5e:5d:18:ad:5c:36:16:92:2f:18:9b: 6e:a5:19:ab:22:89:de:9a:e0:e3:4b:b3:3c:63:09:39: f3:62:b9:8c:df:00:e7:07:dc:0d:bd:0b:52:f1:5b:d5: 6b:93:86:24:bc:fb:d9:1b:3f:3b:8f:16:f8:ab:96:df: 4b:05:38:8e:9b:7c:dd:1c:02:f0:7a:71:bf:7f:cc:5b: 80:03:4c:10:1c:15:6b:e4:63:da:20:33:3a:ec:fe:f2: 2d:6b:93:d4:da:20:9f:3d:39:8c:24:98:67:0e:7f:2b: 34:4f:f4:dc:69:27:f6:72:eb:47:75:64:7e:c8:87:d2: 3a:08:22:94:5e:5d:49:f0:b3:f2:83:66:a9:86:34:c9: 10:4e:80:0c:ec:89:db:52:84:1f:20:7b:e5:e0:68:55: 43:ac:54:4c:27:84:ad:16:98:24:6a:ed:6a:32:3e:b7: 72:42:ce:41:4d:4d:81:70:f5:ac:45:40:ba:3b:03:4c Fingerprint (SHA-256): 0F:2B:32:75:FB:ED:B4:69:22:89:30:6D:3D:0A:81:9B:DF:A5:44:47:D4:14:E4:BA:D5:7E:00:1E:83:2C:F3:B1 Fingerprint (SHA1): C0:B8:98:6B:0B:8D:4C:AF:57:A2:1A:69:E2:8F:5B:1E:AE:31:37:E9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #12051: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12052: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12053: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #12054: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125934 (0x1e67e76e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:07:15 2017 Not After : Tue May 10 13:07:15 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:62:ad:28:da:d9:6d:9c:ff:cb:0a:73:0b:49:ca:91: 69:9d:2a:18:6b:99:75:ac:e3:f5:60:5c:23:17:1d:a2: ed:08:56:f0:6d:86:88:97:ac:55:82:27:29:16:69:1c: 00:8a:ad:cb:36:96:3e:e1:55:c4:2c:43:42:32:7d:c3: da:da:67:07:20:2b:17:a9:57:1d:5b:22:38:ac:5a:84: 5c:4d:84:b3:bf:11:60:c6:bd:df:03:cf:49:b0:8d:0e: 4c:24:c6:7c:4c:60:dc:c6:30:20:7d:99:5a:d6:67:86: 89:72:c4:93:24:d3:14:f7:2b:81:69:f4:e6:23:2c:1a: 9f:08:98:6c:33:4b:55:44:13:51:f1:c2:0c:c5:9e:97: 86:f5:91:c4:6b:ad:ca:84:b1:71:53:ef:d0:02:da:2e: ea:62:ee:07:f0:ba:d1:1f:d2:fc:a9:0e:b1:77:98:35: 02:76:87:0c:5e:27:03:48:05:a5:43:11:38:1a:72:00: f9:24:92:91:62:90:ae:f1:ee:1a:69:0d:fd:fc:15:17: 7f:a9:9c:c0:f1:9a:8e:c5:07:8e:d4:3a:c3:4f:29:f2: 76:6e:07:fe:dd:2d:8a:81:dc:a0:bd:9f:e9:35:e5:89: c3:8d:3d:ac:d5:dc:50:71:f3:23:b6:3e:bc:1d:9a:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1e:8b:7c:87:d0:2a:df:be:f0:b8:49:d1:04:e9:53:b2: 5a:50:f6:ae:a3:66:1c:44:9c:4a:ca:16:9f:cc:db:88: 82:75:16:01:62:b4:1e:69:68:9d:3f:70:48:02:c4:17: 1b:96:22:1c:03:15:eb:60:9f:8a:50:8a:b2:0a:80:78: 3d:ad:75:85:bf:5e:5d:18:ad:5c:36:16:92:2f:18:9b: 6e:a5:19:ab:22:89:de:9a:e0:e3:4b:b3:3c:63:09:39: f3:62:b9:8c:df:00:e7:07:dc:0d:bd:0b:52:f1:5b:d5: 6b:93:86:24:bc:fb:d9:1b:3f:3b:8f:16:f8:ab:96:df: 4b:05:38:8e:9b:7c:dd:1c:02:f0:7a:71:bf:7f:cc:5b: 80:03:4c:10:1c:15:6b:e4:63:da:20:33:3a:ec:fe:f2: 2d:6b:93:d4:da:20:9f:3d:39:8c:24:98:67:0e:7f:2b: 34:4f:f4:dc:69:27:f6:72:eb:47:75:64:7e:c8:87:d2: 3a:08:22:94:5e:5d:49:f0:b3:f2:83:66:a9:86:34:c9: 10:4e:80:0c:ec:89:db:52:84:1f:20:7b:e5:e0:68:55: 43:ac:54:4c:27:84:ad:16:98:24:6a:ed:6a:32:3e:b7: 72:42:ce:41:4d:4d:81:70:f5:ac:45:40:ba:3b:03:4c Fingerprint (SHA-256): 0F:2B:32:75:FB:ED:B4:69:22:89:30:6D:3D:0A:81:9B:DF:A5:44:47:D4:14:E4:BA:D5:7E:00:1E:83:2C:F3:B1 Fingerprint (SHA1): C0:B8:98:6B:0B:8D:4C:AF:57:A2:1A:69:E2:8F:5B:1E:AE:31:37:E9 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #12055: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12056: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12057: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #12058: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125941 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12059: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #12060: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #12061: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12062: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510125942 --extCP --extPM < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #12063: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12064: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #12065: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12066: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510125943 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12067: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12068: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #12069: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12070: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 510125944 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12071: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12072: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #12073: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #12074: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #12075: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #12076: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125941 (0x1e67e775) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:07:34 2017 Not After : Tue May 10 13:07:34 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:02:ff:3c:d3:6a:4a:3f:d5:71:20:3c:4a:d9:3c:67: 35:b6:ca:8d:f0:7c:85:ca:27:23:bb:52:04:84:4c:bb: 9b:97:97:04:53:55:d8:fb:5e:4e:6d:01:6b:da:34:f1: 10:3f:52:47:30:df:27:67:aa:b8:fd:7e:32:d4:5d:14: 1c:65:27:36:38:c9:b5:fe:06:01:9d:3e:6a:7c:6a:d0: d6:fb:6f:ab:49:8e:1e:29:41:6e:c9:44:7c:eb:62:0b: 95:bb:da:88:39:8d:7e:f3:62:7e:52:ac:cd:85:cc:ee: df:d9:45:67:6f:c9:64:60:ee:57:3f:e3:cf:88:c5:e7: 18:67:91:1e:f8:f6:c7:59:d0:fc:c5:71:5e:6b:f6:a2: b6:2f:dd:d0:e7:a3:48:bc:6f:20:31:70:8a:15:ab:9a: ae:f7:03:05:bf:3e:a6:ac:c2:0f:ce:b3:7d:a0:8f:b8: 23:21:a4:c7:c4:09:62:87:7c:f6:0e:08:73:1d:54:75: 70:13:8c:ce:0b:50:a9:46:f4:40:fa:64:85:f9:2f:8f: 96:94:d2:ed:29:92:41:89:59:67:c3:62:9f:50:ee:06: 81:ab:1c:d7:e7:d9:ed:88:f6:77:09:00:d8:c8:20:55: cf:38:85:dd:19:d5:aa:ce:83:78:39:c9:89:06:7a:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:88:9f:9f:e0:45:02:c5:48:d6:ea:52:24:0c:0e:7e: 0a:a1:91:9f:7f:2d:78:4a:c3:21:db:69:01:e6:cc:8c: 14:e4:c1:04:4e:86:a6:a9:76:9e:b3:65:39:3e:29:7e: 46:e4:5c:ee:07:13:e2:cb:a9:cb:eb:44:53:64:2c:b9: dc:6d:2d:1d:de:26:61:65:da:d4:90:58:2f:7d:d6:90: cf:2b:6f:22:5e:8f:7c:75:89:6d:6f:7d:f0:58:99:93: 37:2a:5c:b7:f2:58:59:ee:d7:8a:44:eb:60:60:8f:70: 91:d8:88:46:5d:4a:2a:45:e0:6e:18:ba:aa:05:71:e6: 55:98:89:7f:2e:18:45:58:f6:5a:cb:c0:0f:5e:30:d5: a1:2a:40:ea:cb:68:2a:32:bf:ae:32:b0:da:db:ae:86: fa:e6:12:f2:fd:1c:74:fb:83:61:8a:21:b4:f7:c2:26: 5a:fd:f2:57:a8:04:d0:7e:f8:03:92:f0:c2:dd:8e:c9: ba:17:08:36:b8:e5:51:ac:a0:7f:a4:66:1a:9a:b1:88: 72:23:55:1f:94:a4:5f:bb:ff:ca:2a:05:6b:5e:2f:fb: f8:b5:68:0d:c3:b1:d7:c5:97:a6:b5:0a:7f:43:a8:a6: 94:ad:fc:b2:6b:ac:ce:f9:d9:79:1c:d0:fa:e0:99:0d Fingerprint (SHA-256): 94:23:ED:B3:00:74:B3:06:BE:78:11:A3:B6:96:35:FC:93:7E:7B:34:D7:AE:9F:15:8C:18:AE:A3:E8:47:45:F4 Fingerprint (SHA1): 78:BA:C8:3F:C5:38:A8:28:B9:47:5A:98:58:26:2C:8E:4E:C1:89:7C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12077: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12078: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12079: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125942 (0x1e67e776) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:07:35 2017 Not After : Tue May 10 13:07:35 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:5c:b5:64:90:63:e5:ab:71:04:62:7a:30:04:ba:7c: 4b:84:5e:97:4a:38:3a:bb:f4:fc:3a:08:68:d9:f9:26: 59:1c:88:00:4e:ff:14:65:8c:26:1b:8a:19:de:7a:5f: 99:43:96:27:2c:0c:34:48:9c:7d:3b:57:1e:5e:70:25: 9e:9d:3b:f4:91:d3:c0:73:73:e0:6b:88:88:c3:85:7e: c4:17:4b:26:82:91:67:03:8e:c2:68:2d:75:4d:90:7f: f6:b2:fd:ec:cf:ed:75:c6:ce:f2:de:a2:53:2f:9b:16: e9:a6:4a:6a:39:95:07:d7:54:6b:20:d6:db:e2:7e:96: d9:b7:b9:47:63:3a:9b:b3:a4:07:d8:df:46:90:56:2a: 91:c7:4c:43:f5:f0:6b:5d:f3:d7:74:1a:e9:20:63:a6: 26:de:c7:bf:39:3e:95:9f:78:da:15:3a:f2:84:b5:d2: ff:48:bc:7c:69:1a:1d:d5:28:c3:3f:b1:03:2f:3c:fb: 8d:ce:10:31:fa:ab:3d:0f:b9:13:2e:18:dd:6d:a0:bf: ea:9b:7f:c1:f8:69:2c:55:e9:fa:42:cb:5b:71:1d:c9: 66:f4:bc:a2:05:93:78:46:3f:e9:f4:78:2b:82:c4:79: 6f:34:2f:b3:66:f5:aa:b1:d3:f3:79:52:59:e5:ce:93 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:42:dc:07:c9:aa:a3:a8:98:4e:da:ca:c6:1e:94:a4: bb:c8:5f:10:b5:ae:65:8a:a1:fd:9e:f4:61:2f:95:d5: b1:a3:d7:a1:55:b9:07:ce:e9:bb:31:94:43:f8:21:99: 49:2f:3b:5e:5e:42:90:ec:70:6d:82:df:00:26:bb:29: 40:f2:aa:81:4c:34:55:53:ee:21:5e:e4:ce:45:a6:6c: 6e:d1:40:1e:10:d0:29:c5:69:96:18:ad:09:c1:8e:83: 56:01:11:bc:42:7c:22:34:7d:c0:ad:bd:2d:05:fb:21: 92:c8:e5:a9:7f:8a:ce:bc:70:fb:b7:3a:11:2a:a0:04: 05:e8:9b:7e:15:8b:54:64:d7:db:ae:d4:ce:8a:96:ff: ec:93:5d:50:de:9f:36:47:ca:32:0a:fa:62:48:af:7c: 9c:9d:4a:be:d8:ba:0b:80:52:63:74:47:bf:38:58:ff: 72:37:20:92:6e:d1:b3:ea:0c:c3:fb:32:35:f8:5c:db: 38:ef:04:ae:39:37:1e:1b:fd:40:1b:1a:6c:d1:3e:1e: eb:62:9d:fe:7e:ec:ff:d6:be:b8:00:f8:78:ec:ad:9e: f0:f3:f5:90:d0:0d:94:86:c9:03:98:ee:aa:4a:db:1e: 21:3e:f7:c4:2a:19:c0:e8:92:3f:5e:02:4e:34:fe:4a Fingerprint (SHA-256): 78:B5:A8:92:50:6B:0A:8B:CB:72:8D:3A:9B:66:66:20:E5:D3:19:1C:39:37:7D:41:1C:02:35:B6:7E:83:8D:5B Fingerprint (SHA1): B9:1D:BE:07:8E:1F:38:38:80:1E:D3:33:BD:6B:68:71:16:7A:07:19 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #12080: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12081: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125943 (0x1e67e777) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 13:07:37 2017 Not After : Tue May 10 13:07:37 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:4c:d2:ac:53:b7:ab:ff:35:a4:9f:b7:b8:a7:b0:b0: 83:03:9c:61:c4:1c:de:db:d1:c8:94:07:32:52:c7:8e: 84:ab:69:2d:1a:97:fb:2f:84:4e:e9:19:c0:b8:1c:81: 17:f4:6d:fa:8d:20:22:68:c9:3c:f7:69:23:1f:e8:c8: 34:52:c4:31:34:24:88:50:27:57:aa:94:f7:a6:0f:61: 80:ba:79:5d:20:91:7b:bb:e8:f4:cb:98:39:24:54:05: c3:06:b9:dc:59:c6:1d:d3:66:56:8b:97:6e:e4:33:e7: 93:e8:78:e8:fb:bc:10:08:bd:47:36:f1:c5:1b:86:6c: cf:f8:2e:b4:3d:d3:99:9c:93:ca:4d:c9:23:8e:c8:db: f5:d3:7d:2d:51:6e:71:7a:81:ef:c9:0d:94:4d:be:f5: 3b:32:45:90:c3:4d:99:a3:11:c2:6c:61:9a:47:9d:d6: 4a:1e:45:90:50:0a:5a:93:dd:10:75:76:67:29:81:d1: 3a:9b:6b:5a:13:05:d3:19:9f:f0:81:45:19:22:2c:65: f8:cc:47:4b:41:ef:d2:44:a1:69:ea:d9:6f:b8:ad:19: 92:bd:3f:84:06:89:a2:7c:17:a8:bd:f4:38:9f:e8:20: aa:5f:08:30:88:06:20:77:57:08:22:f6:13:a0:91:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:72:fb:3d:1a:f4:20:ed:cb:23:ee:42:5d:3b:cb:0d: 80:dd:18:aa:94:99:6c:3e:32:c6:ef:70:0f:bd:7b:d8: 02:8e:ea:53:c2:a3:5d:9e:2a:93:87:9e:5a:93:07:c5: da:ef:fc:06:1b:7e:4a:b9:3e:dd:1e:0f:74:a2:68:d4: 7e:cf:29:65:18:80:5d:c1:de:ba:79:4d:a4:b9:c1:81: 63:c7:93:eb:9f:31:6f:a2:4f:e0:6b:b6:bd:36:a4:14: 6a:ed:8a:ae:4e:d7:8f:f9:0e:37:ec:4d:d3:7b:f4:81: a6:66:9d:71:22:e8:2d:4e:22:cc:9e:b9:1e:c0:20:1e: 8c:94:df:d0:ce:d7:35:be:d3:24:ed:bc:7d:86:7e:a0: 38:ee:0c:6d:a2:37:a4:94:35:21:ce:fe:08:a3:9b:87: b3:11:c6:83:54:cb:1d:42:8f:ac:cb:a2:e5:1a:11:85: c1:5e:19:04:68:4f:68:f9:3e:e8:af:48:a2:fe:a3:50: 81:1c:42:82:42:2b:f9:32:89:01:9c:63:1e:27:b6:cb: 57:5a:8c:ca:b8:05:37:50:3b:4f:84:b3:d5:49:f6:5c: eb:51:f7:a4:74:53:61:b0:0b:ea:4e:ca:83:8a:f7:06: 97:53:ac:cf:f6:fe:8b:5a:7f:d9:96:e9:34:7e:13:43 Fingerprint (SHA-256): 84:A2:52:35:CA:61:75:A6:B1:E3:E0:3F:10:DD:ED:91:06:62:AA:87:6E:74:12:B1:25:27:4D:24:F8:3D:48:5A Fingerprint (SHA1): 5F:F9:59:1E:6F:CF:CF:4A:9F:32:FC:0D:0D:83:D3:5D:4D:9B:54:BD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #12082: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #12083: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125945 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12084: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #12085: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #12086: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12087: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510125946 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12088: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12089: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #12090: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12091: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510125947 --extCP --extPM < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #12092: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12093: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #12094: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12095: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 510125948 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12096: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12097: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #12098: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12099: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 510125949 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12100: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12101: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #12102: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #12103: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #12104: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #12105: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #12106: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125945 (0x1e67e779) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:07:46 2017 Not After : Tue May 10 13:07:46 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:98:0f:7a:bc:b8:76:00:5e:47:ae:cb:28:ed:92:cd: 12:68:ab:2a:ed:af:11:da:5e:7e:af:9c:bc:31:74:4c: 6b:36:a0:78:f7:c8:be:d6:42:4a:9a:1c:e4:04:b3:41: ae:cd:3f:e3:21:b1:fe:70:13:8e:38:8b:ec:05:87:83: 9a:06:5f:f1:fe:1a:52:39:b4:5b:e5:db:f6:c0:3c:51: 81:64:1f:a7:ac:09:31:d3:40:6a:0c:7b:cb:12:75:9f: 9e:18:b3:3e:24:4f:63:74:aa:6f:af:79:cd:95:39:f3: bd:67:5a:2d:79:c4:0c:0e:79:5a:32:38:76:19:44:11: 1d:7a:5a:4f:79:6b:9c:36:45:b2:75:cf:5a:d1:67:1f: d6:d6:65:c1:23:58:98:7d:b9:32:01:52:9d:67:cb:78: a7:fb:aa:45:c9:4c:c1:90:e3:08:69:f2:84:35:34:61: ac:9a:19:bb:5f:3f:33:ee:aa:03:16:f2:00:4a:d1:15: 59:60:e2:3e:4c:11:53:90:1d:9c:17:99:1d:6f:c2:65: 54:de:77:91:5f:c7:27:a6:7e:9b:a6:e2:89:41:38:05: f7:5d:e4:03:a0:a8:a7:60:14:24:24:89:9f:a2:39:2a: 3f:ef:3b:de:04:bf:73:30:93:3e:34:7b:5e:85:a6:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:ce:fc:92:00:69:21:39:8c:8e:79:1c:25:23:bf:8b: 60:c5:4b:8b:0e:44:e4:73:24:1a:19:b4:5b:bb:19:08: c3:51:ed:f7:09:d9:84:28:36:a9:8f:32:f6:c4:f4:0e: f4:e3:b1:b5:e6:76:e3:46:4d:0b:b3:c6:91:8b:cc:db: ae:89:05:3b:5f:9e:39:fb:58:f5:96:60:dd:bd:6d:c8: d1:79:fe:35:ce:13:a7:17:a2:f3:5f:49:bd:5e:c0:40: 0a:c6:03:07:bd:2e:1a:6e:1c:da:e6:28:2e:2d:51:a8: 0d:38:7c:0d:3e:c3:59:3d:5a:16:56:06:fd:cd:0a:bb: a9:2e:a2:ad:cd:47:64:f1:f7:ef:e0:c3:c6:37:36:fc: ad:1e:56:1f:56:13:2e:37:13:60:09:2f:a4:eb:40:1e: 23:1f:85:cb:1c:db:87:cb:7b:a8:50:5b:30:f8:1d:83: 75:b7:e7:ef:70:5a:e5:2b:22:50:22:38:de:ab:38:9f: c8:20:4b:d9:e8:23:c7:55:19:97:9d:51:f1:3b:0c:02: f2:bf:97:13:57:9e:6c:f8:f9:43:53:e8:e8:75:5c:fa: bb:9d:08:94:5e:aa:f1:24:6a:65:e3:6c:69:d6:bc:90: 4e:75:40:2a:79:29:4a:95:75:c9:5a:bf:4f:d8:b0:6a Fingerprint (SHA-256): 27:5E:97:61:1C:9E:07:98:01:D5:F7:6A:F8:20:F1:98:1C:B2:5B:BD:04:52:44:80:A9:9B:FB:FB:08:65:7C:29 Fingerprint (SHA1): E3:C3:AD:5B:5C:0A:2F:64:75:72:1E:AA:A5:E8:D8:13:D2:65:B7:75 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12107: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12108: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125946 (0x1e67e77a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:07:48 2017 Not After : Tue May 10 13:07:48 2022 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:8f:17:65:46:f3:88:bc:44:51:c6:ca:4b:48:a1:6b: cc:be:61:b1:f9:5b:d8:59:a1:c3:2d:23:fc:57:75:ec: 9e:be:57:e2:93:ca:40:87:4c:d7:c7:38:ba:96:3a:0f: 7e:71:f7:22:8e:be:d2:70:65:72:46:c7:f2:f0:81:45: a6:31:b4:91:22:ea:30:56:c7:95:bf:96:57:1d:02:47: bc:3a:81:c1:49:61:41:d5:7f:24:6c:ac:b7:6a:fa:b5: a4:d5:a9:2b:c2:f4:9a:db:55:52:ba:bf:0b:4a:0e:49: 6c:9b:17:f2:9d:2d:38:12:98:24:ce:7a:b8:af:94:64: 72:12:62:69:90:46:d6:88:68:ff:7b:1e:9e:ef:c1:55: 0b:cf:82:cb:31:0f:e5:d1:a9:15:af:18:1c:99:ee:2e: 6c:55:f1:5a:15:a3:91:9a:10:8f:b1:dd:62:df:42:ad: 28:ac:3f:24:d1:14:4f:b7:27:2e:3a:ec:30:7b:a2:83: c6:d5:e5:1e:02:62:c4:89:bd:c9:ea:54:d8:53:78:fc: f5:71:51:79:44:bd:66:dc:a7:e1:7b:64:11:09:a6:b3: 97:f7:84:96:65:56:3b:72:08:8c:14:c0:f9:fd:05:fb: dd:17:ff:a7:71:a6:46:3a:6a:3e:41:4c:c3:ca:42:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:a4:f4:c9:71:c0:96:96:82:1b:89:51:aa:92:1e:51: 40:e6:27:d4:61:72:ea:f1:ae:81:e0:5d:87:1f:64:4c: 97:58:4b:79:5a:62:49:10:c9:c6:f2:a3:31:27:15:49: ad:b9:95:32:10:6e:4d:bb:51:c7:8d:e1:54:2c:d2:09: e4:13:e5:53:7f:86:40:dd:ee:6d:64:28:43:4e:9c:b5: 45:9a:f0:a8:de:e4:80:5f:56:04:b5:17:f7:b9:d5:3c: 2b:61:e1:42:42:22:a1:9d:c0:87:05:ec:c6:d4:c3:70: 2d:34:de:6c:05:9a:b1:5d:e2:cc:17:76:1a:7e:4c:37: a3:8e:b2:cb:f2:cb:84:eb:5e:a9:85:30:e2:41:50:50: 9e:07:0c:6a:65:c7:3d:35:ef:79:58:44:82:72:e0:6f: f1:76:d1:e3:b5:4c:77:c1:94:b9:e8:3f:be:6b:12:c8: 52:66:36:10:49:66:c9:ef:bd:6b:69:ca:c5:50:dd:49: 42:5a:0d:db:52:8e:3e:cb:fe:10:dc:72:49:4c:ce:53: ac:ad:25:69:dd:3e:b1:6c:36:db:57:63:f6:f4:29:7f: 68:0e:a0:fc:73:09:c6:36:aa:43:14:ff:67:a3:a3:dc: e0:ed:01:16:8e:26:1e:70:f5:65:1a:96:2c:5c:17:2c Fingerprint (SHA-256): 8B:BE:6E:9E:A6:C9:40:DA:8B:75:D7:B6:BA:EC:AB:C6:D2:EC:5F:F0:52:A6:E7:72:41:30:2B:6B:0D:D2:FF:7C Fingerprint (SHA1): 9E:81:CE:15:4D:E4:00:69:35:D6:F1:60:30:22:D3:9F:26:09:78:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #12109: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12110: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12111: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125947 (0x1e67e77b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 13:07:50 2017 Not After : Tue May 10 13:07:50 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:8d:27:f5:0d:24:d1:c3:54:fc:58:7c:7e:02:b1:94: 35:bc:16:03:7c:91:0e:21:93:5e:ee:6f:4a:2e:4d:21: 0c:ac:4a:f8:2e:e1:a1:8d:b5:89:b8:36:97:56:ee:3b: 50:c0:81:27:08:de:8d:82:d2:62:c0:b7:5b:73:07:15: d3:72:86:f6:c2:bb:3d:a7:56:ef:ac:b1:c1:a4:71:40: ec:2e:6a:99:9f:42:87:57:cf:4c:e8:77:21:d2:ea:04: f7:13:3b:2e:4c:dc:67:b5:43:8f:ff:9c:7c:b1:d5:14: f9:1c:77:98:c2:2e:9f:28:a6:0c:e8:ae:17:60:27:02: d7:7a:d4:4c:64:f3:2d:81:da:d9:f7:b9:63:79:2f:30: 3f:89:16:8a:bf:9f:83:51:fd:c2:f6:a7:ff:9f:19:ff: 6d:c2:d9:47:fd:02:20:0e:6b:0e:ff:85:c5:3f:66:c7: 51:c2:c3:05:22:d9:26:e9:57:73:42:60:5d:97:2a:f9: 5d:52:fa:2c:a6:d0:c1:fa:1c:6a:96:d3:bb:0e:f2:46: 6d:c9:01:91:4f:4f:da:5a:27:8e:0f:a8:4c:b2:9a:ef: 6f:e9:ba:38:e8:f5:01:16:f6:1f:f3:5d:c4:bf:2e:9b: 6a:79:c8:bc:d6:52:b7:f0:0a:ca:ea:02:d9:67:8f:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:4e:ff:fd:af:36:91:dc:42:39:35:b5:a8:a8:19:ed: 13:61:52:37:98:11:0b:24:5a:1d:bd:e7:8d:e2:95:da: e7:9c:43:32:40:6b:f1:8a:95:52:2f:3e:b9:90:eb:94: 3b:2e:24:a1:d4:92:9d:4b:ea:4e:74:62:b6:6f:ee:bd: 1d:03:16:41:f2:27:33:dc:dc:37:60:25:63:e9:5a:7e: e9:6b:13:f8:ec:5d:68:94:fe:aa:10:d0:d0:96:05:24: 0b:87:2f:2c:a5:75:b7:b4:18:a7:03:2a:e1:ab:ff:09: c4:4f:66:ae:b1:07:fb:e6:2b:a7:ae:d5:19:9e:bd:4d: c3:3c:bd:2f:c8:79:56:4e:c2:71:91:43:e4:55:7b:ee: e2:d6:d5:5b:87:56:25:76:c0:51:4e:11:76:36:21:0f: 2f:d1:c8:8c:ff:69:fa:f0:77:97:59:cd:74:ee:68:f5: 95:f7:00:65:9c:4d:ab:ed:ff:54:c0:78:01:cd:fc:93: 56:2e:15:10:51:f4:7a:71:ce:93:a6:79:c3:cf:32:6b: 63:bf:15:1c:fc:1e:0d:3f:7c:76:0c:c6:76:92:88:af: b6:02:7b:3c:b1:f2:48:52:a4:b8:1e:fc:c2:7d:68:9d: 7e:10:98:43:1a:81:af:c5:c8:40:86:0c:a6:b8:f2:33 Fingerprint (SHA-256): CA:D1:E3:28:FB:B3:5A:72:F9:19:5D:DC:36:BF:44:93:ED:0E:07:2E:50:5A:1E:43:F4:3B:A7:92:44:07:53:88 Fingerprint (SHA1): F1:E7:A8:6E:AB:5C:E6:D8:37:5E:36:C3:2F:A8:99:81:A5:9F:07:4B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #12112: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #12113: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125950 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12114: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #12115: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #12116: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12117: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510125951 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12118: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12119: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #12120: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12121: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510125952 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA1Root-510125729.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12122: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12123: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #12124: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12125: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 510125953 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12126: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12127: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #12128: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125950 (0x1e67e77e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:08:01 2017 Not After : Tue May 10 13:08:01 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 96:3d:f6:b3:f1:56:d6:76:6e:92:be:e2:fe:66:f3:85: 93:d9:e9:3b:b0:ff:2a:25:97:65:a0:17:2c:0f:67:69: 60:b0:78:0b:d2:83:4c:96:c1:0c:76:9b:f4:f6:64:f2: 6d:fd:dd:05:a5:2b:31:ec:85:9d:bc:ff:16:eb:b1:c1: d8:58:23:19:78:3e:bf:e1:e6:8c:e7:55:ae:60:87:3e: 0f:93:57:9a:3c:14:cd:ad:11:a4:33:bf:64:59:55:56: f5:45:94:e4:7d:df:55:73:2a:1c:06:c6:24:1f:fe:84: d9:e3:4d:83:5d:58:9b:f7:b7:1c:d4:d9:da:52:1f:5b: b7:b0:6b:37:5d:26:c1:34:0b:b3:7b:4f:d6:74:13:22: e8:bb:26:10:f9:92:a6:51:d7:9b:75:76:6d:13:97:17: 25:af:0c:dc:b5:0a:bb:e3:12:4f:3e:4c:9e:83:75:c9: 52:6d:46:6b:bd:41:90:46:ad:44:a1:d8:6c:ed:b9:b9: 65:35:45:23:24:74:b2:34:64:b3:4d:9e:da:13:ee:64: 87:24:c2:5a:cb:de:70:30:84:4d:f5:49:04:98:d0:c4: fe:8c:75:b2:94:2f:10:14:10:17:8b:4f:21:c5:eb:f3: 70:a8:1b:11:9a:e8:4d:11:48:c8:be:77:cb:65:ff:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:ef:0a:59:4e:85:c5:9e:a5:96:07:73:af:f7:d7:98: dc:98:82:dc:9e:93:2a:58:27:68:9f:9a:4a:61:90:9f: 99:85:02:6b:d4:f7:c3:be:f9:6c:66:fe:80:11:07:e6: f6:31:2d:06:26:97:13:56:bb:d9:e2:a4:87:34:12:c4: 1b:cd:a0:a2:cf:0b:5c:95:ce:4d:0b:14:42:f2:b5:fd: 88:a2:d8:26:ad:16:02:31:e2:b0:94:c4:e0:ac:d0:47: 94:ac:32:98:1d:09:99:a7:e6:53:91:a0:e8:3e:35:01: 56:90:00:1d:52:90:d4:ca:b3:b1:b7:7d:f3:42:ce:38: 6d:a9:61:47:99:ce:7e:99:65:dd:5a:1d:1d:b0:10:7f: c3:13:49:8f:e4:8c:91:88:e3:df:e8:83:49:6d:52:1f: 8e:36:57:a6:52:d6:4b:c0:70:e6:b7:ed:ea:b2:dc:96: 10:be:f4:86:f1:65:b4:ab:a7:42:8c:43:1b:48:11:1d: a4:cc:40:81:ed:34:4d:1d:15:ec:1e:44:ca:08:b9:a0: d6:8d:de:26:11:f9:b6:d7:eb:a8:d8:b8:f9:94:dd:86: b8:e1:c4:b7:cf:04:44:8e:e4:ec:ed:84:43:d8:be:1d: 5b:c8:cd:44:04:19:9a:cd:b4:84:73:3f:8f:8a:ee:99 Fingerprint (SHA-256): 2B:7F:80:9D:4E:DA:9C:CC:8F:1E:A4:2A:C9:EA:AE:20:AE:0E:31:F5:D9:E3:EF:EA:0C:D7:4D:F3:79:5C:1A:8D Fingerprint (SHA1): F7:5A:4D:27:38:B2:B4:01:FF:B1:ED:B5:5D:73:22:19:CD:12:82:D7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12129: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #12130: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125954 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12131: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #12132: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #12133: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125955 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12134: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #12135: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #12136: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12137: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 510125956 -7 Bridge@Army < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12138: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12139: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 510125957 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12140: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12141: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #12142: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #12143: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12144: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 510125958 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-Bridge-510125730.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12145: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12146: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #12147: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12148: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510125959 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12149: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12150: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #12151: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125954 (0x1e67e782) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 13:08:11 2017 Not After : Tue May 10 13:08:11 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:ed:05:11:44:56:41:9f:39:d3:cf:c1:74:0d:ba:c0: 44:09:ed:aa:be:53:ab:bc:32:b4:8e:a3:76:11:a3:d6: 22:ad:15:6b:06:b3:fe:2c:02:a1:6e:dc:43:a2:cf:98: ff:dc:97:d2:84:09:8d:4e:56:eb:f7:44:f0:90:eb:e2: bc:50:29:c7:9e:f0:c3:03:4a:da:45:d6:1c:c4:4c:fe: 44:70:5d:62:f9:a7:54:4b:d8:e7:62:5c:c6:c6:07:1e: 9f:aa:e1:db:7e:30:c9:73:6a:a0:06:32:c1:be:e9:16: 98:b5:37:96:5d:65:b6:67:ea:86:f2:35:cf:be:42:ff: f9:95:9b:d8:11:63:05:8c:17:18:e5:72:aa:29:81:af: 33:31:a1:1b:c6:79:f1:14:82:2b:43:66:14:8b:15:17: fb:d2:67:66:7f:a7:e4:04:e7:2f:b2:93:67:2d:b6:fb: e7:0c:81:e4:d4:31:b0:77:d1:ab:c5:ab:60:f9:86:32: 57:a4:8a:04:2a:e0:e1:6d:37:db:04:74:ad:b7:d5:df: a6:34:01:80:67:c1:db:e9:01:20:e6:33:eb:9d:d4:9f: 58:7c:c9:38:14:7e:9a:e0:02:f4:a7:9a:b6:b7:a1:4b: a7:8c:a0:10:a6:3f:56:a7:a7:cb:2d:ff:d8:94:92:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:8c:71:3d:cd:e4:54:40:a5:13:33:8c:36:5a:fe:47: 67:28:f2:80:8b:b2:82:86:f2:29:94:7e:cf:d1:85:0a: 7b:e6:13:fa:88:14:4f:f7:e4:0d:c3:ec:cc:4c:bf:ab: c4:b1:eb:a4:d8:e8:e4:d9:69:82:0e:1b:34:fb:a3:22: b7:eb:2b:e8:41:62:1d:85:dc:39:ae:1a:65:7f:24:d5: a4:3e:57:6d:c2:bb:34:2d:d1:39:ee:10:34:93:31:dd: 82:1a:e6:62:56:d8:56:8c:a8:53:b9:2f:51:b2:56:6e: 81:56:80:fe:6b:b7:3a:6c:9a:51:3c:e1:e0:7b:7e:37: fe:79:6a:3e:5a:b5:e3:1d:e8:31:ad:43:bb:29:66:1f: 28:3f:0d:4e:6b:f7:6e:6e:de:ab:2d:1d:43:50:c7:a0: da:27:90:8a:62:59:a5:1b:16:9b:cf:10:ae:e7:dd:d8: 9f:77:c6:3d:4c:b5:09:b9:6a:c5:06:09:b6:1f:89:98: e8:4f:35:6d:ae:f5:e6:1a:ca:8a:c7:e3:5e:7a:17:78: f2:4a:ff:c9:78:57:e1:68:ac:80:eb:95:c7:1d:67:4c: a6:5c:0a:fc:8f:1b:58:ec:72:1d:7b:0f:b3:86:e6:32: 96:a1:08:c9:bd:20:1b:12:72:e8:88:49:1f:2b:98:ae Fingerprint (SHA-256): 1A:39:1B:14:2E:0B:95:D2:13:96:8A:44:A7:23:F5:C9:0C:34:B2:D7:D0:C1:83:68:01:A3:65:65:AA:F0:45:00 Fingerprint (SHA1): 09:24:DF:23:3D:56:0F:6D:88:0D:A0:45:E6:E0:82:81:69:A4:5A:F0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12152: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125955 (0x1e67e783) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 13:08:12 2017 Not After : Tue May 10 13:08:12 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:8c:c4:af:d6:29:de:4a:6b:da:3b:76:5f:98:a1:0d: 24:b9:60:79:c6:d0:42:c8:4d:79:c4:d9:53:e2:61:56: 4d:e4:ac:2e:3d:3a:03:48:23:b2:0c:97:47:b3:cc:4a: 3b:c5:c4:a5:0d:10:d6:2f:0d:9f:9b:2d:bd:3f:2b:6e: 1a:57:ed:86:90:8d:72:6f:6c:c5:3d:b3:4c:ad:c1:66: 24:7b:25:44:27:74:5a:9c:2e:60:56:98:41:3b:54:af: a5:da:eb:19:35:fc:2b:17:37:e3:eb:5a:0e:3e:b9:be: 93:ac:91:1e:06:45:cd:d1:b6:d1:a4:0d:77:89:65:cd: 8c:df:ab:5b:62:2f:84:3f:44:54:72:36:cc:d1:52:fb: 32:e2:2f:81:64:f8:92:10:21:54:bc:1d:73:ec:c6:e7: 56:0a:ad:17:ec:dd:2e:76:9f:e6:69:95:3f:81:cf:bb: c6:99:62:42:b9:a7:f3:e9:c8:45:c1:a8:c6:0d:26:32: 60:5f:9c:18:b0:e4:80:d2:05:a2:ef:8b:71:a1:62:74: 46:2f:30:51:04:7f:c8:b1:30:fe:67:52:9a:98:d3:45: ca:ed:b4:cf:78:86:10:3c:15:9d:65:e4:7f:cc:d3:54: 90:19:46:fc:5c:08:f0:22:3b:55:f7:d1:06:46:a4:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:55:ca:c0:7b:60:a6:0f:0e:fb:9e:02:f3:71:5a:37: cb:57:61:04:34:8c:4f:29:89:02:b9:12:ea:32:b1:e9: 54:76:18:d9:30:75:ee:a5:6b:a9:98:12:74:8c:9f:a0: 88:a7:9c:6c:56:ce:68:e0:a6:4b:d5:03:ce:ec:f5:6b: b5:b7:06:7d:46:59:34:7a:ad:2f:d8:26:20:56:b4:33: 55:95:83:d9:55:23:fb:28:4d:58:db:e2:a3:04:77:b4: 76:c0:cb:e6:68:ca:31:e0:ec:f0:57:62:e8:00:a0:d5: 4c:77:e6:fa:3a:60:34:03:bb:e6:36:83:22:42:7f:f5: c6:47:67:97:d7:a8:be:1d:5a:f2:9a:7f:42:86:f7:2c: b0:75:16:0b:ef:d8:bb:94:6d:0d:94:21:18:d7:fc:a7: 35:64:60:16:04:dc:4e:5e:f8:5d:1b:4a:37:f0:ca:2c: c9:d8:0e:11:17:fd:a4:c4:3f:93:39:6a:a0:64:81:74: c6:74:38:9f:66:2b:50:16:d2:94:72:b3:26:11:81:cd: b2:8f:9e:e2:41:05:62:6a:0d:95:49:6c:fa:ba:d7:05: b2:1c:fe:96:b9:26:ea:c9:f3:9a:a5:7c:bc:f2:e2:97: 5b:e5:76:5b:90:de:51:48:68:2a:8b:c4:5b:b7:52:24 Fingerprint (SHA-256): EC:02:0B:86:F4:07:FA:B2:0E:F5:49:FD:26:53:90:24:F4:99:3F:FD:B7:D7:B5:9E:79:F4:F0:0F:93:3E:AF:73 Fingerprint (SHA1): 69:45:44:AE:92:6B:14:EB:98:C7:B7:11:70:1F:33:64:92:23:EA:EE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12153: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125955 (0x1e67e783) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 13:08:12 2017 Not After : Tue May 10 13:08:12 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:8c:c4:af:d6:29:de:4a:6b:da:3b:76:5f:98:a1:0d: 24:b9:60:79:c6:d0:42:c8:4d:79:c4:d9:53:e2:61:56: 4d:e4:ac:2e:3d:3a:03:48:23:b2:0c:97:47:b3:cc:4a: 3b:c5:c4:a5:0d:10:d6:2f:0d:9f:9b:2d:bd:3f:2b:6e: 1a:57:ed:86:90:8d:72:6f:6c:c5:3d:b3:4c:ad:c1:66: 24:7b:25:44:27:74:5a:9c:2e:60:56:98:41:3b:54:af: a5:da:eb:19:35:fc:2b:17:37:e3:eb:5a:0e:3e:b9:be: 93:ac:91:1e:06:45:cd:d1:b6:d1:a4:0d:77:89:65:cd: 8c:df:ab:5b:62:2f:84:3f:44:54:72:36:cc:d1:52:fb: 32:e2:2f:81:64:f8:92:10:21:54:bc:1d:73:ec:c6:e7: 56:0a:ad:17:ec:dd:2e:76:9f:e6:69:95:3f:81:cf:bb: c6:99:62:42:b9:a7:f3:e9:c8:45:c1:a8:c6:0d:26:32: 60:5f:9c:18:b0:e4:80:d2:05:a2:ef:8b:71:a1:62:74: 46:2f:30:51:04:7f:c8:b1:30:fe:67:52:9a:98:d3:45: ca:ed:b4:cf:78:86:10:3c:15:9d:65:e4:7f:cc:d3:54: 90:19:46:fc:5c:08:f0:22:3b:55:f7:d1:06:46:a4:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:55:ca:c0:7b:60:a6:0f:0e:fb:9e:02:f3:71:5a:37: cb:57:61:04:34:8c:4f:29:89:02:b9:12:ea:32:b1:e9: 54:76:18:d9:30:75:ee:a5:6b:a9:98:12:74:8c:9f:a0: 88:a7:9c:6c:56:ce:68:e0:a6:4b:d5:03:ce:ec:f5:6b: b5:b7:06:7d:46:59:34:7a:ad:2f:d8:26:20:56:b4:33: 55:95:83:d9:55:23:fb:28:4d:58:db:e2:a3:04:77:b4: 76:c0:cb:e6:68:ca:31:e0:ec:f0:57:62:e8:00:a0:d5: 4c:77:e6:fa:3a:60:34:03:bb:e6:36:83:22:42:7f:f5: c6:47:67:97:d7:a8:be:1d:5a:f2:9a:7f:42:86:f7:2c: b0:75:16:0b:ef:d8:bb:94:6d:0d:94:21:18:d7:fc:a7: 35:64:60:16:04:dc:4e:5e:f8:5d:1b:4a:37:f0:ca:2c: c9:d8:0e:11:17:fd:a4:c4:3f:93:39:6a:a0:64:81:74: c6:74:38:9f:66:2b:50:16:d2:94:72:b3:26:11:81:cd: b2:8f:9e:e2:41:05:62:6a:0d:95:49:6c:fa:ba:d7:05: b2:1c:fe:96:b9:26:ea:c9:f3:9a:a5:7c:bc:f2:e2:97: 5b:e5:76:5b:90:de:51:48:68:2a:8b:c4:5b:b7:52:24 Fingerprint (SHA-256): EC:02:0B:86:F4:07:FA:B2:0E:F5:49:FD:26:53:90:24:F4:99:3F:FD:B7:D7:B5:9E:79:F4:F0:0F:93:3E:AF:73 Fingerprint (SHA1): 69:45:44:AE:92:6B:14:EB:98:C7:B7:11:70:1F:33:64:92:23:EA:EE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12154: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #12155: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125960 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12156: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #12157: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #12158: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125961 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12159: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #12160: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #12161: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12162: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 510125962 -7 Bridge@Army < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12163: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12164: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 510125963 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12165: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12166: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #12167: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #12168: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12169: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 510125964 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-Bridge-510125731.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12170: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12171: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #12172: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12173: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510125965 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12174: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12175: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #12176: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12177: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 510125966 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-BridgeNavy-510125732.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12178: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12179: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #12180: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12181: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 510125967 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12182: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12183: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #12184: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125960 (0x1e67e788) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 13:08:22 2017 Not After : Tue May 10 13:08:22 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:9e:24:c6:3e:bc:1c:ec:cb:49:bf:0d:25:f6:f9:42: bd:88:52:6b:52:e4:cd:29:89:79:0c:a1:1d:cc:f3:4e: ee:b7:06:e7:b4:fd:e4:e4:f9:a6:e0:c9:19:93:78:80: d6:ab:a8:48:8a:04:0c:41:60:25:a9:85:cd:12:f6:92: a0:0f:5e:9e:ce:6e:20:85:85:c1:fc:1c:bf:f3:a0:e0: 34:a0:0a:bf:21:8a:dd:c1:9f:10:01:c5:80:28:25:c4: 8e:16:c5:d8:e9:db:36:fa:71:76:9c:1d:15:2b:ee:0e: c6:a6:bb:39:aa:44:9a:95:41:2f:4f:bf:c3:28:44:42: 41:73:9d:7c:9d:f8:de:44:c7:bf:e1:29:dd:84:ec:a6: 1b:dd:80:73:b7:14:50:d8:76:d3:d4:5b:2f:c4:e1:8d: 9b:75:ec:fb:a6:a1:84:90:bd:e7:6c:c8:b2:5d:07:b1: e1:76:ae:41:e4:43:df:6e:64:41:8c:71:29:3d:bb:77: b5:27:b5:aa:ab:d5:61:4b:d6:25:4c:d9:5a:10:b1:2d: 44:58:e2:b2:46:d3:ad:f0:32:c7:02:e6:ea:78:87:28: 8c:d0:c0:e9:79:52:e0:94:1d:a8:0d:a2:37:45:58:07: 87:65:88:5e:73:7b:93:51:dc:7a:ef:6a:7f:f7:11:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:fd:7b:5d:e7:3b:d1:55:f8:1f:38:fd:22:dc:87:c9: ff:d9:c4:b7:f6:cb:9e:55:5f:3b:0a:57:88:ec:d4:33: 09:1a:50:e1:33:f2:06:65:e6:b4:3b:d2:93:68:93:b2: 81:bc:db:09:4d:9e:6c:fe:47:ea:fb:6f:35:c2:ca:5d: 20:47:d1:ff:a1:f6:25:98:00:9d:76:ad:ae:70:2f:51: 3d:80:3e:36:7f:25:3d:07:1d:20:43:38:6d:f0:ee:9f: 2b:c6:fd:e3:81:b2:32:6a:64:e7:59:c2:ea:a2:ce:e1: 3b:5c:61:e5:2f:7b:73:e9:97:54:47:aa:6d:e7:ea:9b: 7b:d4:7f:b5:9b:fe:23:44:2e:91:81:2a:6b:34:59:0b: 36:0a:60:9e:f6:01:a3:70:89:39:cc:22:e3:52:f7:e9: 0a:d8:7c:13:3c:51:39:e4:b1:a6:40:35:c8:fd:66:ef: 70:c7:5b:48:f6:9b:79:0a:c1:f3:55:46:4c:21:ce:eb: da:a8:3c:24:8f:3a:78:0b:ba:5c:7b:82:6b:04:ee:63: bd:56:f1:38:4a:8c:a1:64:7c:4f:0a:9a:dc:16:0f:ce: 94:59:5d:4a:90:fc:d1:ed:6f:78:2f:82:87:05:b7:fb: db:02:b8:a2:62:d7:e4:33:51:fc:54:77:46:0b:6c:14 Fingerprint (SHA-256): 45:6F:50:E4:90:F6:2F:FA:F2:73:05:FA:0E:86:25:16:EE:BF:7B:54:01:D8:36:27:35:C9:15:39:4B:A0:3E:FE Fingerprint (SHA1): 16:5B:53:05:7C:85:38:F5:4D:DE:05:0C:02:4B:B1:1B:DD:F2:75:D5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12185: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125961 (0x1e67e789) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 13:08:23 2017 Not After : Tue May 10 13:08:23 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:35:04:c6:c8:cb:f9:49:89:c5:1c:82:23:8d:9e:96: b2:e6:d6:39:7e:34:7a:17:37:3a:2a:3c:97:67:14:b2: 66:3d:e8:ed:2a:21:ba:ec:e2:7f:cc:2e:16:b2:c7:a9: a9:75:18:59:59:c6:fb:95:69:33:6f:b0:27:f3:4c:56: 9b:3c:90:6b:9b:95:2f:37:ee:6b:75:0b:64:5a:59:04: 58:7d:80:d8:8d:fd:9b:88:55:58:4e:b2:4a:4d:a9:0c: 2e:5f:cc:af:7c:ae:e1:34:84:23:6b:29:2c:56:ca:29: 57:e9:1d:ca:02:fc:75:f0:50:89:b3:28:7b:3a:2e:4e: 64:83:b4:6b:02:a9:cc:5f:ee:fa:62:fd:d8:63:6a:fd: 89:30:ec:37:f7:20:1e:71:a6:3e:18:c2:04:67:e1:ae: b1:3a:ff:b8:20:04:8c:11:6d:98:f6:6b:a8:67:9a:6c: 4d:4b:9a:4d:2d:db:7a:a1:88:d1:07:a7:87:5c:33:81: 1a:5f:a7:ac:6e:99:53:f5:a7:a8:d7:5c:66:86:cf:e0: 19:fb:b6:0c:e3:1e:d5:28:88:04:e0:77:01:ee:38:37: f0:ca:09:f2:48:75:8b:56:65:b5:89:1f:4f:d1:dd:11: c4:96:a8:71:78:2c:a3:2e:e0:37:74:72:44:c2:e4:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:f3:96:95:ba:45:cc:c7:83:53:c4:e2:d7:36:f6:6a: fb:a1:4c:af:f5:54:1b:50:c6:b5:72:f9:db:9f:16:e2: 17:8e:28:54:a1:70:5d:93:e3:a0:f7:a4:1f:1a:cf:e9: e3:b7:75:49:86:56:cc:35:ea:60:71:5c:d4:38:c7:5f: c5:08:c7:cd:da:af:10:a7:66:7d:7a:63:ce:6b:6b:60: 31:26:a5:40:d1:a9:08:5e:64:e6:c0:b3:dc:0f:98:fe: b9:c8:be:e5:16:9e:40:07:98:5c:5e:0a:27:0a:f0:e7: 19:58:22:bb:80:ce:06:7f:cb:9e:b1:3a:35:5c:31:07: 0b:69:b5:f8:b8:17:ee:88:df:39:bf:e7:37:41:49:83: 8f:81:8c:0e:4f:42:67:e8:f9:6a:79:80:c4:e4:0c:7a: 0f:ab:d3:74:60:13:9f:3e:30:cf:0c:e7:b1:09:81:df: e2:32:34:13:5f:b4:19:1f:8f:08:72:77:bf:09:d9:54: 89:52:54:f6:8b:5e:1a:09:5c:68:ab:58:1e:70:f1:b1: 79:36:0a:e8:17:9c:4a:d3:dc:6a:42:e1:ab:11:12:6d: 57:cc:fa:1b:1b:8c:1e:4f:98:73:38:3a:77:db:88:90: a6:59:76:6d:6a:37:23:3d:ac:7b:c7:d9:65:40:8b:09 Fingerprint (SHA-256): 45:9B:92:86:C5:65:55:03:36:B9:F4:1A:4D:9D:C4:80:F2:58:15:CF:4A:C9:01:71:6A:6B:E5:71:B5:43:97:12 Fingerprint (SHA1): 10:45:62:74:14:55:B9:B3:02:54:A1:0B:6D:5A:D7:DE:93:C6:33:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12186: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125961 (0x1e67e789) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 13:08:23 2017 Not After : Tue May 10 13:08:23 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:35:04:c6:c8:cb:f9:49:89:c5:1c:82:23:8d:9e:96: b2:e6:d6:39:7e:34:7a:17:37:3a:2a:3c:97:67:14:b2: 66:3d:e8:ed:2a:21:ba:ec:e2:7f:cc:2e:16:b2:c7:a9: a9:75:18:59:59:c6:fb:95:69:33:6f:b0:27:f3:4c:56: 9b:3c:90:6b:9b:95:2f:37:ee:6b:75:0b:64:5a:59:04: 58:7d:80:d8:8d:fd:9b:88:55:58:4e:b2:4a:4d:a9:0c: 2e:5f:cc:af:7c:ae:e1:34:84:23:6b:29:2c:56:ca:29: 57:e9:1d:ca:02:fc:75:f0:50:89:b3:28:7b:3a:2e:4e: 64:83:b4:6b:02:a9:cc:5f:ee:fa:62:fd:d8:63:6a:fd: 89:30:ec:37:f7:20:1e:71:a6:3e:18:c2:04:67:e1:ae: b1:3a:ff:b8:20:04:8c:11:6d:98:f6:6b:a8:67:9a:6c: 4d:4b:9a:4d:2d:db:7a:a1:88:d1:07:a7:87:5c:33:81: 1a:5f:a7:ac:6e:99:53:f5:a7:a8:d7:5c:66:86:cf:e0: 19:fb:b6:0c:e3:1e:d5:28:88:04:e0:77:01:ee:38:37: f0:ca:09:f2:48:75:8b:56:65:b5:89:1f:4f:d1:dd:11: c4:96:a8:71:78:2c:a3:2e:e0:37:74:72:44:c2:e4:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:f3:96:95:ba:45:cc:c7:83:53:c4:e2:d7:36:f6:6a: fb:a1:4c:af:f5:54:1b:50:c6:b5:72:f9:db:9f:16:e2: 17:8e:28:54:a1:70:5d:93:e3:a0:f7:a4:1f:1a:cf:e9: e3:b7:75:49:86:56:cc:35:ea:60:71:5c:d4:38:c7:5f: c5:08:c7:cd:da:af:10:a7:66:7d:7a:63:ce:6b:6b:60: 31:26:a5:40:d1:a9:08:5e:64:e6:c0:b3:dc:0f:98:fe: b9:c8:be:e5:16:9e:40:07:98:5c:5e:0a:27:0a:f0:e7: 19:58:22:bb:80:ce:06:7f:cb:9e:b1:3a:35:5c:31:07: 0b:69:b5:f8:b8:17:ee:88:df:39:bf:e7:37:41:49:83: 8f:81:8c:0e:4f:42:67:e8:f9:6a:79:80:c4:e4:0c:7a: 0f:ab:d3:74:60:13:9f:3e:30:cf:0c:e7:b1:09:81:df: e2:32:34:13:5f:b4:19:1f:8f:08:72:77:bf:09:d9:54: 89:52:54:f6:8b:5e:1a:09:5c:68:ab:58:1e:70:f1:b1: 79:36:0a:e8:17:9c:4a:d3:dc:6a:42:e1:ab:11:12:6d: 57:cc:fa:1b:1b:8c:1e:4f:98:73:38:3a:77:db:88:90: a6:59:76:6d:6a:37:23:3d:ac:7b:c7:d9:65:40:8b:09 Fingerprint (SHA-256): 45:9B:92:86:C5:65:55:03:36:B9:F4:1A:4D:9D:C4:80:F2:58:15:CF:4A:C9:01:71:6A:6B:E5:71:B5:43:97:12 Fingerprint (SHA1): 10:45:62:74:14:55:B9:B3:02:54:A1:0B:6D:5A:D7:DE:93:C6:33:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12187: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #12188: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125960 (0x1e67e788) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 13:08:22 2017 Not After : Tue May 10 13:08:22 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:9e:24:c6:3e:bc:1c:ec:cb:49:bf:0d:25:f6:f9:42: bd:88:52:6b:52:e4:cd:29:89:79:0c:a1:1d:cc:f3:4e: ee:b7:06:e7:b4:fd:e4:e4:f9:a6:e0:c9:19:93:78:80: d6:ab:a8:48:8a:04:0c:41:60:25:a9:85:cd:12:f6:92: a0:0f:5e:9e:ce:6e:20:85:85:c1:fc:1c:bf:f3:a0:e0: 34:a0:0a:bf:21:8a:dd:c1:9f:10:01:c5:80:28:25:c4: 8e:16:c5:d8:e9:db:36:fa:71:76:9c:1d:15:2b:ee:0e: c6:a6:bb:39:aa:44:9a:95:41:2f:4f:bf:c3:28:44:42: 41:73:9d:7c:9d:f8:de:44:c7:bf:e1:29:dd:84:ec:a6: 1b:dd:80:73:b7:14:50:d8:76:d3:d4:5b:2f:c4:e1:8d: 9b:75:ec:fb:a6:a1:84:90:bd:e7:6c:c8:b2:5d:07:b1: e1:76:ae:41:e4:43:df:6e:64:41:8c:71:29:3d:bb:77: b5:27:b5:aa:ab:d5:61:4b:d6:25:4c:d9:5a:10:b1:2d: 44:58:e2:b2:46:d3:ad:f0:32:c7:02:e6:ea:78:87:28: 8c:d0:c0:e9:79:52:e0:94:1d:a8:0d:a2:37:45:58:07: 87:65:88:5e:73:7b:93:51:dc:7a:ef:6a:7f:f7:11:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:fd:7b:5d:e7:3b:d1:55:f8:1f:38:fd:22:dc:87:c9: ff:d9:c4:b7:f6:cb:9e:55:5f:3b:0a:57:88:ec:d4:33: 09:1a:50:e1:33:f2:06:65:e6:b4:3b:d2:93:68:93:b2: 81:bc:db:09:4d:9e:6c:fe:47:ea:fb:6f:35:c2:ca:5d: 20:47:d1:ff:a1:f6:25:98:00:9d:76:ad:ae:70:2f:51: 3d:80:3e:36:7f:25:3d:07:1d:20:43:38:6d:f0:ee:9f: 2b:c6:fd:e3:81:b2:32:6a:64:e7:59:c2:ea:a2:ce:e1: 3b:5c:61:e5:2f:7b:73:e9:97:54:47:aa:6d:e7:ea:9b: 7b:d4:7f:b5:9b:fe:23:44:2e:91:81:2a:6b:34:59:0b: 36:0a:60:9e:f6:01:a3:70:89:39:cc:22:e3:52:f7:e9: 0a:d8:7c:13:3c:51:39:e4:b1:a6:40:35:c8:fd:66:ef: 70:c7:5b:48:f6:9b:79:0a:c1:f3:55:46:4c:21:ce:eb: da:a8:3c:24:8f:3a:78:0b:ba:5c:7b:82:6b:04:ee:63: bd:56:f1:38:4a:8c:a1:64:7c:4f:0a:9a:dc:16:0f:ce: 94:59:5d:4a:90:fc:d1:ed:6f:78:2f:82:87:05:b7:fb: db:02:b8:a2:62:d7:e4:33:51:fc:54:77:46:0b:6c:14 Fingerprint (SHA-256): 45:6F:50:E4:90:F6:2F:FA:F2:73:05:FA:0E:86:25:16:EE:BF:7B:54:01:D8:36:27:35:C9:15:39:4B:A0:3E:FE Fingerprint (SHA1): 16:5B:53:05:7C:85:38:F5:4D:DE:05:0C:02:4B:B1:1B:DD:F2:75:D5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12189: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125961 (0x1e67e789) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 13:08:23 2017 Not After : Tue May 10 13:08:23 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:35:04:c6:c8:cb:f9:49:89:c5:1c:82:23:8d:9e:96: b2:e6:d6:39:7e:34:7a:17:37:3a:2a:3c:97:67:14:b2: 66:3d:e8:ed:2a:21:ba:ec:e2:7f:cc:2e:16:b2:c7:a9: a9:75:18:59:59:c6:fb:95:69:33:6f:b0:27:f3:4c:56: 9b:3c:90:6b:9b:95:2f:37:ee:6b:75:0b:64:5a:59:04: 58:7d:80:d8:8d:fd:9b:88:55:58:4e:b2:4a:4d:a9:0c: 2e:5f:cc:af:7c:ae:e1:34:84:23:6b:29:2c:56:ca:29: 57:e9:1d:ca:02:fc:75:f0:50:89:b3:28:7b:3a:2e:4e: 64:83:b4:6b:02:a9:cc:5f:ee:fa:62:fd:d8:63:6a:fd: 89:30:ec:37:f7:20:1e:71:a6:3e:18:c2:04:67:e1:ae: b1:3a:ff:b8:20:04:8c:11:6d:98:f6:6b:a8:67:9a:6c: 4d:4b:9a:4d:2d:db:7a:a1:88:d1:07:a7:87:5c:33:81: 1a:5f:a7:ac:6e:99:53:f5:a7:a8:d7:5c:66:86:cf:e0: 19:fb:b6:0c:e3:1e:d5:28:88:04:e0:77:01:ee:38:37: f0:ca:09:f2:48:75:8b:56:65:b5:89:1f:4f:d1:dd:11: c4:96:a8:71:78:2c:a3:2e:e0:37:74:72:44:c2:e4:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:f3:96:95:ba:45:cc:c7:83:53:c4:e2:d7:36:f6:6a: fb:a1:4c:af:f5:54:1b:50:c6:b5:72:f9:db:9f:16:e2: 17:8e:28:54:a1:70:5d:93:e3:a0:f7:a4:1f:1a:cf:e9: e3:b7:75:49:86:56:cc:35:ea:60:71:5c:d4:38:c7:5f: c5:08:c7:cd:da:af:10:a7:66:7d:7a:63:ce:6b:6b:60: 31:26:a5:40:d1:a9:08:5e:64:e6:c0:b3:dc:0f:98:fe: b9:c8:be:e5:16:9e:40:07:98:5c:5e:0a:27:0a:f0:e7: 19:58:22:bb:80:ce:06:7f:cb:9e:b1:3a:35:5c:31:07: 0b:69:b5:f8:b8:17:ee:88:df:39:bf:e7:37:41:49:83: 8f:81:8c:0e:4f:42:67:e8:f9:6a:79:80:c4:e4:0c:7a: 0f:ab:d3:74:60:13:9f:3e:30:cf:0c:e7:b1:09:81:df: e2:32:34:13:5f:b4:19:1f:8f:08:72:77:bf:09:d9:54: 89:52:54:f6:8b:5e:1a:09:5c:68:ab:58:1e:70:f1:b1: 79:36:0a:e8:17:9c:4a:d3:dc:6a:42:e1:ab:11:12:6d: 57:cc:fa:1b:1b:8c:1e:4f:98:73:38:3a:77:db:88:90: a6:59:76:6d:6a:37:23:3d:ac:7b:c7:d9:65:40:8b:09 Fingerprint (SHA-256): 45:9B:92:86:C5:65:55:03:36:B9:F4:1A:4D:9D:C4:80:F2:58:15:CF:4A:C9:01:71:6A:6B:E5:71:B5:43:97:12 Fingerprint (SHA1): 10:45:62:74:14:55:B9:B3:02:54:A1:0B:6D:5A:D7:DE:93:C6:33:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12190: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125961 (0x1e67e789) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 13:08:23 2017 Not After : Tue May 10 13:08:23 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:35:04:c6:c8:cb:f9:49:89:c5:1c:82:23:8d:9e:96: b2:e6:d6:39:7e:34:7a:17:37:3a:2a:3c:97:67:14:b2: 66:3d:e8:ed:2a:21:ba:ec:e2:7f:cc:2e:16:b2:c7:a9: a9:75:18:59:59:c6:fb:95:69:33:6f:b0:27:f3:4c:56: 9b:3c:90:6b:9b:95:2f:37:ee:6b:75:0b:64:5a:59:04: 58:7d:80:d8:8d:fd:9b:88:55:58:4e:b2:4a:4d:a9:0c: 2e:5f:cc:af:7c:ae:e1:34:84:23:6b:29:2c:56:ca:29: 57:e9:1d:ca:02:fc:75:f0:50:89:b3:28:7b:3a:2e:4e: 64:83:b4:6b:02:a9:cc:5f:ee:fa:62:fd:d8:63:6a:fd: 89:30:ec:37:f7:20:1e:71:a6:3e:18:c2:04:67:e1:ae: b1:3a:ff:b8:20:04:8c:11:6d:98:f6:6b:a8:67:9a:6c: 4d:4b:9a:4d:2d:db:7a:a1:88:d1:07:a7:87:5c:33:81: 1a:5f:a7:ac:6e:99:53:f5:a7:a8:d7:5c:66:86:cf:e0: 19:fb:b6:0c:e3:1e:d5:28:88:04:e0:77:01:ee:38:37: f0:ca:09:f2:48:75:8b:56:65:b5:89:1f:4f:d1:dd:11: c4:96:a8:71:78:2c:a3:2e:e0:37:74:72:44:c2:e4:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:f3:96:95:ba:45:cc:c7:83:53:c4:e2:d7:36:f6:6a: fb:a1:4c:af:f5:54:1b:50:c6:b5:72:f9:db:9f:16:e2: 17:8e:28:54:a1:70:5d:93:e3:a0:f7:a4:1f:1a:cf:e9: e3:b7:75:49:86:56:cc:35:ea:60:71:5c:d4:38:c7:5f: c5:08:c7:cd:da:af:10:a7:66:7d:7a:63:ce:6b:6b:60: 31:26:a5:40:d1:a9:08:5e:64:e6:c0:b3:dc:0f:98:fe: b9:c8:be:e5:16:9e:40:07:98:5c:5e:0a:27:0a:f0:e7: 19:58:22:bb:80:ce:06:7f:cb:9e:b1:3a:35:5c:31:07: 0b:69:b5:f8:b8:17:ee:88:df:39:bf:e7:37:41:49:83: 8f:81:8c:0e:4f:42:67:e8:f9:6a:79:80:c4:e4:0c:7a: 0f:ab:d3:74:60:13:9f:3e:30:cf:0c:e7:b1:09:81:df: e2:32:34:13:5f:b4:19:1f:8f:08:72:77:bf:09:d9:54: 89:52:54:f6:8b:5e:1a:09:5c:68:ab:58:1e:70:f1:b1: 79:36:0a:e8:17:9c:4a:d3:dc:6a:42:e1:ab:11:12:6d: 57:cc:fa:1b:1b:8c:1e:4f:98:73:38:3a:77:db:88:90: a6:59:76:6d:6a:37:23:3d:ac:7b:c7:d9:65:40:8b:09 Fingerprint (SHA-256): 45:9B:92:86:C5:65:55:03:36:B9:F4:1A:4D:9D:C4:80:F2:58:15:CF:4A:C9:01:71:6A:6B:E5:71:B5:43:97:12 Fingerprint (SHA1): 10:45:62:74:14:55:B9:B3:02:54:A1:0B:6D:5A:D7:DE:93:C6:33:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12191: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #12192: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125968 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12193: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #12194: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #12195: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125969 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12196: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #12197: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #12198: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12199: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 510125970 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12200: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12201: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #12202: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12203: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 510125971 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12204: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12205: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #12206: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12207: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 510125972 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #12208: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12209: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 510125973 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #12210: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12211: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #12212: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #12213: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12214: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 510125974 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12215: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12216: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #12217: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12218: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 510125975 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12219: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12220: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #12221: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12222: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510125976 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12223: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12224: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #12225: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12226: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 510125977 --extCP < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12227: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12228: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12229: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125968 (0x1e67e790) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed May 10 13:08:37 2017 Not After : Tue May 10 13:08:37 2067 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:8c:3f:b1:ad:65:76:14:9f:7e:49:52:e0:e5:7b:3a: 16:86:e4:e8:f9:cb:ab:28:d7:57:9d:3d:50:2c:7e:a0: c5:07:40:ed:ed:f8:6c:b9:97:6e:84:31:72:31:b0:27: 34:7d:64:da:1d:ea:2e:ee:e5:cd:d3:c5:0d:87:63:d0: b6:13:37:96:a4:7d:e8:69:cd:fa:8f:0e:ba:9a:8a:a1: 03:d2:7f:25:5f:7a:9a:27:fc:60:80:04:d3:03:f1:15: 3e:c9:0f:35:d5:b8:bc:67:28:cc:89:4f:67:fb:01:84: 5b:87:80:04:ea:c4:6b:99:71:ec:6d:4d:b0:ef:d9:cb: 89:f2:b8:0c:f5:ce:4c:d0:f9:3f:5f:10:5b:4c:50:2b: de:22:dd:d6:66:4d:02:57:c7:8c:88:42:83:98:48:73: ca:fe:a3:19:e8:cc:13:7a:04:12:d9:e5:b9:1f:17:13: fb:12:3c:f8:28:87:02:5e:48:17:89:d5:76:91:39:7c: db:3d:d2:48:ec:00:bc:a4:66:0e:e4:b7:6f:1e:b0:a3: 02:44:9a:5e:7d:e8:dd:85:3c:07:37:87:e6:8a:ce:f7: 1c:b0:15:e3:91:49:28:ef:ae:60:42:5a:7a:73:63:24: ad:c5:3e:c6:47:7e:e7:97:34:bb:2f:48:40:c1:41:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:24:d0:dd:d5:65:ba:7e:f4:ea:4e:b1:af:d2:cd:a6: df:68:5d:b9:2c:f8:4c:86:f1:28:42:6d:06:03:28:bc: 83:70:d0:f3:7e:d6:b1:72:f3:e3:ec:0a:32:5e:bd:76: 7b:01:04:1a:6b:81:f7:4f:1b:53:ee:2e:3d:e4:2b:f9: 05:b8:90:5c:31:00:00:e5:87:3b:9e:2c:dd:f2:6a:0e: 85:c4:24:ca:dd:b4:39:b9:88:c7:a3:bc:d8:11:36:cd: fe:f2:4a:08:2d:bb:0f:e0:6a:19:09:36:00:9a:c1:71: 9d:e4:f9:27:07:3b:fb:fb:fd:c5:9d:a1:12:49:9b:ef: 34:f7:a8:5b:b4:c1:15:02:e7:b8:12:d3:3f:02:9d:63: b8:cb:89:d6:07:37:0e:af:30:28:fa:da:f3:7e:b6:92: 79:6b:16:a2:4b:cf:d4:f4:45:5e:0f:a3:67:0b:18:4d: d4:34:98:47:9c:ad:aa:1d:91:2d:7b:b0:70:d1:4d:4a: 9e:6d:fa:78:61:d6:c2:f6:88:2f:db:9b:63:38:a6:b0: e6:3b:35:eb:16:52:ae:41:56:84:5c:a9:7e:74:b0:91: 59:c5:c4:f0:22:02:d3:ba:c1:e9:0e:7d:10:11:1e:b3: 6d:23:6d:30:3d:8a:f4:7b:04:72:ac:08:f7:29:5a:64 Fingerprint (SHA-256): 0F:79:FB:49:FA:F9:73:66:9F:0C:D8:45:9D:B6:6C:94:E1:D8:D4:2B:2B:43:B8:67:41:78:EA:96:4E:F0:C7:C6 Fingerprint (SHA1): 6A:D0:30:38:3E:08:17:7A:89:5A:33:E2:C6:9D:3C:FC:84:DD:38:80 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #12230: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12231: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12232: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12233: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12234: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12235: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12236: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12237: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12238: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125969 (0x1e67e791) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed May 10 13:08:39 2017 Not After : Tue May 10 13:08:39 2067 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:3b:d6:93:ef:a1:4b:87:c6:39:4a:bd:b5:31:d5:ed: 97:0a:f7:3f:67:59:a1:4f:e6:7e:06:6d:a1:54:c8:f2: 98:51:a1:b1:13:96:3a:69:e2:a1:9f:75:2e:26:63:08: 1c:94:21:97:c0:6c:97:5f:c0:2f:a6:c1:2d:0f:1b:59: 07:17:35:b1:2a:f5:50:7c:57:65:e4:4f:6d:3b:3a:f4: 6b:f9:5b:cf:44:cd:49:b3:9c:ad:88:89:0a:c9:67:9f: a7:96:59:e8:8e:1c:c3:5a:0a:67:d2:56:cd:54:9b:df: a9:65:00:67:30:87:81:97:a9:1f:aa:f2:a9:19:5e:31: c2:c8:c3:ad:1d:2f:79:2f:a8:c1:72:08:8f:ae:71:ad: 94:b0:54:37:64:c9:a4:02:79:4b:67:91:db:7f:78:18: 0b:55:71:3d:a5:30:dd:a9:d1:8f:ce:b3:e9:e1:e1:9e: ae:00:3e:89:00:14:37:a9:d3:2f:b9:db:ed:b9:25:d6: 22:9b:04:fb:89:6f:e8:c3:e2:5f:0e:37:1d:b2:9b:c2: 21:01:b6:9f:6a:88:49:6b:e7:fa:41:43:37:67:53:d0: 13:6c:2a:4b:b7:db:a8:98:0f:a5:a5:6e:16:7c:84:5d: 22:45:b7:c3:1b:bb:3c:67:b6:32:44:b7:d5:7e:80:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:bf:64:55:fd:9b:c1:81:45:1f:40:31:11:32:4c:a8: da:4d:95:17:09:dc:fb:45:3a:09:11:25:29:ad:70:6e: d6:55:f5:4e:57:a7:04:47:bc:eb:78:90:8f:56:d2:88: 58:fd:7e:1d:de:7b:c0:b0:b8:9d:3f:82:46:04:9e:7d: 5f:6c:2f:35:14:ed:02:eb:8f:9f:05:7a:a1:84:25:09: 43:48:31:e7:f9:d8:3c:4d:c4:e8:67:68:17:fa:66:7c: 39:7b:37:93:72:a8:18:a6:f4:5e:dd:90:5a:57:24:57: a0:99:21:28:b5:3d:54:69:a1:9f:23:d5:54:56:de:65: 87:9d:03:33:5c:57:7b:88:0e:18:ff:fe:a7:79:00:97: 44:d8:a9:70:de:08:7e:37:8f:ff:39:eb:dd:7d:22:6f: 83:ae:33:c3:6a:9f:4a:4e:c4:2d:c8:4b:8c:6a:a6:3d: e5:5b:77:fb:b6:b6:48:76:fb:a8:ee:9c:2f:40:14:c3: ef:45:ab:9c:04:43:71:1e:40:dc:e9:84:a4:d4:f6:f0: 5d:1f:34:34:6c:06:26:bb:10:ed:73:28:28:c2:a8:aa: 1c:17:40:de:c4:92:6f:f5:ba:97:1b:33:59:ea:a2:b6: 80:99:7c:c6:8f:b1:5e:15:66:92:53:8e:f9:1a:f2:68 Fingerprint (SHA-256): D5:7F:F5:88:65:62:C3:B0:69:1A:BC:05:F1:89:A4:EB:9D:57:78:9D:38:02:9C:1E:7D:33:01:2A:A5:A7:27:3C Fingerprint (SHA1): 61:70:50:C1:A2:2B:72:77:FE:A1:79:5E:77:DD:9E:DA:43:17:89:FE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #12239: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12240: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12241: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12242: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12243: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12244: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #12245: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #12246: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #12247: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #12248: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #12249: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #12250: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #12251: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #12252: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #12253: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #12254: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #12255: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #12256: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #12257: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125978 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12258: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #12259: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #12260: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12261: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 510125979 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12262: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12263: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #12264: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12265: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 510125980 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12266: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12267: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #12268: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12269: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 510125981 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12270: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12271: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #12272: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12273: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 510125982 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12274: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12275: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #12276: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12277: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 510125983 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12278: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12279: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #12280: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12281: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 510125984 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12282: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12283: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #12284: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12285: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 510125985 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12286: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12287: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #12288: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12289: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 510125986 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12290: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12291: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #12292: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125978 (0x1e67e79a) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:09:03 2017 Not After : Tue May 10 13:09:03 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 08:29:3d:52:68:ef:a1:73:c2:54:72:c7:67:1f:44:55: a2:77:60:f1:ab:7c:09:5f:14:bf:c9:d1:86:09:02:cb: 5d:b1:8b:7a:9b:9e:28:54:02:67:e4:18:16:c7:8a:7f: 07:e7:e8:f1:4b:e1:a4:8b:ec:1b:d2:f7:db:3b:7a:e5: 56:5c:d1:52:ed:a8:e6:de:1a:82:ec:0c:1b:19:68:de: 8d:ca:6f:3a:97:47:c9:e8:03:c1:03:a6:80:2d:4a:9f: 6f:d5:af:44:8a:3d:b2:68:b1:23:2f:2e:ac:42:57:ce: b7:c9:fb:99:34:6b:6a:94:88:a5:e6:0b:cc:bf:9a:e4: 27:56:62:fb:a5:40:d2:b6:ea:44:a2:9c:8f:ce:69:09: 41:d4:e0:c4:a4:44:fd:e1:43:e2:12:39:2d:36:9d:ff: 00:b0:05:7b:78:bf:4e:ea:85:24:bd:65:50:9f:f8:f0: e5:63:31:46:33:e0:20:1a:7a:af:b8:ab:b4:74:e7:c5: 6e:e5:02:4d:08:45:e9:b4:8b:b1:f9:89:b6:b3:de:b0: b4:c5:91:89:ae:f9:13:a5:cc:c1:7a:36:1d:65:7d:f6: 79:cc:56:21:a5:6b:cf:74:be:a8:94:62:e6:6d:88:6d: 5c:3f:43:e8:37:1b:b9:19:7b:7e:d0:63:39:60:79:bc Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:16:72:7d:df:12:b3:05:48:ce:89:01:3e: c4:41:46:5b:64:d1:c8:c0:0c:47:93:b1:01:4d:9f:00: 02:1d:00:c2:f6:02:f7:b0:70:44:24:2e:d3:38:64:70: 35:76:42:ca:cf:5d:9a:0d:f9:b2:51:23:d2:38:fa Fingerprint (SHA-256): 19:CF:05:78:FF:81:54:8F:D4:DF:59:76:BB:38:3A:E9:08:E9:33:0F:4A:72:CE:47:83:9E:AE:BB:5A:31:F5:40 Fingerprint (SHA1): 87:6C:6F:2C:7E:94:CF:72:65:CA:9E:4B:74:D8:18:3E:47:19:2F:3E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12293: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125978 (0x1e67e79a) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:09:03 2017 Not After : Tue May 10 13:09:03 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 08:29:3d:52:68:ef:a1:73:c2:54:72:c7:67:1f:44:55: a2:77:60:f1:ab:7c:09:5f:14:bf:c9:d1:86:09:02:cb: 5d:b1:8b:7a:9b:9e:28:54:02:67:e4:18:16:c7:8a:7f: 07:e7:e8:f1:4b:e1:a4:8b:ec:1b:d2:f7:db:3b:7a:e5: 56:5c:d1:52:ed:a8:e6:de:1a:82:ec:0c:1b:19:68:de: 8d:ca:6f:3a:97:47:c9:e8:03:c1:03:a6:80:2d:4a:9f: 6f:d5:af:44:8a:3d:b2:68:b1:23:2f:2e:ac:42:57:ce: b7:c9:fb:99:34:6b:6a:94:88:a5:e6:0b:cc:bf:9a:e4: 27:56:62:fb:a5:40:d2:b6:ea:44:a2:9c:8f:ce:69:09: 41:d4:e0:c4:a4:44:fd:e1:43:e2:12:39:2d:36:9d:ff: 00:b0:05:7b:78:bf:4e:ea:85:24:bd:65:50:9f:f8:f0: e5:63:31:46:33:e0:20:1a:7a:af:b8:ab:b4:74:e7:c5: 6e:e5:02:4d:08:45:e9:b4:8b:b1:f9:89:b6:b3:de:b0: b4:c5:91:89:ae:f9:13:a5:cc:c1:7a:36:1d:65:7d:f6: 79:cc:56:21:a5:6b:cf:74:be:a8:94:62:e6:6d:88:6d: 5c:3f:43:e8:37:1b:b9:19:7b:7e:d0:63:39:60:79:bc Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:16:72:7d:df:12:b3:05:48:ce:89:01:3e: c4:41:46:5b:64:d1:c8:c0:0c:47:93:b1:01:4d:9f:00: 02:1d:00:c2:f6:02:f7:b0:70:44:24:2e:d3:38:64:70: 35:76:42:ca:cf:5d:9a:0d:f9:b2:51:23:d2:38:fa Fingerprint (SHA-256): 19:CF:05:78:FF:81:54:8F:D4:DF:59:76:BB:38:3A:E9:08:E9:33:0F:4A:72:CE:47:83:9E:AE:BB:5A:31:F5:40 Fingerprint (SHA1): 87:6C:6F:2C:7E:94:CF:72:65:CA:9E:4B:74:D8:18:3E:47:19:2F:3E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #12294: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125978 (0x1e67e79a) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:09:03 2017 Not After : Tue May 10 13:09:03 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 08:29:3d:52:68:ef:a1:73:c2:54:72:c7:67:1f:44:55: a2:77:60:f1:ab:7c:09:5f:14:bf:c9:d1:86:09:02:cb: 5d:b1:8b:7a:9b:9e:28:54:02:67:e4:18:16:c7:8a:7f: 07:e7:e8:f1:4b:e1:a4:8b:ec:1b:d2:f7:db:3b:7a:e5: 56:5c:d1:52:ed:a8:e6:de:1a:82:ec:0c:1b:19:68:de: 8d:ca:6f:3a:97:47:c9:e8:03:c1:03:a6:80:2d:4a:9f: 6f:d5:af:44:8a:3d:b2:68:b1:23:2f:2e:ac:42:57:ce: b7:c9:fb:99:34:6b:6a:94:88:a5:e6:0b:cc:bf:9a:e4: 27:56:62:fb:a5:40:d2:b6:ea:44:a2:9c:8f:ce:69:09: 41:d4:e0:c4:a4:44:fd:e1:43:e2:12:39:2d:36:9d:ff: 00:b0:05:7b:78:bf:4e:ea:85:24:bd:65:50:9f:f8:f0: e5:63:31:46:33:e0:20:1a:7a:af:b8:ab:b4:74:e7:c5: 6e:e5:02:4d:08:45:e9:b4:8b:b1:f9:89:b6:b3:de:b0: b4:c5:91:89:ae:f9:13:a5:cc:c1:7a:36:1d:65:7d:f6: 79:cc:56:21:a5:6b:cf:74:be:a8:94:62:e6:6d:88:6d: 5c:3f:43:e8:37:1b:b9:19:7b:7e:d0:63:39:60:79:bc Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:16:72:7d:df:12:b3:05:48:ce:89:01:3e: c4:41:46:5b:64:d1:c8:c0:0c:47:93:b1:01:4d:9f:00: 02:1d:00:c2:f6:02:f7:b0:70:44:24:2e:d3:38:64:70: 35:76:42:ca:cf:5d:9a:0d:f9:b2:51:23:d2:38:fa Fingerprint (SHA-256): 19:CF:05:78:FF:81:54:8F:D4:DF:59:76:BB:38:3A:E9:08:E9:33:0F:4A:72:CE:47:83:9E:AE:BB:5A:31:F5:40 Fingerprint (SHA1): 87:6C:6F:2C:7E:94:CF:72:65:CA:9E:4B:74:D8:18:3E:47:19:2F:3E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #12295: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125978 (0x1e67e79a) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:09:03 2017 Not After : Tue May 10 13:09:03 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 08:29:3d:52:68:ef:a1:73:c2:54:72:c7:67:1f:44:55: a2:77:60:f1:ab:7c:09:5f:14:bf:c9:d1:86:09:02:cb: 5d:b1:8b:7a:9b:9e:28:54:02:67:e4:18:16:c7:8a:7f: 07:e7:e8:f1:4b:e1:a4:8b:ec:1b:d2:f7:db:3b:7a:e5: 56:5c:d1:52:ed:a8:e6:de:1a:82:ec:0c:1b:19:68:de: 8d:ca:6f:3a:97:47:c9:e8:03:c1:03:a6:80:2d:4a:9f: 6f:d5:af:44:8a:3d:b2:68:b1:23:2f:2e:ac:42:57:ce: b7:c9:fb:99:34:6b:6a:94:88:a5:e6:0b:cc:bf:9a:e4: 27:56:62:fb:a5:40:d2:b6:ea:44:a2:9c:8f:ce:69:09: 41:d4:e0:c4:a4:44:fd:e1:43:e2:12:39:2d:36:9d:ff: 00:b0:05:7b:78:bf:4e:ea:85:24:bd:65:50:9f:f8:f0: e5:63:31:46:33:e0:20:1a:7a:af:b8:ab:b4:74:e7:c5: 6e:e5:02:4d:08:45:e9:b4:8b:b1:f9:89:b6:b3:de:b0: b4:c5:91:89:ae:f9:13:a5:cc:c1:7a:36:1d:65:7d:f6: 79:cc:56:21:a5:6b:cf:74:be:a8:94:62:e6:6d:88:6d: 5c:3f:43:e8:37:1b:b9:19:7b:7e:d0:63:39:60:79:bc Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:16:72:7d:df:12:b3:05:48:ce:89:01:3e: c4:41:46:5b:64:d1:c8:c0:0c:47:93:b1:01:4d:9f:00: 02:1d:00:c2:f6:02:f7:b0:70:44:24:2e:d3:38:64:70: 35:76:42:ca:cf:5d:9a:0d:f9:b2:51:23:d2:38:fa Fingerprint (SHA-256): 19:CF:05:78:FF:81:54:8F:D4:DF:59:76:BB:38:3A:E9:08:E9:33:0F:4A:72:CE:47:83:9E:AE:BB:5A:31:F5:40 Fingerprint (SHA1): 87:6C:6F:2C:7E:94:CF:72:65:CA:9E:4B:74:D8:18:3E:47:19:2F:3E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #12296: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #12297: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 10 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12298: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #12299: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #12300: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12301: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12302: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12303: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #12304: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12305: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12306: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12307: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #12308: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12309: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12310: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12311: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #12312: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12313: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12314: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12315: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #12316: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12317: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12318: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12319: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #12320: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12321: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12322: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12323: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20170510130937Z nextupdate=20180510130937Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed May 10 13:09:37 2017 Next Update: Thu May 10 13:09:37 2018 CRL Extensions: chains.sh: #12324: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510130937Z nextupdate=20180510130937Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 13:09:37 2017 Next Update: Thu May 10 13:09:37 2018 CRL Extensions: chains.sh: #12325: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170510130938Z nextupdate=20180510130938Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed May 10 13:09:38 2017 Next Update: Thu May 10 13:09:38 2018 CRL Extensions: chains.sh: #12326: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20170510130938Z nextupdate=20180510130938Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed May 10 13:09:38 2017 Next Update: Thu May 10 13:09:38 2018 CRL Extensions: chains.sh: #12327: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170510130939Z addcert 14 20170510130939Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed May 10 13:09:39 2017 Next Update: Thu May 10 13:09:38 2018 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Wed May 10 13:09:39 2017 CRL Extensions: chains.sh: #12328: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510130940Z addcert 15 20170510130940Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 13:09:40 2017 Next Update: Thu May 10 13:09:37 2018 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Wed May 10 13:09:40 2017 CRL Extensions: chains.sh: #12329: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #12330: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12331: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #12332: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #12333: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #12334: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #12335: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #12336: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #12337: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #12338: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:09:24 2017 Not After : Tue May 10 13:09:24 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:a2:a5:80:cb:be:5b:46:1c:1f:e8:51:82:2b:e4:67: 82:93:43:75:14:69:ce:cd:53:70:83:49:4c:b3:5f:40: cc:d5:24:39:48:fc:d0:da:dd:53:32:2e:82:34:e9:fc: d5:0e:b2:c6:d3:72:89:e5:d5:61:a1:7d:fb:5d:6b:60: ed:a6:31:d3:d6:b1:c6:1e:bd:32:1e:79:b0:16:29:05: 1a:c2:09:e4:67:f2:0f:73:02:b3:1c:65:ef:35:b6:ec: fa:4c:2f:2c:3c:c8:2a:0c:4c:e6:de:38:50:95:11:45: 79:1f:53:a2:d9:ad:ba:28:41:11:fc:80:b9:42:13:99: bb:62:c4:c2:a8:ea:15:52:9c:f1:49:6f:51:17:b9:fb: fb:23:d4:87:aa:51:2a:03:d6:cf:4c:38:81:f5:d8:c1: 79:07:c1:7f:27:2a:a9:a2:51:65:12:74:0d:c0:bc:16: 4d:57:b4:86:27:f5:4f:88:63:b2:66:b7:c0:bd:09:3e: ce:29:b3:1c:23:fe:88:2d:ec:40:37:78:96:6e:b0:38: c1:f3:6f:d6:58:39:51:8f:03:7c:01:d7:53:42:23:c1: 93:00:42:33:47:8b:ce:d4:d4:a2:3c:7e:ae:8d:ec:51: 3c:e4:66:55:11:4f:00:de:bf:f2:5f:cd:f4:fe:18:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:b4:0a:12:53:4e:89:22:c9:9b:e5:78:e2:65:7b:3e: 66:3c:7f:d3:ee:34:70:12:77:2f:2c:ed:7b:7d:09:5c: 67:11:a3:70:5a:5d:fa:5c:bc:34:7a:78:de:a0:1c:c6: 70:bc:d6:d0:ff:09:db:76:09:fe:ea:17:77:5d:59:7e: 26:23:dc:ae:bd:e0:30:c0:f2:5f:1b:fa:6c:98:05:66: 02:fc:e2:c4:81:78:16:56:08:a2:84:01:0c:de:b0:2f: 8d:88:48:1c:4d:e3:1a:93:fd:3e:c9:85:81:36:23:f1: 78:6f:3f:fc:48:92:ab:1d:3b:2b:6e:28:28:3b:03:0d: 75:0c:62:b3:c1:ce:bb:fb:72:ef:17:28:8f:0f:d0:46: 16:15:ce:8f:23:95:d2:1b:a1:27:dc:0f:ce:96:02:a7: de:66:1c:33:3b:35:7e:b4:b7:5f:cd:ec:ac:32:f1:83: 10:4d:aa:5c:c3:05:f8:30:69:23:4c:da:15:ef:f1:6f: 4b:c3:a9:54:58:28:75:8f:c6:3b:56:3c:56:d9:5f:64: ec:03:ce:e0:fe:5e:00:de:7e:72:88:7a:7b:4f:54:3c: d4:cc:d0:11:6f:2f:e7:76:fa:5f:12:26:96:dc:8d:b2: 0b:46:23:42:e6:89:33:b7:17:29:fd:bf:2e:86:bd:87 Fingerprint (SHA-256): E3:A0:FD:7A:39:F9:9A:F3:C0:8D:3C:81:8E:9A:12:A7:39:8D:D9:AA:CC:7E:98:8E:6E:23:98:E6:E9:84:F2:B0 Fingerprint (SHA1): 32:AA:D8:0D:F0:9A:FB:FD:E4:EE:E5:60:47:91:1B:20:28:32:29:89 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #12339: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #12340: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:09:24 2017 Not After : Tue May 10 13:09:24 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:a2:a5:80:cb:be:5b:46:1c:1f:e8:51:82:2b:e4:67: 82:93:43:75:14:69:ce:cd:53:70:83:49:4c:b3:5f:40: cc:d5:24:39:48:fc:d0:da:dd:53:32:2e:82:34:e9:fc: d5:0e:b2:c6:d3:72:89:e5:d5:61:a1:7d:fb:5d:6b:60: ed:a6:31:d3:d6:b1:c6:1e:bd:32:1e:79:b0:16:29:05: 1a:c2:09:e4:67:f2:0f:73:02:b3:1c:65:ef:35:b6:ec: fa:4c:2f:2c:3c:c8:2a:0c:4c:e6:de:38:50:95:11:45: 79:1f:53:a2:d9:ad:ba:28:41:11:fc:80:b9:42:13:99: bb:62:c4:c2:a8:ea:15:52:9c:f1:49:6f:51:17:b9:fb: fb:23:d4:87:aa:51:2a:03:d6:cf:4c:38:81:f5:d8:c1: 79:07:c1:7f:27:2a:a9:a2:51:65:12:74:0d:c0:bc:16: 4d:57:b4:86:27:f5:4f:88:63:b2:66:b7:c0:bd:09:3e: ce:29:b3:1c:23:fe:88:2d:ec:40:37:78:96:6e:b0:38: c1:f3:6f:d6:58:39:51:8f:03:7c:01:d7:53:42:23:c1: 93:00:42:33:47:8b:ce:d4:d4:a2:3c:7e:ae:8d:ec:51: 3c:e4:66:55:11:4f:00:de:bf:f2:5f:cd:f4:fe:18:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:b4:0a:12:53:4e:89:22:c9:9b:e5:78:e2:65:7b:3e: 66:3c:7f:d3:ee:34:70:12:77:2f:2c:ed:7b:7d:09:5c: 67:11:a3:70:5a:5d:fa:5c:bc:34:7a:78:de:a0:1c:c6: 70:bc:d6:d0:ff:09:db:76:09:fe:ea:17:77:5d:59:7e: 26:23:dc:ae:bd:e0:30:c0:f2:5f:1b:fa:6c:98:05:66: 02:fc:e2:c4:81:78:16:56:08:a2:84:01:0c:de:b0:2f: 8d:88:48:1c:4d:e3:1a:93:fd:3e:c9:85:81:36:23:f1: 78:6f:3f:fc:48:92:ab:1d:3b:2b:6e:28:28:3b:03:0d: 75:0c:62:b3:c1:ce:bb:fb:72:ef:17:28:8f:0f:d0:46: 16:15:ce:8f:23:95:d2:1b:a1:27:dc:0f:ce:96:02:a7: de:66:1c:33:3b:35:7e:b4:b7:5f:cd:ec:ac:32:f1:83: 10:4d:aa:5c:c3:05:f8:30:69:23:4c:da:15:ef:f1:6f: 4b:c3:a9:54:58:28:75:8f:c6:3b:56:3c:56:d9:5f:64: ec:03:ce:e0:fe:5e:00:de:7e:72:88:7a:7b:4f:54:3c: d4:cc:d0:11:6f:2f:e7:76:fa:5f:12:26:96:dc:8d:b2: 0b:46:23:42:e6:89:33:b7:17:29:fd:bf:2e:86:bd:87 Fingerprint (SHA-256): E3:A0:FD:7A:39:F9:9A:F3:C0:8D:3C:81:8E:9A:12:A7:39:8D:D9:AA:CC:7E:98:8E:6E:23:98:E6:E9:84:F2:B0 Fingerprint (SHA1): 32:AA:D8:0D:F0:9A:FB:FD:E4:EE:E5:60:47:91:1B:20:28:32:29:89 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #12341: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #12342: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #12343: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125987 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12344: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #12345: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #12346: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12347: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 510125988 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12348: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12349: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #12350: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510125759.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #12351: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0Root-510125733.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12352: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12353: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #12354: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510125759.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #12355: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 510125989 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12356: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12357: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #12358: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510125759.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #12359: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0Root-510125734.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12360: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12361: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #12362: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12363: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 510125990 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12364: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12365: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #12366: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510125759.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #12367: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0Root-510125735.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12368: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12369: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #12370: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0-510125759.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #12371: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9218/localhost-1556-CA0Root-510125736.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12372: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12373: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20170510131003Z nextupdate=20180510131003Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed May 10 13:10:03 2017 Next Update: Thu May 10 13:10:03 2018 CRL Extensions: chains.sh: #12374: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510131003Z nextupdate=20180510131003Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 13:10:03 2017 Next Update: Thu May 10 13:10:03 2018 CRL Extensions: chains.sh: #12375: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20170510131003Z nextupdate=20180510131003Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed May 10 13:10:03 2017 Next Update: Thu May 10 13:10:03 2018 CRL Extensions: chains.sh: #12376: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20170510131004Z nextupdate=20180510131004Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed May 10 13:10:04 2017 Next Update: Thu May 10 13:10:04 2018 CRL Extensions: chains.sh: #12377: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510131005Z addcert 20 20170510131005Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 13:10:05 2017 Next Update: Thu May 10 13:10:03 2018 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed May 10 13:10:05 2017 CRL Extensions: chains.sh: #12378: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20170510131006Z addcert 40 20170510131006Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed May 10 13:10:06 2017 Next Update: Thu May 10 13:10:03 2018 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed May 10 13:10:05 2017 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Wed May 10 13:10:06 2017 CRL Extensions: chains.sh: #12379: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #12380: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12381: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #12382: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125987 (0x1e67e7a3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:09:45 2017 Not After : Tue May 10 13:09:45 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:70:bf:8a:83:00:f2:ad:b4:e3:a1:e0:31:1a:12:25: 7a:70:00:91:c9:c1:c9:91:94:d2:93:86:5d:07:7f:01: 30:8d:19:d6:93:ff:85:d4:4d:51:a7:70:c5:6c:e0:f4: 7a:31:4f:6f:e5:0f:ab:f9:bb:78:ef:08:08:73:43:96: 39:18:af:a0:f1:42:30:2d:a4:34:4c:b8:a3:21:2a:ab: 82:50:71:15:3f:54:d7:75:b1:88:68:3c:01:82:e6:34: d1:24:51:5f:e0:f6:e2:67:49:28:0f:7a:46:ed:38:b9: 35:94:7b:33:f3:80:7e:54:de:e0:02:d0:ce:29:42:e0: 17:6c:20:49:13:7e:bf:3a:e2:e9:61:57:50:42:85:7b: 59:7e:92:50:f3:6f:e3:bc:3d:af:c5:90:a6:39:68:a4: d2:6f:49:10:ad:a4:69:91:77:68:9b:c6:70:8c:ab:3b: a4:14:a0:a1:d2:1e:6d:f3:cc:78:a6:87:e0:03:a6:89: 38:b0:78:78:10:16:f3:25:2d:d6:22:ba:44:28:3d:7a: 28:9d:e7:37:92:d4:32:86:eb:49:42:04:17:74:6a:3e: f6:05:e8:8b:68:4e:de:f9:14:c0:96:83:a5:50:c3:79: 3f:8c:2e:80:32:a7:0c:32:35:8d:d0:e0:4b:0d:e2:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:ea:8e:93:4a:48:2e:48:bc:8d:16:0a:b4:7b:a3:d3: 64:88:de:90:11:0d:4e:ca:eb:a2:3e:c5:5b:c4:8b:70: b4:f7:93:6e:ec:28:bb:94:fb:87:75:dc:62:e3:7f:29: a5:a8:9c:ba:41:b8:74:7b:6e:a4:47:4f:b8:cc:77:b5: 50:38:a8:f7:d7:16:79:bb:cb:67:37:d0:58:ea:ea:cd: 50:c4:96:b8:da:2a:8b:f0:03:b8:7d:74:09:14:93:0f: 3c:b7:67:22:bb:e2:ca:66:59:51:8d:de:44:0c:f6:e7: 4c:38:dc:fe:0c:66:40:40:72:5b:50:0d:da:c4:cd:4d: 34:81:b4:cb:f0:58:f8:b8:81:df:87:ec:6b:e9:20:cd: 4c:19:b7:4b:56:e7:13:7d:36:a8:a6:0e:f6:96:a5:57: 7a:62:8d:02:b3:56:42:44:29:16:20:50:4e:6a:b4:48: 49:2b:bc:5d:1b:0d:b5:02:13:0d:b4:98:2a:70:c5:d7: d1:34:87:36:6e:41:0a:1b:38:18:95:75:65:3b:80:08: 70:7d:25:5f:a1:53:6b:4a:32:26:d8:f6:57:03:11:77: 81:ec:18:54:db:c3:e5:d1:2d:3e:06:47:2c:59:ec:5f: 59:11:70:8f:8b:87:12:3c:31:9d:99:29:80:9d:5d:57 Fingerprint (SHA-256): F1:34:C8:94:42:63:77:9A:61:74:73:B6:9C:C9:B3:C1:0D:A0:A0:D7:26:CA:28:97:1A:9D:FF:88:06:20:E9:82 Fingerprint (SHA1): 90:43:69:8E:99:13:98:78:12:0C:3F:36:83:B9:5D:CE:36:BC:B7:D6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #12383: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #12384: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125987 (0x1e67e7a3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed May 10 13:09:45 2017 Not After : Tue May 10 13:09:45 2067 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:70:bf:8a:83:00:f2:ad:b4:e3:a1:e0:31:1a:12:25: 7a:70:00:91:c9:c1:c9:91:94:d2:93:86:5d:07:7f:01: 30:8d:19:d6:93:ff:85:d4:4d:51:a7:70:c5:6c:e0:f4: 7a:31:4f:6f:e5:0f:ab:f9:bb:78:ef:08:08:73:43:96: 39:18:af:a0:f1:42:30:2d:a4:34:4c:b8:a3:21:2a:ab: 82:50:71:15:3f:54:d7:75:b1:88:68:3c:01:82:e6:34: d1:24:51:5f:e0:f6:e2:67:49:28:0f:7a:46:ed:38:b9: 35:94:7b:33:f3:80:7e:54:de:e0:02:d0:ce:29:42:e0: 17:6c:20:49:13:7e:bf:3a:e2:e9:61:57:50:42:85:7b: 59:7e:92:50:f3:6f:e3:bc:3d:af:c5:90:a6:39:68:a4: d2:6f:49:10:ad:a4:69:91:77:68:9b:c6:70:8c:ab:3b: a4:14:a0:a1:d2:1e:6d:f3:cc:78:a6:87:e0:03:a6:89: 38:b0:78:78:10:16:f3:25:2d:d6:22:ba:44:28:3d:7a: 28:9d:e7:37:92:d4:32:86:eb:49:42:04:17:74:6a:3e: f6:05:e8:8b:68:4e:de:f9:14:c0:96:83:a5:50:c3:79: 3f:8c:2e:80:32:a7:0c:32:35:8d:d0:e0:4b:0d:e2:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:ea:8e:93:4a:48:2e:48:bc:8d:16:0a:b4:7b:a3:d3: 64:88:de:90:11:0d:4e:ca:eb:a2:3e:c5:5b:c4:8b:70: b4:f7:93:6e:ec:28:bb:94:fb:87:75:dc:62:e3:7f:29: a5:a8:9c:ba:41:b8:74:7b:6e:a4:47:4f:b8:cc:77:b5: 50:38:a8:f7:d7:16:79:bb:cb:67:37:d0:58:ea:ea:cd: 50:c4:96:b8:da:2a:8b:f0:03:b8:7d:74:09:14:93:0f: 3c:b7:67:22:bb:e2:ca:66:59:51:8d:de:44:0c:f6:e7: 4c:38:dc:fe:0c:66:40:40:72:5b:50:0d:da:c4:cd:4d: 34:81:b4:cb:f0:58:f8:b8:81:df:87:ec:6b:e9:20:cd: 4c:19:b7:4b:56:e7:13:7d:36:a8:a6:0e:f6:96:a5:57: 7a:62:8d:02:b3:56:42:44:29:16:20:50:4e:6a:b4:48: 49:2b:bc:5d:1b:0d:b5:02:13:0d:b4:98:2a:70:c5:d7: d1:34:87:36:6e:41:0a:1b:38:18:95:75:65:3b:80:08: 70:7d:25:5f:a1:53:6b:4a:32:26:d8:f6:57:03:11:77: 81:ec:18:54:db:c3:e5:d1:2d:3e:06:47:2c:59:ec:5f: 59:11:70:8f:8b:87:12:3c:31:9d:99:29:80:9d:5d:57 Fingerprint (SHA-256): F1:34:C8:94:42:63:77:9A:61:74:73:B6:9C:C9:B3:C1:0D:A0:A0:D7:26:CA:28:97:1A:9D:FF:88:06:20:E9:82 Fingerprint (SHA1): 90:43:69:8E:99:13:98:78:12:0C:3F:36:83:B9:5D:CE:36:BC:B7:D6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #12385: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #12386: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #12387: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125991 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12388: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #12389: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #12390: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12391: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 510125992 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12392: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12393: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #12394: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12395: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 510125993 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12396: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12397: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #12398: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12399: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 510125994 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12400: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12401: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #12402: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -m 510125995 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12403: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #12404: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #12405: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12406: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 510125996 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12407: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12408: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #12409: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12410: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 510125997 < /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12411: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12412: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #12413: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #12414: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #12415: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125991 (0x1e67e7a7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 13:10:10 2017 Not After : Tue May 10 13:10:10 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:50:7a:28:0e:63:ba:2d:95:b3:f4:71:22:42:f7:24: 64:c7:49:84:22:d1:0b:e8:d2:59:3d:7c:73:4f:69:b1: ca:ab:78:25:82:f9:0b:e5:c6:01:b4:1e:66:e6:2a:8c: 6b:3b:05:1f:e5:05:c3:63:30:58:1c:15:a6:e7:06:28: 35:69:ce:5e:1a:76:66:49:5c:6a:b2:0e:6a:2d:cd:74: a8:45:c7:75:62:37:7a:ca:b4:5f:4c:0e:39:68:35:da: d8:a9:b6:18:b0:ff:a1:f3:b6:23:aa:d4:a6:cf:74:40: 36:f1:ac:95:02:06:bc:d5:cc:34:d2:e6:1c:52:2f:04: c2:7f:92:8b:be:68:7b:a5:33:02:18:d5:ad:31:ed:e9: 9b:06:8f:4a:8a:23:31:9b:56:4c:d3:f8:ab:5b:8e:a9: 06:b1:7b:68:0d:b8:e2:8f:ed:b5:85:5f:42:88:f3:e4: 30:88:7e:b3:39:7d:c4:eb:ca:be:28:8f:7c:5c:fd:4a: 81:2a:17:5d:c2:82:3b:cf:d4:48:cb:da:6b:85:ae:e9: 03:ba:ba:74:12:39:dc:1c:9f:48:83:bc:91:f3:a5:51: 12:e8:fd:2d:8b:37:52:1c:96:eb:32:0f:2a:19:65:01: 63:41:ac:66:07:d1:b8:70:5b:fd:cb:64:9b:88:20:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:a4:e2:8f:3e:b2:df:94:41:42:27:79:78:23:21:6c: cb:16:1e:96:de:d9:de:fc:bb:01:56:77:7b:6c:50:23: 35:b7:ad:c1:c1:f3:1a:86:9f:35:74:32:f9:27:e7:27: 3b:86:88:1b:4c:99:f3:c2:1e:1f:b9:e5:90:4b:8a:a1: 08:82:4c:04:70:b8:fa:48:a2:3e:b8:f2:b2:3c:3a:1d: 5f:fe:c0:f4:54:f7:9c:81:85:04:55:e7:60:9f:42:45: ea:33:68:60:a1:48:5c:e1:fc:4c:fd:ff:45:b3:d1:d1: 22:cd:72:e3:fc:8c:41:e8:2a:89:3d:63:96:21:5f:3c: fe:ed:23:cb:f9:fe:1e:48:87:42:78:ca:da:ca:64:a5: 46:b6:2e:3f:5f:3c:95:b9:97:84:63:9f:e2:60:50:c3: c4:15:d5:a2:ca:25:b7:50:c4:c8:06:ee:c4:46:85:8f: b1:a1:0c:91:3f:dd:89:d0:36:a9:9d:97:48:e5:e7:1d: 7d:b2:ff:28:db:03:26:81:64:39:9e:a9:fe:3b:41:19: 83:b0:bc:30:18:eb:02:fd:69:a2:2c:2f:26:6c:9a:aa: 8d:47:6b:8c:78:94:87:da:0d:ad:12:88:c0:f7:44:5f: 42:2e:18:a4:7f:e5:fb:89:c3:13:e3:a8:ba:48:6f:08 Fingerprint (SHA-256): B1:EC:8D:80:75:C2:F6:A8:3B:F5:48:CD:0D:E5:6F:77:BD:A0:1A:8D:33:8B:3E:AD:21:D8:60:45:39:67:33:63 Fingerprint (SHA1): 94:41:19:E0:0B:1F:3D:F4:16:2D:E9:BF:88:F3:56:58:E5:9F:A8:CA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12416: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125993 (0x1e67e7a9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 13:10:15 2017 Not After : Tue May 10 13:10:15 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:80:74:d9:92:d4:bb:5e:a2:82:80:9f:66:04:88:95: 3c:8b:cd:85:0e:7b:ad:49:5f:d6:b4:2c:92:f1:b7:3b: 54:97:19:40:f7:50:ca:b5:56:b9:12:84:08:f7:5d:76: e8:05:5a:45:51:4c:c7:3a:60:c4:ee:75:03:2f:dc:51: 1e:c0:4a:c7:46:01:83:49:2f:b7:ff:f7:09:bd:18:8a: 06:ba:07:fd:c6:75:bc:0b:fb:9b:04:37:3e:7d:ff:58: 84:8c:2e:22:72:01:bc:4c:86:d6:91:95:e9:c5:2a:cb: 6f:48:c4:9a:45:4a:4a:51:33:39:83:fc:9d:ec:60:39: aa:c5:11:45:2c:45:4e:83:76:da:a6:0a:88:f7:e4:0a: 44:30:43:35:51:d7:85:3f:13:0f:75:4c:0d:60:de:5b: 28:68:a1:c3:4f:13:a6:90:22:25:03:65:ae:99:29:c6: af:b3:92:76:b7:f0:04:d4:f9:f7:ca:29:59:f2:77:23: c2:95:c3:82:f9:11:13:fd:85:41:22:6d:e4:9a:d2:d6: a4:f5:dc:38:cb:dd:aa:29:99:38:74:a0:da:bb:a5:44: c9:6a:bb:72:61:2d:83:26:ff:1d:56:cc:60:60:db:e0: 62:db:94:87:a6:ad:72:a0:50:f9:65:59:14:cc:86:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8a:be:a1:07:42:d1:37:c6:67:6e:29:a5:01:d7:a1:c7: 8b:8e:eb:12:7f:b8:9a:d3:96:e1:ac:df:ce:ff:13:0d: c8:82:06:c2:02:6e:d9:4b:f5:3c:2b:d5:66:18:14:d7: c3:d3:cf:18:b0:f5:f4:62:3f:b9:4e:07:e0:ed:da:98: 1b:c6:ea:c6:2b:71:09:03:54:f0:eb:a5:84:11:c1:be: a0:fd:3c:77:97:8d:ed:83:e1:0d:09:64:aa:de:13:e1: b2:d7:66:5d:2b:e6:93:c6:8b:63:21:97:59:e3:0c:58: 54:dc:66:0e:3b:2c:f5:f3:8e:8d:b8:b2:a0:19:e1:51: 0c:60:4c:bd:d2:88:3f:56:06:87:23:a2:e5:1f:b1:16: 3d:85:43:01:06:b4:43:d4:7c:fe:0e:23:e9:ce:a6:c1: 61:5f:9e:9a:ee:48:06:66:39:b2:a0:2a:00:27:24:cc: f7:b9:76:b8:ac:e5:5f:a8:47:3a:af:98:53:a9:57:52: ab:51:53:d2:63:5d:42:51:14:62:02:f2:2c:85:76:ac: 80:a6:06:8e:4e:f0:da:93:5a:a5:e9:6a:af:26:21:b0: cd:02:d4:25:22:fe:f5:3e:c9:37:12:b2:7f:d6:0d:5f: c7:61:b7:2e:b3:88:28:35:2a:95:55:03:0d:e2:e4:7e Fingerprint (SHA-256): 4F:A4:7C:B7:C4:73:46:D0:ED:8D:D8:E5:12:D5:CB:3A:01:55:38:D1:A3:F3:31:A8:21:46:08:2D:E3:BE:EC:58 Fingerprint (SHA1): EC:C1:D9:08:A7:05:91:72:93:E2:8E:3A:22:91:52:75:6E:2A:50:35 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #12417: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125991 (0x1e67e7a7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 13:10:10 2017 Not After : Tue May 10 13:10:10 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:50:7a:28:0e:63:ba:2d:95:b3:f4:71:22:42:f7:24: 64:c7:49:84:22:d1:0b:e8:d2:59:3d:7c:73:4f:69:b1: ca:ab:78:25:82:f9:0b:e5:c6:01:b4:1e:66:e6:2a:8c: 6b:3b:05:1f:e5:05:c3:63:30:58:1c:15:a6:e7:06:28: 35:69:ce:5e:1a:76:66:49:5c:6a:b2:0e:6a:2d:cd:74: a8:45:c7:75:62:37:7a:ca:b4:5f:4c:0e:39:68:35:da: d8:a9:b6:18:b0:ff:a1:f3:b6:23:aa:d4:a6:cf:74:40: 36:f1:ac:95:02:06:bc:d5:cc:34:d2:e6:1c:52:2f:04: c2:7f:92:8b:be:68:7b:a5:33:02:18:d5:ad:31:ed:e9: 9b:06:8f:4a:8a:23:31:9b:56:4c:d3:f8:ab:5b:8e:a9: 06:b1:7b:68:0d:b8:e2:8f:ed:b5:85:5f:42:88:f3:e4: 30:88:7e:b3:39:7d:c4:eb:ca:be:28:8f:7c:5c:fd:4a: 81:2a:17:5d:c2:82:3b:cf:d4:48:cb:da:6b:85:ae:e9: 03:ba:ba:74:12:39:dc:1c:9f:48:83:bc:91:f3:a5:51: 12:e8:fd:2d:8b:37:52:1c:96:eb:32:0f:2a:19:65:01: 63:41:ac:66:07:d1:b8:70:5b:fd:cb:64:9b:88:20:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:a4:e2:8f:3e:b2:df:94:41:42:27:79:78:23:21:6c: cb:16:1e:96:de:d9:de:fc:bb:01:56:77:7b:6c:50:23: 35:b7:ad:c1:c1:f3:1a:86:9f:35:74:32:f9:27:e7:27: 3b:86:88:1b:4c:99:f3:c2:1e:1f:b9:e5:90:4b:8a:a1: 08:82:4c:04:70:b8:fa:48:a2:3e:b8:f2:b2:3c:3a:1d: 5f:fe:c0:f4:54:f7:9c:81:85:04:55:e7:60:9f:42:45: ea:33:68:60:a1:48:5c:e1:fc:4c:fd:ff:45:b3:d1:d1: 22:cd:72:e3:fc:8c:41:e8:2a:89:3d:63:96:21:5f:3c: fe:ed:23:cb:f9:fe:1e:48:87:42:78:ca:da:ca:64:a5: 46:b6:2e:3f:5f:3c:95:b9:97:84:63:9f:e2:60:50:c3: c4:15:d5:a2:ca:25:b7:50:c4:c8:06:ee:c4:46:85:8f: b1:a1:0c:91:3f:dd:89:d0:36:a9:9d:97:48:e5:e7:1d: 7d:b2:ff:28:db:03:26:81:64:39:9e:a9:fe:3b:41:19: 83:b0:bc:30:18:eb:02:fd:69:a2:2c:2f:26:6c:9a:aa: 8d:47:6b:8c:78:94:87:da:0d:ad:12:88:c0:f7:44:5f: 42:2e:18:a4:7f:e5:fb:89:c3:13:e3:a8:ba:48:6f:08 Fingerprint (SHA-256): B1:EC:8D:80:75:C2:F6:A8:3B:F5:48:CD:0D:E5:6F:77:BD:A0:1A:8D:33:8B:3E:AD:21:D8:60:45:39:67:33:63 Fingerprint (SHA1): 94:41:19:E0:0B:1F:3D:F4:16:2D:E9:BF:88:F3:56:58:E5:9F:A8:CA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12418: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #12419: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125991 (0x1e67e7a7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 13:10:10 2017 Not After : Tue May 10 13:10:10 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:50:7a:28:0e:63:ba:2d:95:b3:f4:71:22:42:f7:24: 64:c7:49:84:22:d1:0b:e8:d2:59:3d:7c:73:4f:69:b1: ca:ab:78:25:82:f9:0b:e5:c6:01:b4:1e:66:e6:2a:8c: 6b:3b:05:1f:e5:05:c3:63:30:58:1c:15:a6:e7:06:28: 35:69:ce:5e:1a:76:66:49:5c:6a:b2:0e:6a:2d:cd:74: a8:45:c7:75:62:37:7a:ca:b4:5f:4c:0e:39:68:35:da: d8:a9:b6:18:b0:ff:a1:f3:b6:23:aa:d4:a6:cf:74:40: 36:f1:ac:95:02:06:bc:d5:cc:34:d2:e6:1c:52:2f:04: c2:7f:92:8b:be:68:7b:a5:33:02:18:d5:ad:31:ed:e9: 9b:06:8f:4a:8a:23:31:9b:56:4c:d3:f8:ab:5b:8e:a9: 06:b1:7b:68:0d:b8:e2:8f:ed:b5:85:5f:42:88:f3:e4: 30:88:7e:b3:39:7d:c4:eb:ca:be:28:8f:7c:5c:fd:4a: 81:2a:17:5d:c2:82:3b:cf:d4:48:cb:da:6b:85:ae:e9: 03:ba:ba:74:12:39:dc:1c:9f:48:83:bc:91:f3:a5:51: 12:e8:fd:2d:8b:37:52:1c:96:eb:32:0f:2a:19:65:01: 63:41:ac:66:07:d1:b8:70:5b:fd:cb:64:9b:88:20:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:a4:e2:8f:3e:b2:df:94:41:42:27:79:78:23:21:6c: cb:16:1e:96:de:d9:de:fc:bb:01:56:77:7b:6c:50:23: 35:b7:ad:c1:c1:f3:1a:86:9f:35:74:32:f9:27:e7:27: 3b:86:88:1b:4c:99:f3:c2:1e:1f:b9:e5:90:4b:8a:a1: 08:82:4c:04:70:b8:fa:48:a2:3e:b8:f2:b2:3c:3a:1d: 5f:fe:c0:f4:54:f7:9c:81:85:04:55:e7:60:9f:42:45: ea:33:68:60:a1:48:5c:e1:fc:4c:fd:ff:45:b3:d1:d1: 22:cd:72:e3:fc:8c:41:e8:2a:89:3d:63:96:21:5f:3c: fe:ed:23:cb:f9:fe:1e:48:87:42:78:ca:da:ca:64:a5: 46:b6:2e:3f:5f:3c:95:b9:97:84:63:9f:e2:60:50:c3: c4:15:d5:a2:ca:25:b7:50:c4:c8:06:ee:c4:46:85:8f: b1:a1:0c:91:3f:dd:89:d0:36:a9:9d:97:48:e5:e7:1d: 7d:b2:ff:28:db:03:26:81:64:39:9e:a9:fe:3b:41:19: 83:b0:bc:30:18:eb:02:fd:69:a2:2c:2f:26:6c:9a:aa: 8d:47:6b:8c:78:94:87:da:0d:ad:12:88:c0:f7:44:5f: 42:2e:18:a4:7f:e5:fb:89:c3:13:e3:a8:ba:48:6f:08 Fingerprint (SHA-256): B1:EC:8D:80:75:C2:F6:A8:3B:F5:48:CD:0D:E5:6F:77:BD:A0:1A:8D:33:8B:3E:AD:21:D8:60:45:39:67:33:63 Fingerprint (SHA1): 94:41:19:E0:0B:1F:3D:F4:16:2D:E9:BF:88:F3:56:58:E5:9F:A8:CA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12420: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125993 (0x1e67e7a9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed May 10 13:10:15 2017 Not After : Tue May 10 13:10:15 2022 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:80:74:d9:92:d4:bb:5e:a2:82:80:9f:66:04:88:95: 3c:8b:cd:85:0e:7b:ad:49:5f:d6:b4:2c:92:f1:b7:3b: 54:97:19:40:f7:50:ca:b5:56:b9:12:84:08:f7:5d:76: e8:05:5a:45:51:4c:c7:3a:60:c4:ee:75:03:2f:dc:51: 1e:c0:4a:c7:46:01:83:49:2f:b7:ff:f7:09:bd:18:8a: 06:ba:07:fd:c6:75:bc:0b:fb:9b:04:37:3e:7d:ff:58: 84:8c:2e:22:72:01:bc:4c:86:d6:91:95:e9:c5:2a:cb: 6f:48:c4:9a:45:4a:4a:51:33:39:83:fc:9d:ec:60:39: aa:c5:11:45:2c:45:4e:83:76:da:a6:0a:88:f7:e4:0a: 44:30:43:35:51:d7:85:3f:13:0f:75:4c:0d:60:de:5b: 28:68:a1:c3:4f:13:a6:90:22:25:03:65:ae:99:29:c6: af:b3:92:76:b7:f0:04:d4:f9:f7:ca:29:59:f2:77:23: c2:95:c3:82:f9:11:13:fd:85:41:22:6d:e4:9a:d2:d6: a4:f5:dc:38:cb:dd:aa:29:99:38:74:a0:da:bb:a5:44: c9:6a:bb:72:61:2d:83:26:ff:1d:56:cc:60:60:db:e0: 62:db:94:87:a6:ad:72:a0:50:f9:65:59:14:cc:86:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8a:be:a1:07:42:d1:37:c6:67:6e:29:a5:01:d7:a1:c7: 8b:8e:eb:12:7f:b8:9a:d3:96:e1:ac:df:ce:ff:13:0d: c8:82:06:c2:02:6e:d9:4b:f5:3c:2b:d5:66:18:14:d7: c3:d3:cf:18:b0:f5:f4:62:3f:b9:4e:07:e0:ed:da:98: 1b:c6:ea:c6:2b:71:09:03:54:f0:eb:a5:84:11:c1:be: a0:fd:3c:77:97:8d:ed:83:e1:0d:09:64:aa:de:13:e1: b2:d7:66:5d:2b:e6:93:c6:8b:63:21:97:59:e3:0c:58: 54:dc:66:0e:3b:2c:f5:f3:8e:8d:b8:b2:a0:19:e1:51: 0c:60:4c:bd:d2:88:3f:56:06:87:23:a2:e5:1f:b1:16: 3d:85:43:01:06:b4:43:d4:7c:fe:0e:23:e9:ce:a6:c1: 61:5f:9e:9a:ee:48:06:66:39:b2:a0:2a:00:27:24:cc: f7:b9:76:b8:ac:e5:5f:a8:47:3a:af:98:53:a9:57:52: ab:51:53:d2:63:5d:42:51:14:62:02:f2:2c:85:76:ac: 80:a6:06:8e:4e:f0:da:93:5a:a5:e9:6a:af:26:21:b0: cd:02:d4:25:22:fe:f5:3e:c9:37:12:b2:7f:d6:0d:5f: c7:61:b7:2e:b3:88:28:35:2a:95:55:03:0d:e2:e4:7e Fingerprint (SHA-256): 4F:A4:7C:B7:C4:73:46:D0:ED:8D:D8:E5:12:D5:CB:3A:01:55:38:D1:A3:F3:31:A8:21:46:08:2D:E3:BE:EC:58 Fingerprint (SHA1): EC:C1:D9:08:A7:05:91:72:93:E2:8E:3A:22:91:52:75:6E:2A:50:35 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #12421: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #12422: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #12423: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #12424: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125991 (0x1e67e7a7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 13:10:10 2017 Not After : Tue May 10 13:10:10 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:50:7a:28:0e:63:ba:2d:95:b3:f4:71:22:42:f7:24: 64:c7:49:84:22:d1:0b:e8:d2:59:3d:7c:73:4f:69:b1: ca:ab:78:25:82:f9:0b:e5:c6:01:b4:1e:66:e6:2a:8c: 6b:3b:05:1f:e5:05:c3:63:30:58:1c:15:a6:e7:06:28: 35:69:ce:5e:1a:76:66:49:5c:6a:b2:0e:6a:2d:cd:74: a8:45:c7:75:62:37:7a:ca:b4:5f:4c:0e:39:68:35:da: d8:a9:b6:18:b0:ff:a1:f3:b6:23:aa:d4:a6:cf:74:40: 36:f1:ac:95:02:06:bc:d5:cc:34:d2:e6:1c:52:2f:04: c2:7f:92:8b:be:68:7b:a5:33:02:18:d5:ad:31:ed:e9: 9b:06:8f:4a:8a:23:31:9b:56:4c:d3:f8:ab:5b:8e:a9: 06:b1:7b:68:0d:b8:e2:8f:ed:b5:85:5f:42:88:f3:e4: 30:88:7e:b3:39:7d:c4:eb:ca:be:28:8f:7c:5c:fd:4a: 81:2a:17:5d:c2:82:3b:cf:d4:48:cb:da:6b:85:ae:e9: 03:ba:ba:74:12:39:dc:1c:9f:48:83:bc:91:f3:a5:51: 12:e8:fd:2d:8b:37:52:1c:96:eb:32:0f:2a:19:65:01: 63:41:ac:66:07:d1:b8:70:5b:fd:cb:64:9b:88:20:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:a4:e2:8f:3e:b2:df:94:41:42:27:79:78:23:21:6c: cb:16:1e:96:de:d9:de:fc:bb:01:56:77:7b:6c:50:23: 35:b7:ad:c1:c1:f3:1a:86:9f:35:74:32:f9:27:e7:27: 3b:86:88:1b:4c:99:f3:c2:1e:1f:b9:e5:90:4b:8a:a1: 08:82:4c:04:70:b8:fa:48:a2:3e:b8:f2:b2:3c:3a:1d: 5f:fe:c0:f4:54:f7:9c:81:85:04:55:e7:60:9f:42:45: ea:33:68:60:a1:48:5c:e1:fc:4c:fd:ff:45:b3:d1:d1: 22:cd:72:e3:fc:8c:41:e8:2a:89:3d:63:96:21:5f:3c: fe:ed:23:cb:f9:fe:1e:48:87:42:78:ca:da:ca:64:a5: 46:b6:2e:3f:5f:3c:95:b9:97:84:63:9f:e2:60:50:c3: c4:15:d5:a2:ca:25:b7:50:c4:c8:06:ee:c4:46:85:8f: b1:a1:0c:91:3f:dd:89:d0:36:a9:9d:97:48:e5:e7:1d: 7d:b2:ff:28:db:03:26:81:64:39:9e:a9:fe:3b:41:19: 83:b0:bc:30:18:eb:02:fd:69:a2:2c:2f:26:6c:9a:aa: 8d:47:6b:8c:78:94:87:da:0d:ad:12:88:c0:f7:44:5f: 42:2e:18:a4:7f:e5:fb:89:c3:13:e3:a8:ba:48:6f:08 Fingerprint (SHA-256): B1:EC:8D:80:75:C2:F6:A8:3B:F5:48:CD:0D:E5:6F:77:BD:A0:1A:8D:33:8B:3E:AD:21:D8:60:45:39:67:33:63 Fingerprint (SHA1): 94:41:19:E0:0B:1F:3D:F4:16:2D:E9:BF:88:F3:56:58:E5:9F:A8:CA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12425: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125995 (0x1e67e7ab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed May 10 13:10:18 2017 Not After : Tue May 10 13:10:18 2067 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:bf:41:65:f2:23:09:c7:83:61:bb:9e:45:b7:38:de: 33:6b:7f:d8:a8:f7:85:83:83:c3:0c:72:fc:da:5a:18: 0a:3a:f6:09:cb:94:f6:8a:a7:11:8e:1b:a6:e6:f4:62: 68:a1:c4:bf:c2:54:8f:75:6f:7f:d3:00:df:3f:11:16: 19:79:13:60:40:af:eb:51:df:c4:d6:11:12:00:d6:0b: c8:05:65:6e:b7:20:41:62:a0:d1:4d:4e:1c:cd:c3:3d: 82:fa:83:60:e1:55:a7:c0:69:21:c4:35:b5:4c:9b:3d: 90:a4:ab:7f:8c:7f:85:0b:9b:1c:9b:da:dd:85:ff:6c: fb:b1:f4:76:51:c5:38:bd:06:2a:4f:57:24:33:b4:97: c0:1b:ed:80:c9:bf:2f:78:63:32:a8:17:f9:b2:d4:dd: c3:1c:81:e7:68:b3:e8:3a:bb:86:cf:c2:62:e7:6a:2a: a6:54:17:a7:f1:23:e0:9d:43:aa:ec:56:f9:fd:1d:ea: 3c:7a:a8:84:53:bc:97:4b:12:0e:8b:1a:82:a2:60:ac: 28:c9:2b:2c:0b:95:40:9f:9f:86:bd:e0:0c:5a:4a:a3: e3:7c:0b:74:af:90:21:7c:4c:fa:11:36:bb:2b:56:ef: d3:48:71:4e:c0:99:8a:ff:45:b6:9e:b0:ce:f1:18:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:b4:e7:f4:30:fa:69:b0:ab:7b:06:bd:8d:4e:23:e0: 11:2b:1b:9b:aa:1f:6f:ac:de:ea:58:91:d6:7a:a7:6d: be:20:26:22:57:a5:86:a4:58:7d:78:42:c4:f3:64:42: 9c:af:c1:79:62:94:98:55:fc:db:72:8a:cd:dc:05:ad: 9f:80:47:31:9e:3d:5f:23:f4:e0:83:de:59:25:74:a8: 9e:89:43:44:62:03:ad:a2:39:05:2f:50:ed:fb:3f:b2: 4a:db:40:6c:0b:7e:f1:f9:28:22:15:ec:88:88:e1:a1: c3:93:af:76:b2:d1:f8:b3:7e:bb:19:b4:13:8a:0c:c8: 5e:39:ec:4a:85:92:43:01:4c:af:0f:aa:f5:68:8f:ed: 84:e3:c3:4d:94:e4:ab:b5:ce:b7:58:54:1e:23:b4:98: 19:dc:14:13:0f:0d:4d:1f:ba:83:d9:3a:cf:72:8a:ce: 9c:e9:54:82:05:2a:95:71:3e:63:ee:66:f2:ae:ee:d4: b4:5b:b3:af:c6:f0:4d:9b:6f:93:2c:c2:42:05:d8:8a: 4e:c9:7c:d4:68:b9:4d:1c:3d:e8:d1:8c:9a:20:e3:a0: ea:0d:7e:e3:bc:38:a8:61:66:cd:7a:fc:1f:28:8c:5b: 32:3d:af:9e:e9:f1:47:1c:b4:c8:bd:9a:95:cd:88:b4 Fingerprint (SHA-256): 5F:FF:C0:55:84:CA:38:79:F7:BF:70:A9:39:9E:CD:1A:75:F0:23:D0:92:8B:AB:0E:16:23:4D:B1:33:52:DF:B7 Fingerprint (SHA1): 84:99:D1:09:64:C1:8E:1A:37:11:C0:4E:36:06:53:B3:18:F2:50:79 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #12426: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125991 (0x1e67e7a7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed May 10 13:10:10 2017 Not After : Tue May 10 13:10:10 2067 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:50:7a:28:0e:63:ba:2d:95:b3:f4:71:22:42:f7:24: 64:c7:49:84:22:d1:0b:e8:d2:59:3d:7c:73:4f:69:b1: ca:ab:78:25:82:f9:0b:e5:c6:01:b4:1e:66:e6:2a:8c: 6b:3b:05:1f:e5:05:c3:63:30:58:1c:15:a6:e7:06:28: 35:69:ce:5e:1a:76:66:49:5c:6a:b2:0e:6a:2d:cd:74: a8:45:c7:75:62:37:7a:ca:b4:5f:4c:0e:39:68:35:da: d8:a9:b6:18:b0:ff:a1:f3:b6:23:aa:d4:a6:cf:74:40: 36:f1:ac:95:02:06:bc:d5:cc:34:d2:e6:1c:52:2f:04: c2:7f:92:8b:be:68:7b:a5:33:02:18:d5:ad:31:ed:e9: 9b:06:8f:4a:8a:23:31:9b:56:4c:d3:f8:ab:5b:8e:a9: 06:b1:7b:68:0d:b8:e2:8f:ed:b5:85:5f:42:88:f3:e4: 30:88:7e:b3:39:7d:c4:eb:ca:be:28:8f:7c:5c:fd:4a: 81:2a:17:5d:c2:82:3b:cf:d4:48:cb:da:6b:85:ae:e9: 03:ba:ba:74:12:39:dc:1c:9f:48:83:bc:91:f3:a5:51: 12:e8:fd:2d:8b:37:52:1c:96:eb:32:0f:2a:19:65:01: 63:41:ac:66:07:d1:b8:70:5b:fd:cb:64:9b:88:20:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:a4:e2:8f:3e:b2:df:94:41:42:27:79:78:23:21:6c: cb:16:1e:96:de:d9:de:fc:bb:01:56:77:7b:6c:50:23: 35:b7:ad:c1:c1:f3:1a:86:9f:35:74:32:f9:27:e7:27: 3b:86:88:1b:4c:99:f3:c2:1e:1f:b9:e5:90:4b:8a:a1: 08:82:4c:04:70:b8:fa:48:a2:3e:b8:f2:b2:3c:3a:1d: 5f:fe:c0:f4:54:f7:9c:81:85:04:55:e7:60:9f:42:45: ea:33:68:60:a1:48:5c:e1:fc:4c:fd:ff:45:b3:d1:d1: 22:cd:72:e3:fc:8c:41:e8:2a:89:3d:63:96:21:5f:3c: fe:ed:23:cb:f9:fe:1e:48:87:42:78:ca:da:ca:64:a5: 46:b6:2e:3f:5f:3c:95:b9:97:84:63:9f:e2:60:50:c3: c4:15:d5:a2:ca:25:b7:50:c4:c8:06:ee:c4:46:85:8f: b1:a1:0c:91:3f:dd:89:d0:36:a9:9d:97:48:e5:e7:1d: 7d:b2:ff:28:db:03:26:81:64:39:9e:a9:fe:3b:41:19: 83:b0:bc:30:18:eb:02:fd:69:a2:2c:2f:26:6c:9a:aa: 8d:47:6b:8c:78:94:87:da:0d:ad:12:88:c0:f7:44:5f: 42:2e:18:a4:7f:e5:fb:89:c3:13:e3:a8:ba:48:6f:08 Fingerprint (SHA-256): B1:EC:8D:80:75:C2:F6:A8:3B:F5:48:CD:0D:E5:6F:77:BD:A0:1A:8D:33:8B:3E:AD:21:D8:60:45:39:67:33:63 Fingerprint (SHA1): 94:41:19:E0:0B:1F:3D:F4:16:2D:E9:BF:88:F3:56:58:E5:9F:A8:CA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12427: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #12428: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #12429: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #12430: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #12431: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #12432: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 510125996 (0x1e67e7ac) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed May 10 13:10:20 2017 Not After : Tue May 10 13:10:20 2022 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:41:71:fd:76:7b:d9:78:a5:d6:99:4b:1e:2b:ad:ee: 4c:dd:0a:4e:43:28:5c:d5:c4:46:dc:a5:ea:b7:52:2c: 28:e6:33:32:40:8b:2a:b0:77:79:e4:0c:60:f6:f9:e4: 07:5b:78:c0:a7:d7:ce:d3:86:76:6a:8f:8e:fe:d9:ab: 26:62:e8:26:07:89:24:d5:91:a4:7e:d2:13:da:35:b9: 86:bd:b2:bd:8e:1d:37:d6:ee:6e:2b:53:9d:c7:92:09: 37:83:d7:0b:19:0c:14:0f:81:ef:cd:91:76:30:d8:5a: bf:f3:3f:eb:cb:41:1b:5d:3f:d9:20:0b:c0:13:17:e3: b7:70:85:21:a7:00:43:e6:ec:0d:34:75:ec:52:14:0d: 83:a8:3f:c2:2d:e1:42:ed:a5:ec:01:52:4d:fa:f8:69: 35:75:d5:24:4c:19:dd:41:9c:89:da:b7:26:ee:e2:82: ca:3f:35:df:79:1f:2a:50:32:31:52:53:a8:77:d2:3b: c9:86:d2:5e:6f:2d:29:78:41:32:12:c8:e0:0a:54:32: eb:d1:15:01:76:30:1e:61:15:59:42:d1:e5:ee:57:7e: c0:12:a9:a3:3c:93:b5:af:5d:0a:49:10:cf:d7:0c:2c: ab:18:04:99:24:47:29:02:3b:d6:f5:28:43:6e:26:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:d4:40:cc:a0:15:3b:f6:b8:a0:2d:8f:39:8e:89:74: 73:af:be:99:6d:ec:25:b9:4f:db:5c:2d:44:1b:15:0a: 51:f3:9e:8e:3c:0d:55:87:e4:31:b0:cb:84:41:25:f7: 68:21:1d:08:0c:0c:50:ca:85:e1:0e:aa:04:8a:8c:24: 47:6b:00:58:4e:9f:1f:72:c1:5f:d5:84:f0:6c:a9:60: a6:aa:2a:90:6f:38:cb:50:90:48:27:18:2d:d7:a9:17: 20:c0:ee:19:7b:cf:69:a7:d6:9c:d8:34:56:51:e6:43: da:74:6b:45:8d:c4:6a:8f:69:cc:a1:d2:12:65:6e:2d: e0:73:a9:7b:71:eb:0a:51:7e:8a:7d:fc:4f:ff:9b:94: 26:b7:a3:e1:58:9b:7d:a3:0c:47:de:14:49:fa:b2:a1: 93:fb:91:24:14:59:34:95:fa:c1:32:ae:01:30:f0:1b: 70:a5:83:59:b9:52:07:fb:4b:12:18:72:b5:07:fd:24: e8:80:e3:1d:5f:26:dd:5c:34:f2:df:16:e5:4a:fe:f5: 35:ad:ea:5d:c6:8d:51:cd:df:3c:1e:1c:6f:5f:40:c3: 7d:d9:62:5e:18:4b:1d:bc:97:78:75:98:3a:2e:c7:5a: 57:52:ff:df:98:05:c3:b6:c4:ba:f9:fd:98:2f:32:6f Fingerprint (SHA-256): 76:88:9E:7E:40:79:46:85:20:87:B9:5F:D0:97:10:27:B5:5B:CE:6F:C5:7F:DD:98:A6:D5:03:9B:50:A7:5A:BD Fingerprint (SHA1): 46:07:C9:CD:18:8A:01:A6:96:61:E5:1D:D0:1D:EF:1C:96:AC:8F:85 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #12433: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #12434: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #12435: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #12436: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #12437: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #12438: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #12439: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #12440: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #12441: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #12442: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #12443: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #12444: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #12445: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #12446: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #12447: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #12448: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #12449: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #12450: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #12451: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #12452: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #12453: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #12454: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #12455: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.30.2/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #12456: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 17794 at Wed May 10 13:10:37 UTC 2017 kill -USR1 17794 httpserv: normal termination httpserv -b -p 9218 2>/dev/null; httpserv with PID 17794 killed at Wed May 10 13:10:37 UTC 2017 TIMESTAMP chains END: Wed May 10 13:10:37 UTC 2017 Running tests for ec TIMESTAMP ec BEGIN: Wed May 10 13:10:37 UTC 2017 Running ec tests for ecperf TIMESTAMP ecperf BEGIN: Wed May 10 13:10:37 UTC 2017 ecperf.sh: ecperf test =============================== ./ecperf.sh: line 43: ecperf: command not found ecperf.sh: #12457: ec(perf) test - PASSED TIMESTAMP ecperf END: Wed May 10 13:10:37 UTC 2017 Running ec tests for ectest TIMESTAMP ectest BEGIN: Wed May 10 13:10:37 UTC 2017 ectest.sh: freebl and pk11 ectest tests =============================== No password file "../tests.pw" exists. Test curve25519 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #12458: ec test certutil keygen - curve25519 - PASSED Test secp256r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #12459: ec test certutil keygen - secp256r1 - PASSED Test secp384r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #12460: ec test certutil keygen - secp384r1 - PASSED Test secp521r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #12461: ec test certutil keygen - secp521r1 - PASSED Test sect571r1 key generation using certutil that should fail because it's not implemented ... Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_KEY: The key does not support the requested operation. ectest.sh: #12462: ec test certutil keygen - secp521r1 - PASSED ectest.sh: #12463: pk11 ec tests - PASSED TIMESTAMP ectest END: Wed May 10 13:10:39 UTC 2017 TIMESTAMP ec END: Wed May 10 13:10:39 UTC 2017 Running tests for gtests TIMESTAMP gtests BEGIN: Wed May 10 13:10:39 UTC 2017 gtests: prng_gtest der_gtest pk11_gtest util_gtest gtests.sh: #12464: Skipping prng_gtest (not built) - UNKNOWN gtests.sh: der_gtest =============================== executing der_gtest [==========] Running 16 tests from 2 test cases. [----------] Global test environment set-up. [----------] 13 tests from DERIntegerDecodingTest [ RUN ] DERIntegerDecodingTest.DecodeLongMinus126 [ OK ] DERIntegerDecodingTest.DecodeLongMinus126 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong130 [ OK ] DERIntegerDecodingTest.DecodeLong130 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong130Padded [ OK ] DERIntegerDecodingTest.DecodeLong130Padded (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong0 [ OK ] DERIntegerDecodingTest.DecodeLong0 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong1 [ OK ] DERIntegerDecodingTest.DecodeLong1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinus1Padded [ OK ] DERIntegerDecodingTest.DecodeLongMinus1Padded (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMax [ OK ] DERIntegerDecodingTest.DecodeLongMax (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMin [ OK ] DERIntegerDecodingTest.DecodeLongMin (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMaxMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMaxMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinPlus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinPlus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMaxPlus1 [ OK ] DERIntegerDecodingTest.DecodeLongMaxPlus1 (0 ms) [----------] 13 tests from DERIntegerDecodingTest (0 ms total) [----------] 3 tests from DERPrivateKeyImportTest [ RUN ] DERPrivateKeyImportTest.ImportPrivateRSAKey [ OK ] DERPrivateKeyImportTest.ImportPrivateRSAKey (0 ms) [ RUN ] DERPrivateKeyImportTest.ImportInvalidPrivateKey [ OK ] DERPrivateKeyImportTest.ImportInvalidPrivateKey (0 ms) [ RUN ] DERPrivateKeyImportTest.ImportZeroLengthPrivateKey [ OK ] DERPrivateKeyImportTest.ImportZeroLengthPrivateKey (0 ms) [----------] 3 tests from DERPrivateKeyImportTest (0 ms total) [----------] Global test environment tear-down [==========] 16 tests from 2 test cases ran. (1 ms total) [ PASSED ] 16 tests. gtests.sh: #12465: der_gtest run successfully - PASSED test output dir: /builddir/build/BUILD/nss-3.30.2/tests_results/security/localhost.1/sharedb/der_gtest/report.xml executing sed to parse the xml report processing the parsed report gtests.sh: #12466: 'DERIntegerDecodingTest: DecodeLongMinus126' - PASSED gtests.sh: #12467: 'DERIntegerDecodingTest: DecodeLong130' - PASSED gtests.sh: #12468: 'DERIntegerDecodingTest: DecodeLong130Padded' - PASSED gtests.sh: #12469: 'DERIntegerDecodingTest: DecodeLong0' - PASSED gtests.sh: #12470: 'DERIntegerDecodingTest: DecodeLong1' - PASSED gtests.sh: #12471: 'DERIntegerDecodingTest: DecodeLongMinus1' - PASSED gtests.sh: #12472: 'DERIntegerDecodingTest: DecodeLongMinus1Padded' - PASSED gtests.sh: #12473: 'DERIntegerDecodingTest: DecodeLongMax' - PASSED gtests.sh: #12474: 'DERIntegerDecodingTest: DecodeLongMin' - PASSED gtests.sh: #12475: 'DERIntegerDecodingTest: DecodeLongMaxMinus1' - PASSED gtests.sh: #12476: 'DERIntegerDecodingTest: DecodeLongMinPlus1' - PASSED gtests.sh: #12477: 'DERIntegerDecodingTest: DecodeLongMinMinus1' - PASSED gtests.sh: #12478: 'DERIntegerDecodingTest: DecodeLongMaxPlus1' - PASSED gtests.sh: #12479: 'DERPrivateKeyImportTest: ImportPrivateRSAKey' - PASSED gtests.sh: #12480: 'DERPrivateKeyImportTest: ImportInvalidPrivateKey' - PASSED gtests.sh: #12481: 'DERPrivateKeyImportTest: ImportZeroLengthPrivateKey' - PASSED gtests.sh: #12482: Skipping pk11_gtest (not built) - UNKNOWN gtests.sh: #12483: Skipping util_gtest (not built) - UNKNOWN TIMESTAMP gtests END: Wed May 10 13:10:39 UTC 2017 Running tests for ssl_gtests TIMESTAMP ssl_gtests BEGIN: Wed May 10 13:10:39 UTC 2017 ssl_gtest.sh: SSL Gtests =============================== ssl_gtest.sh: #12484: create ssl_gtest database - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #12485: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #12486: create certificate: sign kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #12487: create certificate: sign kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #12488: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #12489: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #12490: create certificate: kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #12491: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #12492: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #12493: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #12494: create certificate: kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #12495: create certificate: ca - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #12496: create certificate: sign - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #12497: create certificate: kex - PASSED Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #12498: create certificate: sign - PASSED ssl_gtest.sh: #12499: Skipping ssl_gtest (not built) - UNKNOWN TIMESTAMP ssl_gtests END: Wed May 10 13:10:48 UTC 2017 SUMMARY: ======== NSS variables: -------------- HOST=localhost DOMSUF=localdomain BUILD_OPT=1 USE_X32= USE_64= NSS_CYCLES="" NSS_TESTS="libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains ec gtests ssl_gtests" NSS_SSL_TESTS="crl fips_normal normal_fips iopr policy" NSS_SSL_RUN="cov auth stapling stress" NSS_AIA_PATH= NSS_AIA_HTTP= NSS_AIA_OCSP= IOPR_HOSTADDR_LIST= PKITS_DATA= Tests summary: -------------- Passed: 12483 Failed: 0 Failed with core: 0 ASan failures: 0 Unknown status: 16 TinderboxPrint:Unknown: 16 ~/build/BUILD/nss-3.30.2 + popd + killall selfserv_9208 selfserv_9208: no process found + : + '[' x == x ']' ++ grep -c FAILED ./tests_results/security/localhost.1/output.log + TEST_FAILURES=0 + GREP_EXIT_STATUS=1 okay: test suite detected no failures test suite completed + '[' 1 -eq 1 ']' + echo 'okay: test suite detected no failures' + echo 'test suite completed' + exit 0 Processing files: nss-3.30.2-1.1.fc26.armv7hl Executing(%license): /bin/sh -e /var/tmp/rpm-tmp.ZfjVL3 + umask 022 + cd /builddir/build/BUILD + cd nss-3.30.2 + LICENSEDIR=/builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/share/licenses/nss + export LICENSEDIR + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/share/licenses/nss + cp -pr nss/COPYING /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm/usr/share/licenses/nss + exit 0 Provides: config(nss) = 3.30.2-1.1.fc26 libnss3.so libnss3.so(NSS_3.10) libnss3.so(NSS_3.10.2) libnss3.so(NSS_3.11) libnss3.so(NSS_3.11.1) libnss3.so(NSS_3.11.2) libnss3.so(NSS_3.11.7) libnss3.so(NSS_3.11.9) libnss3.so(NSS_3.12) libnss3.so(NSS_3.12.1) libnss3.so(NSS_3.12.10) libnss3.so(NSS_3.12.3) libnss3.so(NSS_3.12.4) libnss3.so(NSS_3.12.5) libnss3.so(NSS_3.12.6) libnss3.so(NSS_3.12.7) libnss3.so(NSS_3.12.9) libnss3.so(NSS_3.13) libnss3.so(NSS_3.13.2) libnss3.so(NSS_3.14) libnss3.so(NSS_3.14.1) libnss3.so(NSS_3.14.3) libnss3.so(NSS_3.15) libnss3.so(NSS_3.15.4) libnss3.so(NSS_3.16.1) libnss3.so(NSS_3.16.2) libnss3.so(NSS_3.18) libnss3.so(NSS_3.19) libnss3.so(NSS_3.19.1) libnss3.so(NSS_3.2) libnss3.so(NSS_3.2.1) libnss3.so(NSS_3.21) libnss3.so(NSS_3.22) libnss3.so(NSS_3.3) libnss3.so(NSS_3.3.1) libnss3.so(NSS_3.30) libnss3.so(NSS_3.4) libnss3.so(NSS_3.5) libnss3.so(NSS_3.6) libnss3.so(NSS_3.7) libnss3.so(NSS_3.7.1) libnss3.so(NSS_3.8) libnss3.so(NSS_3.9) libnss3.so(NSS_3.9.2) libnss3.so(NSS_3.9.3) libnssckbi.so libnssckbi.so(NSS_3.1) libsmime3.so libsmime3.so(NSS_3.10) libsmime3.so(NSS_3.12.10) libsmime3.so(NSS_3.12.2) libsmime3.so(NSS_3.13) libsmime3.so(NSS_3.15) libsmime3.so(NSS_3.16) libsmime3.so(NSS_3.18) libsmime3.so(NSS_3.2) libsmime3.so(NSS_3.2.1) libsmime3.so(NSS_3.3) libsmime3.so(NSS_3.4) libsmime3.so(NSS_3.4.1) libsmime3.so(NSS_3.6) libsmime3.so(NSS_3.7) libsmime3.so(NSS_3.7.2) libsmime3.so(NSS_3.8) libsmime3.so(NSS_3.9) libsmime3.so(NSS_3.9.3) libssl3.so libssl3.so(NSS_3.11.4) libssl3.so(NSS_3.11.8) libssl3.so(NSS_3.12.10) libssl3.so(NSS_3.12.6) libssl3.so(NSS_3.13) libssl3.so(NSS_3.13.2) libssl3.so(NSS_3.14) libssl3.so(NSS_3.15) libssl3.so(NSS_3.15.4) libssl3.so(NSS_3.2) libssl3.so(NSS_3.2.1) libssl3.so(NSS_3.20) libssl3.so(NSS_3.21) libssl3.so(NSS_3.22) libssl3.so(NSS_3.23) libssl3.so(NSS_3.24) libssl3.so(NSS_3.27) libssl3.so(NSS_3.28) libssl3.so(NSS_3.30) libssl3.so(NSS_3.30.0.1) libssl3.so(NSS_3.4) libssl3.so(NSS_3.7.4) nss = 3.30.2-1.1.fc26 nss(armv7hl-32) = 3.30.2-1.1.fc26 Requires(interp): /bin/sh /bin/sh Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires(post): /bin/sh /usr/sbin/update-alternatives Requires(postun): /bin/sh /usr/sbin/update-alternatives Requires: ld-linux-armhf.so.3 ld-linux-armhf.so.3(GLIBC_2.4) libc.so.6 libc.so.6(GLIBC_2.4) libdl.so.2 libgcc_s.so.1 libgcc_s.so.1(GCC_3.5) libnspr4.so libnss3.so libnss3.so(NSS_3.10) libnss3.so(NSS_3.11) libnss3.so(NSS_3.11.1) libnss3.so(NSS_3.11.2) libnss3.so(NSS_3.12) libnss3.so(NSS_3.12.6) libnss3.so(NSS_3.14) libnss3.so(NSS_3.14.3) libnss3.so(NSS_3.15) libnss3.so(NSS_3.19.1) libnss3.so(NSS_3.2) libnss3.so(NSS_3.21) libnss3.so(NSS_3.22) libnss3.so(NSS_3.3) libnss3.so(NSS_3.3.1) libnss3.so(NSS_3.4) libnss3.so(NSS_3.6) libnss3.so(NSS_3.7) libnss3.so(NSS_3.8) libnss3.so(NSS_3.9) libnssutil3.so libnssutil3.so(NSSUTIL_3.12) libnssutil3.so(NSSUTIL_3.12.3) libnssutil3.so(NSSUTIL_3.12.5) libnssutil3.so(NSSUTIL_3.13) libnssutil3.so(NSSUTIL_3.14) libnssutil3.so(NSSUTIL_3.15) libnssutil3.so(NSSUTIL_3.17.1) libnssutil3.so(NSSUTIL_3.21) libnssutil3.so(NSSUTIL_3.24) libplc4.so libplds4.so libpthread.so.0 libpthread.so.0(GLIBC_2.4) libz.so.1 rtld(GNU_HASH) Conflicts: firefox < 50.1.0-3 seamonkey < 2.46-2 thunderbird < 45.6.0-5 xulrunner < 44.0-9 Processing files: nss-tools-3.30.2-1.1.fc26.armv7hl Provides: nss-tools = 3.30.2-1.1.fc26 nss-tools(armv7hl-32) = 3.30.2-1.1.fc26 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires: ld-linux-armhf.so.3 ld-linux-armhf.so.3(GLIBC_2.4) libc.so.6 libc.so.6(GLIBC_2.4) libdl.so.2 libgcc_s.so.1 libgcc_s.so.1(GCC_3.5) libnspr4.so libnss3.so libnss3.so(NSS_3.10) libnss3.so(NSS_3.11) libnss3.so(NSS_3.11.7) libnss3.so(NSS_3.12) libnss3.so(NSS_3.12.1) libnss3.so(NSS_3.12.3) libnss3.so(NSS_3.12.6) libnss3.so(NSS_3.12.9) libnss3.so(NSS_3.13) libnss3.so(NSS_3.14) libnss3.so(NSS_3.14.1) libnss3.so(NSS_3.15) libnss3.so(NSS_3.16.1) libnss3.so(NSS_3.16.2) libnss3.so(NSS_3.18) libnss3.so(NSS_3.2) libnss3.so(NSS_3.3) libnss3.so(NSS_3.30) libnss3.so(NSS_3.4) libnss3.so(NSS_3.5) libnss3.so(NSS_3.6) libnss3.so(NSS_3.7) libnss3.so(NSS_3.8) libnss3.so(NSS_3.9) libnss3.so(NSS_3.9.2) libnss3.so(NSS_3.9.3) libnssutil3.so libnssutil3.so(NSSUTIL_3.12) libnssutil3.so(NSSUTIL_3.12.7) libnssutil3.so(NSSUTIL_3.15) libplc4.so libplds4.so libpthread.so.0 libpthread.so.0(GLIBC_2.4) libsmime3.so libsmime3.so(NSS_3.10) libsmime3.so(NSS_3.2) libsmime3.so(NSS_3.3) libsmime3.so(NSS_3.4) libsmime3.so(NSS_3.6) libsmime3.so(NSS_3.9.3) libsoftokn3.so libssl3.so libssl3.so(NSS_3.12.6) libssl3.so(NSS_3.13.2) libssl3.so(NSS_3.14) libssl3.so(NSS_3.15) libssl3.so(NSS_3.15.4) libssl3.so(NSS_3.2) libssl3.so(NSS_3.20) libssl3.so(NSS_3.22) libssl3.so(NSS_3.24) libssl3.so(NSS_3.27) libssl3.so(NSS_3.4) libssl3.so(NSS_3.7.4) libz.so.1 rtld(GNU_HASH) Processing files: nss-sysinit-3.30.2-1.1.fc26.armv7hl Provides: libnsssysinit.so nss-sysinit = 3.30.2-1.1.fc26 nss-sysinit(armv7hl-32) = 3.30.2-1.1.fc26 nss-system-init Requires(interp): /bin/sh Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires(post): coreutils sed Requires: /bin/sh ld-linux-armhf.so.3 ld-linux-armhf.so.3(GLIBC_2.4) libc.so.6 libc.so.6(GLIBC_2.4) libdl.so.2 libgcc_s.so.1 libgcc_s.so.1(GCC_3.5) libnspr4.so libnssutil3.so libnssutil3.so(NSSUTIL_3.12) libnssutil3.so(NSSUTIL_3.14) libplc4.so libplds4.so libpthread.so.0 rtld(GNU_HASH) Processing files: nss-devel-3.30.2-1.1.fc26.armv7hl Provides: nss-devel = 3.30.2-1.1.fc26 nss-devel(armv7hl-32) = 3.30.2-1.1.fc26 nss-static = 3.30.2-1.1.fc26 pkgconfig(nss) = 3.30.2 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires: /bin/sh /usr/bin/pkg-config pkgconfig(nspr) >= 4.14.0 pkgconfig(nss-util) >= 3.30.2 Processing files: nss-pkcs11-devel-3.30.2-1.1.fc26.armv7hl Provides: nss-pkcs11-devel = 3.30.2-1.1.fc26 nss-pkcs11-devel(armv7hl-32) = 3.30.2-1.1.fc26 nss-pkcs11-devel-static = 3.30.2-1.1.fc26 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Processing files: nss-debuginfo-3.30.2-1.1.fc26.armv7hl Provides: nss-debuginfo = 3.30.2-1.1.fc26 nss-debuginfo(armv7hl-32) = 3.30.2-1.1.fc26 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Checking for unpackaged file(s): /usr/lib/rpm/check-files /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm Wrote: /builddir/build/RPMS/nss-3.30.2-1.1.fc26.armv7hl.rpm Wrote: /builddir/build/RPMS/nss-tools-3.30.2-1.1.fc26.armv7hl.rpm Wrote: /builddir/build/RPMS/nss-sysinit-3.30.2-1.1.fc26.armv7hl.rpm Wrote: /builddir/build/RPMS/nss-devel-3.30.2-1.1.fc26.armv7hl.rpm Wrote: /builddir/build/RPMS/nss-pkcs11-devel-3.30.2-1.1.fc26.armv7hl.rpm Wrote: /builddir/build/RPMS/nss-debuginfo-3.30.2-1.1.fc26.armv7hl.rpm Executing(%clean): /bin/sh -e /var/tmp/rpm-tmp.7TQzAO + umask 022 + cd /builddir/build/BUILD + cd nss-3.30.2 + /usr/bin/rm -rf /builddir/build/BUILDROOT/nss-3.30.2-1.1.fc26.arm + exit 0 Child return code was: 0